Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th.

Similar presentations


Presentation on theme: "1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th."— Presentation transcript:

1 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th March, 2009 Ross Baker Sales Manager Data Security

2 2 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. A Global Security Leader * Frost & Sullivan Global leader in firewall/VPN* and mobile data encryption More than 100,000 protected businesses More than 60 million consumers 100% of Fortune 100 customers 100% security 100% focus on information security >1,000 dedicated security experts Protecting networks and enterprise data Global ~1,900 employees 71 offices, 28 countries 3,000 partners, 88 countries HQ in Israel and U.S. Leader

3 3 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point, not just Network Security

4 4 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Time line Dec 2008 Sales at 30% growth April 2008 Data Security function evolves in “endpoint” 1999 - 2006 Pointsec & Reflex Magnetics evangelise data security idea Dec 2007 Strong Data Security Sales Estimate 50%+ growth in 2008 April 2007 Check Point & Pointsec teams integrate Jan 2007 Check Point acquires Pointsec for $620m

5 5 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

6 6 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Mobile Device Hierarchy Enables:  Faster processing (Remote work on large files)  More wireless network connection options (Access to company data)  Increased storage capacity (Sensitive data at risk) Employee & Client Information and Intellectual Property (R&D, HR) Access Information (Passwords) Data (Push E-Mails) Contacts, Calendar Laptops USB CD DVD PDAs Smart Phones Cell Phones Content Sensitivity & Threat Potential Climbing Up Mobile Device Complexity

7 7 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Mobile Device Hierarchy Enables:  Faster processing (Remote work on large files)  More wireless network connection options (Access to company data)  Increased storage capacity (Sensitive data at risk) Employee & Client Information and Intellectual Property (R&D, HR) Access Information (Passwords) Data (Push E-Mails) Contacts, Calendar Laptops USB CD DVD PDAs Smart Phones Cell Phones Content Sensitivity & Threat Potential Climbing Up Mobile Device Complexity

8 8 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The risks for the mobile executive  Lost device – laptop, PDA, phone and USB media  Unauthorised access using hotel, airport or serviced office hotspots  Theft or malicious attack  Stupidity  Remote working practice not subject to corporate scrutiny 78% of companies that had their computers stolen did not encrypt hard discs BERR 2008 Information Security Breaches Survey

9 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

10 10 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Combinations Check Point Endpoint Security Suite Full Disk Encryption Personal Firewall Host-IPS / 802.1x NAC VPN Client Media Encryption Port protection Antivirus Anti-spyware Endpoint Security Client R70

11 11 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Pricing

12 12 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security

13 13 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. TCO is important right now… Check Point can help

14 14 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. We have a security hole! Enterprises stock up Niche solutions Different vendors Enterprise stock more products

15 15 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.  Never enough security  Increased administration time and costs  Multiple test cycles – every time an agent in updated Endpoint Security Challenges  Too many security agents to manage  Multiple admin consoles – a console for each agent  Software compatibility issues between separate agents Resulting in…

16 16 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Suppliers - 2006

17 17 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Suppliers - Today

18 18 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. About the market - Supply out-weighs demand - The opportunity is clear - Is Endpoint already a commodity? - Public Sector particularly lucrative - Fine balance between functionality and cost - Channel role is vital (relationship selling) - Resellers deciding which vendor to back - Market is encouraging reseller competition - More than 50% of Companies in the UK have NO solution - IT staff at end user sites lack technical expertise in this space - First to the customer sets the expectation

19 19 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. What we see in RFP’s  Protect organisation's information & reputation  Commitments to installation and performance  Provide a highly available, scalable & reliable Infrastructure  Lower the operational cost  Increase effectiveness of doing business  Technological superiority of the solution  Vendor financial stability

20 20 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Be aware of all cost components *** Some may apply

21 21 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Back to basics Anyone lost a laptop lately?

