SlideShare una empresa de Scribd logo
1 de 30
Security in the cloud:
Check Point security for virtual environments




 Petr Kadrmas <pkadrmas@checkpoint.com>
 SE Eastern Europe

                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone
Agenda



    1    Virtualization and Security

    2    Private Cloud Security

    3    Public Cloud Security

    4    Check Point SMB Cloud




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   2
                                                                                                             2
On Data Center Consolidation


                                    Private cloud1
                              28% have one         30% plan one


                                                                                   CIOs will virtualize
                                                                                    55% of production
                                                                                 servers next year, up
                                                                                  from 42% this year2




1   Information Week, June 2010
2   Morgan Stanley, June 2010

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   3
                                                                                                                                  3
On Cloud Computing

Top concerns with private clouds
What are your greatest concerns about deploying and managing them?


  Loss of control                                                                           80%

  Data security                                                               76%

  Data portability and ownership                                         73%

  Regulatory compliance                               62%

  Reliability                                       60%
                                                                                    Morgan Stanley
                                                                              2010 CIO Cloud Survey

                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   4
                                                                                                                        4
Enterprise Virtualization Initiatives

Top Security Challenges for Server Virtualization
What are the biggest security challenges preventing server virtualization in your
enterprise?


Lack of skills in security team                                                                    36%


Cost of new information security solutions                      28%
                                                                                      Lack of knowledge
Can’t port existing security tools from physical                                      in security teams
                                                              26%
to virtual world                                                                      remains the
                                                                                      biggest challenge
Lack of security best practices for server
virtualization
                                                      24%                             in moving to
                                                                                      virtualized
Regulatory compliance issues                           24%                            environments.

                                                                            Enterprise Strategy Group
                                                               2010 Survey of enterprise decision makers

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   5
                                                                                                                                  5
Agenda

    1    Virtualization and Security

         Private Cloud Security
            • Secure Dynamic Cloud
    2       • Security Gateway Virtual Edition



    3    Public Cloud Security

    4    Check Point SMB Cloud




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   6
                                                                                                                 6
Private Cloud - Security Needs

                                     Protection from external threats


                                             Inspect traffic between
                                             Virtual Machines (VMs)

                                       Secure new Virtual Machines
                                              automatically




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   7
                                                                                                            7
Private Cloud - Security Needs

                                       Protection from external threats


                                               Inspect traffic between
                                               Virtual Machines (VMs)

                                         Secure new Virtual Machines
                                                automatically
  VM      VM        VM

       Hypervisor




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   8
                                                                                                              8
Private Cloud - Security Needs

                                     Protection from external threats


                                             Inspect traffic between
                                             Virtual Machines (VMs)

                                       Secure new Virtual Machines
                                              automatically

                                         Ensure Security in dynamic
                                               environment




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   9
                                                                                                            9
Introducing Check Point
Security Gateway Virtual Edition (VE)


    Check Point Secures the Private Cloud

    Check Point
  Security Gateway
   Virtual Edition                  Best Virtual Security Gateway



                                    Securing the Virtual Machines


                                        Unified Management for
                                         Physical and Virtual



                           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 10
                                                                                                              10
Virtual Edition Features

      Best Security

                                      Check Point
                                  Security Gateway
►   All Software Blades           Virtual Edition (VE)                                Firewall
                                                                                          VPN
►   Flexible Security                                                                        IPS
                                                                                          Antivirus




                                                                   VE          VM               VM

                                                                 Hypervisor Connector

                                                                         Hypervisor




                          ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 11
                                                                                                             11
Virtual Edition Features

      Best Security            VMs Protection
                                                                             VM                           VM


                          ►   Securing New VMs
►   All Software Blades       Automatically

►   Flexible Security     ►   Secure Dynamic
                              Environment



                                                                               VE          VM               VM



                                                                             Hypervisor Connector
       Inspecting Inter-VM Traffic                                                   Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 12
                                                                                                                         12
Virtual Edition Features

