Presentation is loading. Please wait.

Presentation is loading. Please wait.

[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.

Similar presentations


Presentation on theme: "[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette."— Presentation transcript:

1 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette Sultan

2 2 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. We listened to you Customer advisory board 50 interviews Both enterprises and SMBs

3 3 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. pressure to keep things simple, manageable pressure to reduce TCO changing business environment evolving threats security infrastructure Torn in multiple directions

4 4 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. The obvious feedback my business #1 you want to be secure

5 5 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want Freedom to add protections as you need them

6 6 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… WITHOUT HAVING TO: worry about performance issues, worry availability issues

7 7 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… WITHOUT HAVING TO: pay for them before you actually need them

8 8 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… pay for another full solution, instead of leveraging existing infrastructure WITHOUT HAVING TO:

9 9 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… take on board yet another vendor with yet another point solution WITHOUT HAVING TO:

10 10 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.

11 11 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want to SCALE UP CONSOLIDATE MIGRATE MOVE THINGS AROUND CHANGE OPTIMIZE RE-ALLOCATE

12 12 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to rethink the architecture for every single vendor WITHOUT HAVING TO:

13 13 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to change your people organization because technology requires you WITHOUT HAVING TO:

14 14 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to Worry that you might compromise security in the process WITHOUT HAVING TO:

15 15 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.

16 16 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want to stay in control Keep the solution simple Without the need to compromise security now… …or give up on future flexibility

17 17 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. What the customer wants totalsecurity flexiblesecurity simplesecurity Total security across all enforcement points Simple deployment, upgrade, management and business model To pick the right building blocks, at the right time with the right performance

18 18 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. 2009 provides flexibility and further simplicity GatewayEndpointManagement softwareblades from Check Point totalsecurity from Check Point

19 19 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A software blade is a security building block

20 20 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. How does it work? Select a containerSelect the bladesConfigure the system

21 21 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Two options to construct your solution Option 1: A La Carte Option 2: Pre-Defined Systems* SG103 1 core 3 blades SG407 4 cores 7 blades SG805 8 cores 5 blades *Examples

22 22 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Custom configuration Medium businessEnterprise 10,000s of users 100s of offices Many applications 100s of users 10s of offices Few applications

23 23 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Many customers do not turn on IPS due to performance concerns Check Point enables full IPS utilization 1. Activate IPS blade 2. Activate Acceleration blade 3. Set guaranteed performance levels Performance Example: The performance to use full IPS

24 24 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A library of software blades NETWORKMANAGEMENTENDPOINT

25 25 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. With software blades – new functionality Extend your existing security infrastructure IPS VoIP Acceleration Provisioning IPS Event Analysis

26 26 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business

27 27 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores)

28 28 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN blade @ $1,500

29 29 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN blade @ $1,500 Congested internet connection Acceleration blade @ 1,500

30 30 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN blade @ $1,500 Congested internet connection Acceleration blade @ $1,500 Threat of targeted attacks IPS blade @ $3,000

31 31 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: consolidation

32 32 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. IPS Firewall A scenario: consolidation Firewall Internet Firewall AV Web Security Firewall VPN Branch HQ Branch VPN IPS VPN AV Web Security AV Anti-spam Advance Networking Acceleration IPS

33 33 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. HQ SG805 A scenario: consolidation Branch SG207 Branch SG407 Internet Branch UTM-1 276 Branch SG106

34 34 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Your choice softwareblades from Check Pointmultiple point solutions / vendors multiple projects dedicated hardware dedicated management one project multiple configurations single management lower investment lower TCO

35 35 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. softwareblades from Check Point SecureFlexibleSimple

36 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Thank you


Download ppt "[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette."

Similar presentations


Ads by Google