Download presentation
Presentation is loading. Please wait.
Published byDana Glenn Modified over 9 years ago
1
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness
2
2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Boundaries are disappearing Work from Anywhere Share Data Use Different Devices Use Internet Tools Users Have Different Needs Boundaries are disappearing
3
3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | New environment, new challenges To secure this new environment, IT needs to do more To secure this new environment, IT needs to do more
4
4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | More Security…. …with Less: Less Resources Less Time
5
5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | CHECK POINT TAKES SECURITY TO THE NEXT DIMENSION
6
6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 D SECURITYEnforcementEnforcement PolicyPolicy PeoplePeople Introducing…
7
7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Easily enforce security policies Security that involves people Policy that supports business needs Security as a Business ProcessPolicyPolicy PeoplePeople EnforcementEnforcement
8
8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Introduces 3D Security Combine Policy, People and Enforcement for Better Security Define the right policies Support user needs Easily enforce security EnforcementEnforcement PolicyPolicy PeoplePeople Check Point R75
9
9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Policy Definition Legacy: Now:
10
10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Security is about People, not Numbers Security Is about People, not Numbers
11
11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | IP Based Policy Challenges Access from Anywhere… Users no longer belong to specific networks!
12
12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Several devices per person… IP Based Policy Challenges 67.54.23.213 212.32.11.12 54.23.22.10 10.10.11.12 Too many IP addresses and networks to manage!
13
13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Granular security per user, Security following the user ! user-group and machine
14
14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Accurate Security Intuitive Management Full Integration Check Point Identity Awareness
15
15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | are an integral part of security People
16
16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point UserCheck Technology http://www.youtube.com Application Usage Alert You are trying to access YouTube. Corporate application use policy limits YouTube access to business use only in order to save bandwidth. Please select and confirm your use-case: Personal, Business, or Cancel Educates users on risk and usage policies Makes control more practical Educate and Engage end-users
17
17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Granular Control of all Security layers Granular Visibility Identity Awareness Application Control DLP Mobile Access SmartEvent IPS
18
18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point Sets a New Standard in Latest NSS Group IPS Test Industry-Leading IPS The Check Point IPS Software Blade outperformed nearly every vendor in overall accuracy and blocking: 97.3% Security Effectiveness Multi-Gigabit rated throughput of 2.4Gbps 100% anti-evasion coverage
19
19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Application Detection and Usage Controls Identify, allow, block or limit usage of applications at user or group level
20
20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Check Point AppWiki Over 4,500 applications Over 100,000 social-network widgets Grouped in over 80 categories (including Web 2.0, IM, P2P, Voice & Video, File Share) World’s largest Application Classification Library appwiki.checkpoint.com
21
21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | John, Let’s review the corporate strategy in our morning meeting. Green World Strategy Plan 2010 John.Stevens@yahoo.com Corporate Strategy Data Loss Prevention Alert An email that you have just sent has been quarantined. Reason: attached document contains confidential internal data The message is being held until further action. Send, Discard, or Review Issue Check Point Data Loss Prevention Educate Users on corporate data policies Educate Users on corporate data policies Enforce Data loss business processes Enforce Data loss business processes Prevent Move from detection to prevention Prevent Move from detection to prevention Check Point Combines Technology and Processes to Make DLP Work
22
22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Mobile Access Software Blade Easy Access to Email and Applications
23
23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Simple for end-user Tap “Check Point Mobile” Enter your password Gain secure access to your data!
24
24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | There’s no Control without Visibility
25
25 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 360º Visibility into All Security Events
26
26 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 New Software Blades Check Point Introduces 3D Security R75 Combines Policy, People and Enforcement for Better Security Centralized Management Flexible Deployment
27
27 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Competitive Landscape Check Point CiscoJuniperFortinet Palo Alto Identity Awareness Application Control DLP None Mobile Access Seamless, agentless Active Directory integration Check Point Does it Better! Largest applications coverage in the industry Check Point Does it Better! Practical policies – UserCheck for educating and engaging end-users Check Point Does it Better! Simple and easy end-user experience Check Point Does it Better!
28
28 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | New Packaging and Pricing
29
29 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Introduction… Check Point is updating its Appliances’ packages and pre-defined Security Systems with the new R75 blades! Pre-defined Software SystemsCheck Point Appliances
30
30 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Application Control Software Blade Available in R75 as a new annual service blade! Available in 2 3 sizes Granular user awareness across the Security Gateway Application Control
31
31 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Application Control Software Blade Application Control blade - blade sizes: Small Low-end appliances & software packages S $1,500 Medium Mid-size appliances & software packages M $3,000 Large High-end appliances & software packages L $4,500
32
32 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Identity Awareness Blade Granular user awareness across the Security Gateway Available in R75 as a new Software Blade! Promotionally free until end of 2011 Free license available in UserCenter No additional support costs! Identity Awareness
33
33 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Update R75 Packages… All* Appliances Packages and Pre-defined Systems will now be updated with the new R75 blades… For example: UTM-1 572 UTM-1 574 * For specific products, please refer to the Check Point Pricelist
34
34 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Update R75 Packages… All* Appliances Packages and Pre-defined Systems will now be updated with the new Application Control & Identity Awareness blades … * For specific products, please refer to the Check Point Pricelist
35
35 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Updated R75 Packages… Exciting new value at a great price! UTM-1 572: $8,500 AppCl blade: $1,500 Identity blade: $0 $10,000 + UTM-1 574: $9,000 AppCl blade: included Identity blade: included $9,000 + $1,000 Saved ! OldNew
36
36 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Updated R75 Packages… Exciting new value at a great price! Power-1 5075: $39,000 AppCl blade: $4,500 Identity blade: $0 $43,500 + Power-1 5077: $41,900 AppCl blade: included Identity blade: included $41,900 + $1,600 Saved ! OldNew
37
37 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Commercial Guidelines We must encourage customers to purchase the new packages! Better security at a very attractive price ! Old products will be available for sales until May 2011 Check Point will follow-up with partners on POs for “old” packages… We’ll encourage upsell to the “new” packages Unless explicitly stated in the PO Available for sale as of end of Jan 2011 !
38
38 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 Cores High End Pre-defined Systems Check Point Introduces 12 Cores Licenses for Open Servers For highest level of performance SG1201 New! Unrivaled security for demanding environment SG1207 New!
39
39 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Summary Updated Appliances packages and Pre-defined Systems will be available for sale starting end of Jan 2011 Migrate now to the Software blades architecture! Benefit from the new R75 capabilities Starting R75.1, software will require usage of Software blades licenses R65 End of Support by Mar/2011 For more information, please refer to PartnerMap Combine Policy, People and Enforcement for Better Security
40
40 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Sales Tools and PartnerMap For additional information please contact: – Partner Alliance (cpp@checkpoint.com) Sales Tools are available on the PartnerMap – Customer presentations – Competitive briefs – At-a-glance guides – And more…
41
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank You!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.