      Best Security            VMs Protection


                          ►   Securing New VMs
►   All Software Blades       Automatically

►   Flexible security     ►   Secure Dynamic
                              Environment



                                                                               VE          VM               VM



                                                                             Hypervisor Connector

                                                                                     Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 13
                                                                                                                         13
Virtual Edition Features

      Best Security            VMs Protection                           Unified Management



                          ►   Securing New VMs                         ►   Same management for
►   All Software Blades       Automatically                                Physical and Virtual
►   Flexible security     ►   Secure Dynamic
                              Environment                              ►   Virtualize the Management




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 14
                                                                                                                         14
Virtual Edition Features

      Best Security            VMs Protection                           Unified Management



                          ►   Securing New VMs                         ►   Same management for
►   All Software Blades       Automatically                                Physical and Virtual
►   Flexible security     ►   Secure Dynamic
                              Environment                              ►   Virtualize the Management




                                                                                          VM              VM



                                                                           Hypervisor Connector

                                                                                     Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.    |   [Unrestricted] For everyone   | 15
                                                                                                                          15
Agenda


    1    Virtualization and Security

    2    Private Cloud Security

         Public Cloud Security
            • Multitenancy Security
    3       • Check Point Solution



    4    Check Point SMB Cloud




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 16
                                                                                                               16
Cloud Providers – Security Needs

    Multitenancy: Servicing Multiple Customers
           From the Same Environment


                                                                    Secure
                                                                connection to the
                                                                     Cloud
                 Cloud
                                                                   Security of the
                                                                      Cloud


                                                                   Security within
                                                                     the Cloud



                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 17
                                                                                                            17
Check Point Cloud Security

   Check Point Secures the Public Clouds

              VPN-1 Power VSX for secure connectivity with the
              Public Cloud




              Secured VMs and Inter-VMs connection with
              Security Gateway Virtual Edition



              Multi-tenancy management and customized
              policy via Multi-Domain Management


                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 18
                                                                                                            18
VPN-1 Power VSX
“Making it Virtual”



                 Physical                                    Virtual

        VPN-1 Firewall Module                  Virtual System (VS)


        VPN-1 Firewall Module in               Virtual System in Bridge
        Bridge mode                            mode


        IP Router                              Virtual Router (VR)


        Switch                                 Virtual Switch (V-SW)


        Network Cable                          Virtual Cable (warp link)




                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 19
                                                                                                                      19
How does it work ?

      Each Virtual System is a unique routing and security
      domain featuring most Firewall and VPN-1 Power
      functionality.


      Each Virtual System has its own:
               Security and VPN Policy
               Configuration Parameters
               Interfaces and Links
               Secure Internal Communication Certificate



      Packets arriving to a VSX gateway are routed to the relevant
      firewall based on incoming interface, source or destination
      IP Address


                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 20
                                                                                                                     20
Security Virtualization Benefits
                                         Consolidation
                    Cost reduction
                    The simplest management for consolidated
                     environments



                           Multi- Customers Tenancy
                    Servicing multiple customers on a single system
                    Dedicated management & policy per customer
                    Add-on services per virtual system (IPS, URLF)


                                             Scalability
                    Adding more Virtual Systems without
                     additional hardware
                    Unique offering of linear performance scale-up
                     with additional hardware


                           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 21
                                                                                                              21
Check Point
Multi-Domain Security Management

      Check Point Eases the Way to Multi-Domain
                Security Management


                        Maximize security by segmenting
                         management in virtual domains


                                Achieve better security
                            with consistent global policies


                        Deploy multi-domain management
                             simply and affordably



                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 22
                                                                                                           22
Get Increased Flexibility and Control
     Segment your Security Management Environment into
                     Virtual Domains

                         Multi Domains




   Customer A    Customer B   Customer C                  Customer D                     Customer E




                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 23
                                                                                                                 23
Agenda


    1    Virtualization and Security

    2    Private Cloud Security

    3    Public Cloud Security

    4    Check Point SMB Cloud




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 24
                                                                                                            24
Main SMB Security Challenges

