Download presentation
Presentation is loading. Please wait.
Published byNoah Greer Modified over 9 years ago
1
1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th March, 2009 Ross Baker Sales Manager Data Security
2
2 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. A Global Security Leader * Frost & Sullivan Global leader in firewall/VPN* and mobile data encryption More than 100,000 protected businesses More than 60 million consumers 100% of Fortune 100 customers 100% security 100% focus on information security >1,000 dedicated security experts Protecting networks and enterprise data Global ~1,900 employees 71 offices, 28 countries 3,000 partners, 88 countries HQ in Israel and U.S. Leader
3
3 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point, not just Network Security
4
4 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Time line Dec 2008 Sales at 30% growth April 2008 Data Security function evolves in “endpoint” 1999 - 2006 Pointsec & Reflex Magnetics evangelise data security idea Dec 2007 Strong Data Security Sales Estimate 50%+ growth in 2008 April 2007 Check Point & Pointsec teams integrate Jan 2007 Check Point acquires Pointsec for $620m
5
5 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
6
6 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Mobile Device Hierarchy Enables: Faster processing (Remote work on large files) More wireless network connection options (Access to company data) Increased storage capacity (Sensitive data at risk) Employee & Client Information and Intellectual Property (R&D, HR) Access Information (Passwords) Data (Push E-Mails) Contacts, Calendar Laptops USB CD DVD PDAs Smart Phones Cell Phones Content Sensitivity & Threat Potential Climbing Up Mobile Device Complexity
7
7 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Mobile Device Hierarchy Enables: Faster processing (Remote work on large files) More wireless network connection options (Access to company data) Increased storage capacity (Sensitive data at risk) Employee & Client Information and Intellectual Property (R&D, HR) Access Information (Passwords) Data (Push E-Mails) Contacts, Calendar Laptops USB CD DVD PDAs Smart Phones Cell Phones Content Sensitivity & Threat Potential Climbing Up Mobile Device Complexity
8
8 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The risks for the mobile executive Lost device – laptop, PDA, phone and USB media Unauthorised access using hotel, airport or serviced office hotspots Theft or malicious attack Stupidity Remote working practice not subject to corporate scrutiny 78% of companies that had their computers stolen did not encrypt hard discs BERR 2008 Information Security Breaches Survey
9
[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
10
10 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Combinations Check Point Endpoint Security Suite Full Disk Encryption Personal Firewall Host-IPS / 802.1x NAC VPN Client Media Encryption Port protection Antivirus Anti-spyware Endpoint Security Client R70
11
11 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Endpoint Security Pricing
12
12 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security
13
13 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. TCO is important right now… Check Point can help
14
14 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. We have a security hole! Enterprises stock up Niche solutions Different vendors Enterprise stock more products
15
15 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Never enough security Increased administration time and costs Multiple test cycles – every time an agent in updated Endpoint Security Challenges Too many security agents to manage Multiple admin consoles – a console for each agent Software compatibility issues between separate agents Resulting in…
16
16 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Suppliers - 2006
17
17 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Suppliers - Today
18
18 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. About the market - Supply out-weighs demand - The opportunity is clear - Is Endpoint already a commodity? - Public Sector particularly lucrative - Fine balance between functionality and cost - Channel role is vital (relationship selling) - Resellers deciding which vendor to back - Market is encouraging reseller competition - More than 50% of Companies in the UK have NO solution - IT staff at end user sites lack technical expertise in this space - First to the customer sets the expectation
19
19 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. What we see in RFP’s Protect organisation's information & reputation Commitments to installation and performance Provide a highly available, scalable & reliable Infrastructure Lower the operational cost Increase effectiveness of doing business Technological superiority of the solution Vendor financial stability
20
20 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Be aware of all cost components *** Some may apply
21
21 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Back to basics Anyone lost a laptop lately?
22