22 22 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Encrypted text “.›Ï”óùžF>?cßÕ¹\6žš)+ú·ê8æþÝEÑ‚ßÈž‹ã]nŠ7@ãaë×mJGöÓ5sì!k!,eŽ‡– r?QrÙm¨®$åÝè¥,#8PHé‘›êè£&ÁWVð’¡‚x[¶t¼”ÅÍHÌpbdåÔ{Âß HêG®8ššaò° Òëç8ü‰·Ü6U&æUmë„dk1A+žpðrɌݣ ±÷Pš¹™Ð_²Æ‰·ó †Óò8V×o-! ±ÕŸ}„‘ÒU ¥ö»Å½" ž8ÚC~å¤kz]ŸšBeŠ8ÒÃDÍfLYð8FÝ®ÙõrOÊo^Ïðxžó– P_î.­Övlx"ÏŽÅ·¥nbÓ†² ÌPy¥.ÿ&±×QÉ\ ¸Ô’k@eÀbÇ”Â]·ßÀ‰Öˆj! ‰ë8y˜öc‰kÜä‚ï¤$ ‹rÞØ~?(IêUiJNÓWÒP‹ÿ:ØïãüV$ÚYä\i%ñZRW¬©þ­`„…â.ÑX õ†ƒ;ÄQ§ ŽENRåncƒ8n’ž.Ï‹B+¨P`Fb¤r¦:ÔÁ",«=Mø#§†PªW ±B›ÜÒ|üWùÐüÑüc.&ï¶'mE|^´søÔúW™VOµ›]œ†±Â3 ?ÙÂgL±›¤°H’†µ+Z<γ³vmE­‡‰3¯ƒµ·Ÿf Gô¯¾g*@<Ų^OñÒ%oÕ¾!©æÒ7=Ī¼*d%©ç¼¥Ÿ(z2f‹AÿDû–í±1ÌÐc€‰(?ÉûÇN œkI×3É]±6 u‚ß+z»>t\Op K7céÒ¤qWèë@fŽ^8b¢ëºTq÷9ìNôQÂG÷×A±<+–S/ztÍ*e´ô"è â–è+6dÚ2'H]Йˆ?Ü̲»ÏÜTɆî]3Rtvç§è«üªYÜr5äq¨¢ÝÙ»Êè´Wyýl^€)Ÿ·JϹÂä2îp1³ F׶„À ÂÂKÀÃ$nÏÅÖLå×DLÉ4”jµ\Âz|àS¹pA€1°™íwhÍs¿‚¨a¢mžëFÁU;àïρéq„Õ"szv¬t$«ï2 SÑ·×È¡4ÝmœÜ=ûÝWžÒßQ+g®fUi–t’¢Ë‹ü" zøÅP+9%ù¤Ùë d±Ij«øjWdóÌ^z0'NÇZË@Zœ"ß.7Û¨¶ Õ‘HzÕ?(I<9w;ö\¨ ;ÃÄ£ªÐ¸çø¸1K­¼¸©1|Üaa_ʼЄ!Úô©FÕñ¿J%ŽxòÓIjx»9’&è⺩ŽfÛjeÓ·#}– bÖ]qõHß3¶c³:2‰µ/Þ÷ ë,ÒŒj-ÎX¢ª§ã72Š‚ý£ñt „R  ™¦ó?ªØÏ,ŠAœ{Э¯GzÇ—O ¹ÒOÿ¼â`‡3ï[bï£æ<Oæá°"óÐ è6¡I‡ò6…é¥ô~´¿œ’|ã¾(‚;(¦Ê ù _m#Q„2à À‹‰6xPÙ|I}f4ŽØ¸Š2–PJjÚ€¡Ã¦K—u&¡ðŽb¾ºv¶ (eU¼¥@öxªÇ7ELnÏÅ"{¼#Äü—zÌñ›{ÿK\¥pæ½Í”ï¬8®õOYßíl4Ëèá®y/„”‚ñ6¤$zÙQ¡¦²g“ `ê©‚Ð9ô3ïÌ5(;ÈÖc™87ºäÁðóÚ+«ú~I¾ `JŸ/1%â>² ¿%ÐaAŒ c"kHÐ

23 23 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Master Boot Record Mandatory Access Control Modified Partition Boot Record Operating System System Files (PW Swap etc.) Full Disk Encryption Check Point Data User Data Unprotected Highly Sensitive FilesBoot Records MBRPBRDataOperating System System Files (PW Swap etc.) File Encryption MBRPBRDataOperating System System Files (PW Swap etc.) Check Point End Point Full Disk Encryption Secured Information Open Information The Check Point solution provides the most complete & comprehensive protection for all data!

24 24 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Insider Threat Companies are fully aware that employees pose a growing risk to data security. Recent press articles highlight two types of insider threats: Malicious attack by employee (Intentional) Unintentional Security Breach (Unintentional)

25 25 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Setting the Scene One USB flash drive in the wrong hands, and your firewall is useless! 80 % of security breaches are caused by insiders… evenly important is the risk of introducing malicious code in the corporate network. USB flash drives’ form factor makes them easy to lose.

26 26 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Operation Endpoint PC Check Point Endpoint Media Encryption Centralized Auditing and Management Audit utility provided for initial assessment of port usage and security policy planning WiredWirelessDevices USBBluetoothMemory cards FirewireInfraredDigital cameras SerialWiFiMusic players PrinterModems IDESmart phones Printers Keyloggers Controls Activity on ports and devices including:

27 27 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Device Discovery Knowing the scale of the problem Requires no software installation Provides a complete snapshot of device activity Extensive exportable HTML reports summarise device activity and can be used to provide business case Essential Pre sales utility www.checkpoint.com/devicediscoverytool

28 28 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

29 29 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

30 30 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

31 31 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Availability  Server and client software can be obtained via download from www.checkpoint.com or through the new Endpoint Security media kitwww.checkpoint.com

32 32 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Target Customers  Existing Check Point customers  Current users of Pointsec / Reflex  Companies with Encryption projects  Companies embracing mobile working  Companies reducing supplier numbers  VPN upgrades & competitive upgrades  Disgruntled Symantec & McAfee users  Customers asking “for that memory stick blocking stuff”

33 33 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Which partners will be most successful?  Those who embrace the whole portfolio  Partners who invest in the solution technically  Partners who understand our licensing  Those who work closely with us  Partners providing true “value add”  Those who make use of our sales tools  6 /10 partners are silver/bronze partners

34 34 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Online Dashboard Instant compliance views

35 35 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Single policy view Simplified security policy

36 36 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. “PC on a stick” Who should use it?  Day extenders, consultants, contractors or employees who work from business centres – Anyone that works from unmanaged devices!  Disaster recovery solution What is it? secureportabledissolvable  A completely secure, portable and dissolvable virtual workspace, includes Check Point endpoint technologies  Centrally managed, integrated with Remote Help Available in Q2 2009

37 37 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. **** If Laptops are easy to lose presenting a massive security risk – What about Smart Phones / PDA ’ s? Data Security 2009 ****

38 38 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Any Questions?  Ross Baker  rossb@checkpoint.com rossb@checkpoint.com  Tel – 07796 693466


Download ppt "1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th."

Similar presentations


Ads by Google