Download presentation
Presentation is loading. Please wait.
Published byHelen Henry Modified over 9 years ago
1
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center Americas June, 2012
2
2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point / Market Overview IT Security in Emerging Countries 2 2 Impact and Q&A 3 3
3
3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point At A Glance Founded 1993, HQ in Tel Aviv Consistent, Visionary Leadership 100% Security Innovation, IP, Thought Leadership 2012 Revenue: $1.25 Billion 17% CAGR 2006-2011 Who do organizations trust to secure their business?
4
4 4©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Outstanding Financial Performance Market Cap $11.4B Revenue Growth 17% CAGR ‘06-11 Market Cap $11.4B Revenue Growth 17% CAGR ‘06-11
5
5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Innovative Technologies Stateful Inspection I patent 5,606,668 TrueVector Engine I patent 5,987,611 TrueVector Engine II patent 6,850,943 Cooperative Enforcement patent 6,873,988 SecureXL patent 6,496,935 Stateful Inspection II patent 5,835,726 Significant R&D investment More than 1,500 security experts Application Intelligence Application Intelligence Accelerated Data Path (ADP) Accelerated Data Path (ADP) CoreXL PacketXL
6
6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Award Winning Security Products 100% of Fortune 100 Use Check Point Products
7
7 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Hospital record update Online bank balance check Social network update Supermarket checkout PDA email check Credit card payment ATM withdrawal Remote data backup ERP supplier catalog update Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot Securing Business Everywhere 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
8
8 8 Check Point and World Bank Business relations back to 2002 Presence in Brazil and Singapore Strong relationship with IMF Strong team members in DC area –mbarkett@checkpoint.com
9
9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Two Sources of Vulnerability Human Technology
10
10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Threat Landscape
11
11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point’s Solution: 3D Security Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF
12
12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point / Market Overview IT Security in Emerging Countries 2 2 Impact and Q&A 3 3
13
13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Successes Many throughout the world; some public case studies: QTSC: Vietnam Government Quala: Colombia Manufacturing Liverpool: Mexico Retail
14
14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security 101 CONFIDENTIALITY AVAILABILITY INTEGRITY
15
15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Emerging IT Security: The Bad
16
16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Emerging IT Security: The Bad Source: snapvoip.blogspot.com
17
17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Emerging IT Security: The Good Essential for participation in global digital economy IT Governance National assets >= Corporate assets Foster growth of information economy jobs
18
18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability –CoCom
19
19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability
20
20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability
21
21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability –Importability
22
22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability –Importability
23
23 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability –Importability Malware, Piracy –Not just software
24
24 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success
25
25 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success
26
26 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success Prerequisites –Trade restrictions –Education Encryption –Exportability –Importability Malware, Piracy –Not just software Bootstrap – Authentic security as a solution to counterfeit security problems
27
27 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point / Market Overview IT Security in Emerging Countries 2 2 Impact and Q&A 3 3
28
28 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Global HR Impact >2,000 employees 0 RIF’s in 2 decades Staff in 40 countries Dallas Tel Aviv Tokyo Ottawa Stockholm
29
29 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Questions?
30
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank You
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.