Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.

Similar presentations


Presentation on theme: "©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010."— Presentation transcript:

1 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010

2 2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

3 3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

4 4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security today Our current portfolio R73 (HFA1) Abra Mobile clients (VPN, Encryption)

5 5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 Evolution 2007 2004200820092010 Unified Client Project

6 6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 Unified Endpoint Protection Best of breed Components ► Data Security ► Network Security ► Remote Access components Provides full security coverage Flexible & Modular Deploy what you need now, add what you need in the future Multiple component and suite deployment options

7 7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 – Data Security Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot authentication Media Encryption protects your removable medias Combines Media Encryption and Port Protection

8 8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 – Network Protection Not just a firewall Innovative Network Protection Technologies Program Advisor, WebCheck Complementary Anti-Malware Award-winning, high-performance

9 9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R73 HFA1 - Remote Access Choice of two VPN clients: Endpoint Connect ► Smart connection, whatever the network or connectivity challenges ► Transparent “in the office” user experience ► Embedded hot-spot handling ► 32- and 64-bit client support Legacy SecureClient ► Ensuring topology and deployment compatibility

10 10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 – New features Support of Windows 7 New Anti Malware engine ME new features Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption FDE Support of IRRT enabled laptops (Dell E-Series) Improved client-side performance

11 11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Lowest CPU and Memory Utilization Check Point McAfee Symantec Check Point McAfee Symantec System Boot Time Memory footprint 130 - 100 - 70 - 40 - 10 - Seconds Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs 175 - 160 - 145 - 130 - 115 - Megabytes

12 12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Fast User Experience Fastest Anti-malware Scan Time Check Point McAfee Symantec Check Point McAfee Symantec Anti-malware INITIAL scan time Anti-malware RECURRING scan time 1600 - 1200 - 800 - 400 - 0 - Seconds Anti-malware tests on Windows 7 Source: Check Point Labs 1600 - 1200 - 800 - 400 - 0 - Seconds

13 13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and 2008 32bit FDE new features Supports latest intel chipset Supports hibernation on 64bits OS ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users WebRH AD integration Support of SQL Server 2008 SA new features Server Support for Anti-malware Check Point R71 management support

14 14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Abra R70 Turn any PC into a corporate desktop USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported Keep mobile data secure Secure Workspace isolates/protects data from host Central SW policy controls applications & features Maintain secure connectivity Provide flexible, secure access to corporate resources, info repositories, and applications Leverage existing CP gateway protections/features

15 15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Clients VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect) Encryption is available on the following: Windows Mobile Symbian

16 16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

17 17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80 Evolution 2007 2004200820092010 Unified Management Project Unified Client Project 2,5 years of development

18 18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | A new era in Endpoint Security! Central Management Simple, Flexible Enhanced Monitoring

19 19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Unique Core Values Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative

20 20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Truly Unified Management ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install ► All endpoint blades and policies managed from the same place ► Consistent look and feel ► No nested admin console ► One component to install

21 21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Organization-Centric Management ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints ► Assignment Policy Model based on organization ► Policies can be assigned based on connectivity state and/or compliance level ► Leverage current AD architecture to manage & monitor endpoints

22 22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Simple, Efficient Policy Definition ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity ► Best practice out of the box policies protect endpoints quickly ► Advanced configuration options always available for added granularity

23 23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Flexible Client Deployment ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy ► Ability to create MSI package for deployment ► Device Agent only or featured package ► Full handling of client deployment based on policy

24 24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Enhanced Monitoring ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level ► Full view on current endpoint status and events ► Customizable & Exportable ► Adaptable Drill-down reporting based on organization level

25 25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Leveraging CP Infrastructure ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security ► Combined Network & Endpoint Log Management provides total security view – useful for compliance ► Sharing of Network Objects and Administration provides stronger, simpler security

26 26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | R80: Comprehensive and Innovative ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing ► Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ► Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing

27 27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion

28 28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Conclusion Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone Later this year, R80 will bring us to a new way of managing Endpoint Security After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management

29 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Questions?

30 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank you!


Download ppt "©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010."

Similar presentations


Ads by Google