Presentation is loading. Please wait.

Presentation is loading. Please wait.

[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.

Similar presentations


Presentation on theme: "[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple."— Presentation transcript:

1 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple

2 2 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.  Endpoint Security Challenges Today  The Check Point Solution –Comprehensive endpoint security –Secure, fast and simple to use –Market leading data security –Optimized Total Security  Summary Agenda

3 3 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. 2009 ~9 solutions 1994 1 solution The Evolution of Endpoint Security Antivirus Remote access/ VPN Data leakage Firewall Antivirus Anti-spam Full Disk Encryption Media Encryption Anti- malware NAC More threats More technologies More complexity

4 4 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Too Much End User Complexity Security updates and patching Repeated security logons Multiple security applications Reconnecting to VPN Multiple passwords Trying to reconfigure VPN

5 5 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Fast-Growing Web Threats VC's automated Twitter feed spreads malware BusinessWeek site hacked, serving drive-by exploits Drive-By Download Poisons Google Search Results May, 2009 September, 2008 June, 2009 Malware now spreads through the web not email Forrester June, 2008

6 6 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. The Headache of Data Security 53% 65% 12,000 61% of professionals have confidential data on their laptop don’t protect them stolen laptops in U.S. airports/week of data breaches due to lack of policy enforcement Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008

7 7 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. More Regulations, More Compliance PIPEDA PCI HIPAA SOX Gramm-Leach-Bliley Act 95/46/EC European Union Directive DPA Data Protection Act Indian IT Act of 2000 Privacy Act 1988 Japanese Law Personal Information Protection Law

8 8 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Needs Highest level of endpoint protection Simplified user experience Corporate data loss prevention Reduced complexity

9 9 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.  Endpoint Security Challenges Today  The Check Point Solution –Comprehensive endpoint security –Secure, fast and simple to use –Market leading data security –Optimized Total Security  Summary Agenda

10 10 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security 2008 The First and Only Single Agent for Endpoint Security 2009 Introducing Endpoint Security R73

11 11 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Market-Leading Data Security Transparent and Simple to Use Comprehensive Endpoint Protection Optimized Total Security

12 12 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Comprehensive Endpoint Protection

13 13 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Complete Endpoint Security Most comprehensive endpoint solution in a single agent  Integrated VPN  Integrated data security Innovative levels of protection  WebCheck Secure Browsing  Program Control

14 14 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Most Secure Endpoint Security Check Point WebCheck http://www.mywebsite.comhttp://www.cheap-software.com  Dual browser mode  Segregates corporate data from the Internet  Isolates potential threats in the virtual browser sandbox  Protects against drive-by downloads and phishing attacks Trusted siteUntrusted siteWebCheck enabled Stops Web threats at the browser

15 15 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point WebCheck ThreatDescription Traditional Endpoint Security Drive-by downloads Stealth download of malware via browser vulnerability Secure virtual browsingSignature update (if available) Drive-by downloads via external plug-in Stealth download of malware via plug-in process launched outside the browser Secure virtual browsingSignature update (if available) Drive-by download via toolbar plug-in Stealth download of malware via vulnerable toolbar plug-in Secure virtual browsingSignature update (if available) Highest level of protection

16 16 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Authorized Applications Check Point Program Control Protect from malware by controlling endpoint applications  Lock down endpoint to reduce support costs and complexity  Easy to maintain with Program Advisor service automating application policy decisions

17 17 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Transparent and Simple to Use

18 18 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Transparent User Experience InterfaceSingle AgentSingle UpdateSingle ScanSingle LogonSingle

19 19 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Data security Endpoint Windows VPN Check Point OneCheck Single Logon OneCheck Reduce complexity of multiple authentications Transparent and simple to use

20 20 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Stay connected on the move Connect securely from hotspots Configure new connections automatically VPN Auto Connect Automatically reconnect when moving between networks (LAN, WiFi, GPRS) Automatically open hotspot registration page immediately upon connection Determine the correct configuration and connect automatically Transparent and simple to use

21 21 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Transparent and Fast Smallest disk footprint after install Smallest memory footprint (before, during and after scan) Fastest scan in the industry (62% faster than closest competitor) Fastest Web page download with WebCheck enabled

22 22 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Market Leading Data Security

23 23 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Data Security Full Disk Encryption Complete data security with 256-bit encryption File /folder encryption Pre-boot authentication Enforce password policies with more than 100 different smartcard models Media Encryption Control all activities and access on ports Transparently encrypt all removable media Control data loss on all endpoints

24 24 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Secure data on all platforms Highest level of certification Recognized across the industry Data Security Market Leader Mac Linux Smartphones Windows 7 Best Mobile Device Solution Product Excellence Encryption Solution Leader in Magic Quadrant 9 Years in a Row Gold Medal 2009 Reader’s Choice Awards

25 25 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Rapid Large-Scale Deployment EW mode Eliminate management scalability serverless management Flexible agent Deploy only what you need Open architecture Co-exist with 3 rd -party products Windows-integrated logon Data security with no user disruption Endpoint distribution utility Use existing installation tools Meet compliance objectives and secure corporate data now! 150,000 endpoints encrypted,.00066 failure rate Telecommunications Company 50,000 endpoints secured in 30 days Government Agency

26 26 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Optimized Total Security

27 27 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Total Security Challenge Today Lack of policy orchestration Weak threat coverage Infrastructure duplication Separation of endpoint and network security

28 28 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Cooperative Enforcement Built-in Network Access Control  Control endpoint access to corporate network  Coordinate network and endpoint security policies Enforce endpoint compliance  Quarantine non-compliant systems QUARANTINED

29 29 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Security Infrastructure Optimization VPN VPN GatewayVPN Client NAC NAC on GatewayNAC on Client Network SecurityEndpoint Security Server consolidation Simple management Simple deployment

30 30 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Worldwide coordinated network and endpoint threat research Unified Threat Research Update Protection against Microsoft Office Web Components Multiple ActiveX Controls Remote Code Execution Vulnerability (MS09-043) Endpoint Security R72 Security Gateway R70 VPN-1 NGX R65 IPS-1 Protection Provided by: CVE-2009-0562 CVE-2009-1136 Industry Reference MSFT Security BulletinSource: CriticalSeverity: 15-Jul-09Date Published: CPAI-2009-1029Check Point Reference: OverviewDetailsProtection Subscribe Check Point Protection Update Unified notifications for new threats Multi-layered protection across endpoint and network security Common threat definitions across endpoint and network

31 31 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Management Easy Deployment, Easy Management with Single Console Coming Soon

32 32 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Corporate data loss prevention Your Opportunity with Check Point User transparency and ease of use Best endpoint security Reduced complexity

33 33 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Summary Market-Leading Data Security Transparent and Simple to Use Comprehensive Endpoint Protection Optimized Total Security


Download ppt "[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple."

Similar presentations


Ads by Google