Download presentation
Presentation is loading. Please wait.
Published byRandolf Gordon Modified over 9 years ago
1
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights
2
2 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties What organizations want totalsecurity flexiblesecurity simplesecurity Total security across all enforcement points The right protection at the right investment Ease of deployment Ease of management
3
3 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Introducing Check Point R70 with New Software Blade Architecture
4
4 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties What is a software blade? A software blade is a security building block Independent Modular Centrally managed
5
5 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties How does it work? Select a containerSelect the bladesConfigure the system
6
6 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Two options to construct your solution Option 1: A La Carte Option 2: Pre-Defined Systems* SG103 1 core 3 blades SG407 4 cores 7 blades SG805 8 cores 5 blades *Examples
7
7 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Total Security Complete Security & Management Portfolio Security Gateway Blades Security Management Blades
8
8 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Customer Benefits Total security across all enforcement points Custom configuration for the right security at the right investment Simple planning, fast deployment Ease of consolidation –Add/activate blades easily into existing infrastructure –Segregation of duties in a single system –Dedicate system resources per software blade Simple migration and scaling TOTAL TOTAL FLEXIBLE FLEXIBLE SIMPLE SIMPLE SECURITY SECURITY MIGRATION MIGRATION CONSOLIDATION CONSOLIDATION LOWER TCO LOWER TCO
9
9 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point R70 Debut of Check Point Software Blade Architecture NEW Check Point Security Gateway R70 IPS Blade: IPS Redefined
10
10 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point Security Gateway R70 The Evolution Continues Main-train release featuring Software Blade architecture New IPS Software Blade Improved Core Firewall Performance New Provisioning Software Blade
11
11 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point IPS Blade Debut of Check Point Software Blade Architecture NEW Check Point Security Gateway R70 IPS Software Blade: Next Generation Integrated Intrusion Prevention
12
12 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point IPS Blade Check Point IPS Blade: Complete intrusion prevention integrated with firewall Enterprise-class performance Comprehensive and dynamic management
13
13 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties IPS Increases Threat Control
14
14 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties New Threat Control Engine Utilizing multiple methods of detection and analysis for accurate and confident security Pre-emptive and accurate detection via NEW! multi- method signature & behavioral prevention engine. Wide protection coverage for both server and client vulnerabilities. Protection profiles with attack severity, confidence, and performance settings to automatically set protections to Detect or Prevent. Open language for writing protections and protocol decoders. Application Identification for application policy enforcement.
15
15 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Complete Intrusion Protection Protection against server vulnerabilities Protection against client & OS vulnerabilities Protection against malware and worm infections Block stealthy P2P and IM applications Prevent buffer overflow attacks Protection against network reconnaissance gathering Only gateway with IPS across product line
16
16 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Smoothing The Transition Performance
17
17 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties R70 Performance Enhancements CoreXL IPS Engine Firewall Deeper multi-core integration Multi-tier IPS filtering engine –quickly filters ~90% of traffic Filter attacks only on the relevant sections of the traffic –reduce overhead –Reduce false positives Performance Improvements in Secure Platform OS Network Secure Platform Network IPS Engine Firewall …
18
18 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Ensure Total System Performance Ensure firewall performance with load threshold safety-valve Automatically activate protections based on your criteria: Estimated performance impact Severity level Confidence level
19
19 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties New Threat Management Requirements Manage High Volume of IPS Events Manage in Real Time Manage across multiple Security functions Adapt to Constantly Evolving Threat Environment
20
20 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties IPS Software Blade Timeline View Easily isolate important information Quickly go from high-level business view to detailed forensics
21
21 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties IPS Protection Browser Easily Browse, Search, Set Protections Easy navigation through protection list Detailed protection description Review attributes: Severity, Attack Confidence, Performance Impact, Release Data, Industry Reference View and adjust protection settings – Prevent, Detect, Inactive Keyword search: easily find Attack, Protection, Category, CVE…
22
22 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties ‘Sandbox’ New Protections Gain confidence in protections: Automatically ‘sandbox’ new protections in ‘Detect Only’ mode until you are ready to put them in Prevent mode.
23
23 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Extensive Graphs and Reports Meet Compliance and Management Information Needs
24
24 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point R70 Summary Debut of Check Point Software Blade Architecture NEW Check Point Security Gateway R70 IPS Blade: Next Generation Intrusion Prevention
25
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Thank You!
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.