22 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Encrypted text “.›Ï”óùžF>?cßÕ¹\6žš)+ú·ê8æþÝEÑ‚ßÈž‹ã]nŠ7@ãaë×mJGöÓ5sì!k!,eŽ‡– r?QrÙm¨®$åÝè¥,#8PHé‘›êè£&ÁWVð’¡‚x[¶t¼”ÅÍHÌpbdåÔ{Âß HêG®8ššaò° Òëç8ü‰·Ü6U&æUmë„dk1A+žpðrɌݣ ±÷Pš¹™Ð_²Æ‰·ó †Óò8V×o-! ±ÕŸ}„‘ÒU ¥ö»Å½" ž8ÚC~å¤kz]ŸšBeŠ8ÒÃDÍfLYð8FÝ®ÙõrOÊo^Ïðxžó– P_î.Övlx"ÏŽÅ·¥nbÓ†² ÌPy¥.ÿ&±×QÉ\ ¸Ô’k@eÀbÇ”Â]·ßÀ‰Öˆj! ‰ë8y˜öc‰kÜä‚ï¤$ ‹rÞØ~?(IêUiJNÓWÒP‹ÿ:ØïãüV$ÚYä\i%ñZRW¬©þ`„…â.ÑX õ†ƒ;ÄQ§ ŽENRåncƒ8n’ž.Ï‹B+¨P`Fb¤r¦:ÔÁ",«=Mø#§†PªW ±B›ÜÒ|üWùÐüÑüc.&ï¶'mE|^´søÔúW™VOµ›]œ†±Â3 ?ÙÂgL±›¤°H’†µ+Z<γ³vmE‡‰3¯ƒµ·Ÿf Gô¯¾g*@<Ų^OñÒ%oÕ¾!©æÒ7=Ī¼*d%©ç¼¥Ÿ(z2f‹AÿDû–í±1ÌÐc€‰(?ÉûÇN œkI×3É]±6 u‚ß+z»>t\Op K7céÒ¤qWèë@fŽ^8b¢ëºTq÷9ìNôQÂG÷×A±<+–S/ztÍ*e´ô"è â–è+6dÚ2'H]Йˆ?Ü̲»ÏÜTɆî]3Rtvç§è«üªYÜr5äq¨¢ÝÙ»Êè´Wyýl^€)Ÿ·JϹÂä2îp1³ F׶„À ÂÂKÀÃ$nÏÅÖLå×DLÉ4”jµ\Âz|àS¹pA€1°™íwhÍs¿‚¨a¢mžëFÁU;àïÏéq„Õ"szv¬t$«ï2 SÑ·×È¡4ÝmœÜ=ûÝWžÒßQ+g®fUi–t’¢Ë‹ü" zøÅP+9%ù¤Ùë d±Ij«øjWdóÌ^z0'NÇZË@Zœ"ß.7Û¨¶ Õ‘HzÕ?(I<9w;ö\¨ ;ÃÄ£ªÐ¸çø¸1K¼¸©1|Üaa_ʼЄ!Úô©FÕñ¿J%ŽxòÓIjx»9’&è⺩ŽfÛjeÓ·#}– bÖ]qõHß3¶c³:2‰µ/Þ÷ ë,ÒŒj-ÎX¢ª§ã72Š‚ý£ñt „R ™¦ó?ªØÏ,ŠAœ{ЯGzÇ—O ¹ÒOÿ¼â`‡3ï[bï£æ<Oæá°"óÐ è6¡I‡ò6…é¥ô~´¿œ’|ã¾(‚;(¦Ê ù _m#Q„2à À‹‰6xPÙ|I}f4ŽØ¸Š2–PJjÚ€¡Ã¦K—u&¡ðŽb¾ºv¶ (eU¼¥@öxªÇ7ELnÏÅ"{¼#Äü—zÌñ›{ÿK\¥pæ½Í”ï¬8®õOYßíl4Ëèá®y/„”‚ñ6¤$zÙQ¡¦²g“ `ê©‚Ð9ô3ïÌ5(;ÈÖc™87ºäÁðóÚ+«ú~I¾ `JŸ/1%â>² ¿%ÐaAŒ c"kHÐ
23
23 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Master Boot Record Mandatory Access Control Modified Partition Boot Record Operating System System Files (PW Swap etc.) Full Disk Encryption Check Point Data User Data Unprotected Highly Sensitive FilesBoot Records MBRPBRDataOperating System System Files (PW Swap etc.) File Encryption MBRPBRDataOperating System System Files (PW Swap etc.) Check Point End Point Full Disk Encryption Secured Information Open Information The Check Point solution provides the most complete & comprehensive protection for all data!
24
24 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. The Insider Threat Companies are fully aware that employees pose a growing risk to data security. Recent press articles highlight two types of insider threats: Malicious attack by employee (Intentional) Unintentional Security Breach (Unintentional)
25
25 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Setting the Scene One USB flash drive in the wrong hands, and your firewall is useless! 80 % of security breaches are caused by insiders… evenly important is the risk of introducing malicious code in the corporate network. USB flash drives’ form factor makes them easy to lose.
26
26 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Operation Endpoint PC Check Point Endpoint Media Encryption Centralized Auditing and Management Audit utility provided for initial assessment of port usage and security policy planning WiredWirelessDevices USBBluetoothMemory cards FirewireInfraredDigital cameras SerialWiFiMusic players PrinterModems IDESmart phones Printers Keyloggers Controls Activity on ports and devices including:
27
27 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Device Discovery Knowing the scale of the problem Requires no software installation Provides a complete snapshot of device activity Extensive exportable HTML reports summarise device activity and can be used to provide business case Essential Pre sales utility www.checkpoint.com/devicediscoverytool
28
28 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
29
29 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
30
30 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
31
31 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Product Availability Server and client software can be obtained via download from www.checkpoint.com or through the new Endpoint Security media kitwww.checkpoint.com
32
32 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Target Customers Existing Check Point customers Current users of Pointsec / Reflex Companies with Encryption projects Companies embracing mobile working Companies reducing supplier numbers VPN upgrades & competitive upgrades Disgruntled Symantec & McAfee users Customers asking “for that memory stick blocking stuff”
33
33 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Which partners will be most successful? Those who embrace the whole portfolio Partners who invest in the solution technically Partners who understand our licensing Those who work closely with us Partners providing true “value add” Those who make use of our sales tools 6 /10 partners are silver/bronze partners
34
34 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Online Dashboard Instant compliance views
35
35 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Single policy view Simplified security policy
36
36 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. “PC on a stick” Who should use it? Day extenders, consultants, contractors or employees who work from business centres – Anyone that works from unmanaged devices! Disaster recovery solution What is it? secureportabledissolvable A completely secure, portable and dissolvable virtual workspace, includes Check Point endpoint technologies Centrally managed, integrated with Remote Help Available in Q2 2009
37
37 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. **** If Laptops are easy to lose presenting a massive security risk – What about Smart Phones / PDA ’ s? Data Security 2009 ****
38
38 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Any Questions? Ross Baker rossb@checkpoint.com rossb@checkpoint.com Tel – 07796 693466
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.