           Running Your Business
           While Keeping Up With:

         Growing complexity in protecting your network
         and data


         Evolving and more sophisticated security threats


         Increasing budget pressure and unpredictable
         security expenses

                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 25
                                                                                                            25
Check Point Cloud
  Management Services
                                                                 Check Point
                                                              Central Management




                 Firewall    URL Filtering


                 Check Point
                 VPN         Intrusion Prevention (IPS)

                 Antivirus   Logging & Reporting
             Security Management
                 Anti-Spam
                                                                                   Best Ongoing
                                                                                    Protection


  Your                                                                         Expert Management
Business



                                                                                    24x7 Support
                                                                                      Services


           Protecting Your Business, Optimizing
            Performance, Uptime and Flexibility
                                ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 26
                                                                                                                   26
Simple to Start




   1. Determine # of users
   2. Choose connection type                       1. Activate service
   3. Select protection package



                    Set It and Forget It!


                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 27
                                                                                                                     27
Cost-Effective Offerings

      Two All-in-One Packages to Choose From:

            Standard                                            Premium


     Firewall                                   Standard package
     VPN                                                            +
     Software Updates                              Intrusion Prevention (IPS)
     Logging & Reporting                           Antivirus
     Management Services                           Anti-Spam
     24x7 Support Services                         URL Filtering




Starts at $19 /month!                    Starts at $33 /month!

                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 28
                                                                                                                 28
Summary

Check Point provides effective Cloud Security
            for every enviromnet

                 Virtual Security Gateway For Multi-Tenant
                            Cloud Environments


                        Best Hypervisor security for Virtual
                                   Machines



                             Cloud Managed Security for SMB




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 29
                                                                                                           29
Thank You




            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone

Más contenido relacionado

Más de ASBIS SK

DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
ASBIS SK
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
ASBIS SK
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
ASBIS SK
 

Más de ASBIS SK (20)

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
VMware world news
VMware world newsVMware world news
VMware world news
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Check Point prináša efektívne riešenie bezpečnosti pre súkromné aj verejné cloud prostredie

  • 1. Security in the cloud: Check Point security for virtual environments Petr Kadrmas <pkadrmas@checkpoint.com> SE Eastern Europe ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  • 2. Agenda 1 Virtualization and Security 2 Private Cloud Security 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2
  • 3. On Data Center Consolidation Private cloud1 28% have one 30% plan one CIOs will virtualize 55% of production servers next year, up from 42% this year2 1 Information Week, June 2010 2 Morgan Stanley, June 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3
  • 4. On Cloud Computing Top concerns with private clouds What are your greatest concerns about deploying and managing them? Loss of control 80% Data security 76% Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Morgan Stanley 2010 CIO Cloud Survey ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4
  • 5. Enterprise Virtualization Initiatives Top Security Challenges for Server Virtualization What are the biggest security challenges preventing server virtualization in your enterprise? Lack of skills in security team 36% Cost of new information security solutions 28% Lack of knowledge Can’t port existing security tools from physical in security teams 26% to virtual world remains the biggest challenge Lack of security best practices for server virtualization 24% in moving to virtualized Regulatory compliance issues 24% environments. Enterprise Strategy Group 2010 Survey of enterprise decision makers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5
  • 6. Agenda 1 Virtualization and Security Private Cloud Security • Secure Dynamic Cloud 2 • Security Gateway Virtual Edition 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6
  • 7. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7
  • 8. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically VM VM VM Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8
  • 9. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically Ensure Security in dynamic environment ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9
  • 10. Introducing Check Point Security Gateway Virtual Edition (VE) Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10
  • 11. Virtual Edition Features Best Security Check Point Security Gateway ► All Software Blades Virtual Edition (VE) Firewall VPN ► Flexible Security IPS Antivirus VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11
  • 12. Virtual Edition Features Best Security VMs Protection VM VM ► Securing New VMs ► All Software Blades Automatically ► Flexible Security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Inspecting Inter-VM Traffic Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12
  • 13. Virtual Edition Features Best Security VMs Protection ► Securing New VMs ► All Software Blades Automatically ► Flexible security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13
  • 14. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for ► All Software Blades Automatically Physical and Virtual ► Flexible security ► Secure Dynamic Environment ► Virtualize the Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14
  • 15. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for ► All Software Blades Automatically Physical and Virtual ► Flexible security ► Secure Dynamic Environment ► Virtualize the Management VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15
  • 16. Agenda 1 Virtualization and Security 2 Private Cloud Security Public Cloud Security • Multitenancy Security 3 • Check Point Solution 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16
  • 17. Cloud Providers – Security Needs Multitenancy: Servicing Multiple Customers From the Same Environment Secure connection to the Cloud Cloud Security of the Cloud Security within the Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17 17
  • 18. Check Point Cloud Security Check Point Secures the Public Clouds VPN-1 Power VSX for secure connectivity with the Public Cloud Secured VMs and Inter-VMs connection with Security Gateway Virtual Edition Multi-tenancy management and customized policy via Multi-Domain Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18
  • 19. VPN-1 Power VSX “Making it Virtual” Physical Virtual VPN-1 Firewall Module Virtual System (VS) VPN-1 Firewall Module in Virtual System in Bridge Bridge mode mode IP Router Virtual Router (VR) Switch Virtual Switch (V-SW) Network Cable Virtual Cable (warp link) ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19 19
  • 20. How does it work ? Each Virtual System is a unique routing and security domain featuring most Firewall and VPN-1 Power functionality. Each Virtual System has its own: Security and VPN Policy Configuration Parameters Interfaces and Links Secure Internal Communication Certificate Packets arriving to a VSX gateway are routed to the relevant firewall based on incoming interface, source or destination IP Address ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20
  • 21. Security Virtualization Benefits Consolidation  Cost reduction  The simplest management for consolidated environments Multi- Customers Tenancy  Servicing multiple customers on a single system  Dedicated management & policy per customer  Add-on services per virtual system (IPS, URLF) Scalability  Adding more Virtual Systems without additional hardware  Unique offering of linear performance scale-up with additional hardware ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21
  • 22. Check Point Multi-Domain Security Management Check Point Eases the Way to Multi-Domain Security Management Maximize security by segmenting management in virtual domains Achieve better security with consistent global policies Deploy multi-domain management simply and affordably ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22
  • 23. Get Increased Flexibility and Control Segment your Security Management Environment into Virtual Domains Multi Domains Customer A Customer B Customer C Customer D Customer E ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23
  • 24. Agenda 1 Virtualization and Security 2 Private Cloud Security 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24
  • 25. Main SMB Security Challenges Running Your Business While Keeping Up With: Growing complexity in protecting your network and data Evolving and more sophisticated security threats Increasing budget pressure and unpredictable security expenses ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25
  • 26. Check Point Cloud Management Services Check Point Central Management Firewall URL Filtering Check Point VPN Intrusion Prevention (IPS) Antivirus Logging & Reporting Security Management Anti-Spam Best Ongoing Protection Your Expert Management Business 24x7 Support Services Protecting Your Business, Optimizing Performance, Uptime and Flexibility ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26 26
  • 27. Simple to Start 1. Determine # of users 2. Choose connection type 1. Activate service 3. Select protection package Set It and Forget It! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27
  • 28. Cost-Effective Offerings Two All-in-One Packages to Choose From: Standard Premium  Firewall  Standard package  VPN +  Software Updates  Intrusion Prevention (IPS)  Logging & Reporting  Antivirus  Management Services  Anti-Spam  24x7 Support Services  URL Filtering Starts at $19 /month! Starts at $33 /month! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28
  • 29. Summary Check Point provides effective Cloud Security for every enviromnet Virtual Security Gateway For Multi-Tenant Cloud Environments Best Hypervisor security for Virtual Machines Cloud Managed Security for SMB ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29 29
  • 30. Thank You ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone