SlideShare a Scribd company logo
1 of 53
Аюулгүй байдлын зарим бүтээгдэхүүнүүд
TECHNOLOGY IS EVERYWHERE 
The Internet of things BRINGS WITH IT NEW challenges
THREATS BECOME A COMMODITY 
*Source: http://www.forbes.com
Today’s IT Security Challenges 
Growing Security Threats 
Increased Demand in Network Performance 
Simple + Effective = Secured
Check Point Software Technologies 
©2014 Che©c2k0 P14o iCnht eScokf tPwoainrte S Toeftcwhanreo lToegcihenso Llotdgi.es Ltd6 
Corporate Presentation 
August 2014
©2014 Check Point Software Technologies Ltd. 7 
Security Focus and Leadership 
$1.39 Billion (Revenue) 
Software Blades strategy fueling growth 
100% (Security) 
Pure focus on security 
All of Fortune 500 are Check Point customers 
Network Security Leader 
Top Ranked NGFW by NSS Labs, Gartner, SC Magazine 
“Leader” in Gartner Enterprise Firewall, UTM and MDP 
Who should you trust to 
secure your business?
©2014 Check Point Software Technologies Ltd. 8 
Hospital 
record 
update 
Online bank 
balance 
check 
Social 
network 
update 
Supermarket 
checkout 
PDA email 
check 
Credit card 
payment 
ATM 
withdrawal 
Remote data 
backup 
ERP supplier 
catalog 
update 
Opening of a 
new branch 
Setup a 
mobile office 
at a client 
Check 
today’s 
sales orders 
Update this 
year’s 
bonuses 
Log into a 
WiFi hotspot 
Securing Businesses Everywhere
Award Winning Security Products 
©2014 Check Point Software Technologies Ltd. 9 
Best IPS/IDS Product 
Reader Trust 
Award 
2013 
Leader, Magic 
Quadrant Enterprise 
Network Firewall 
2014 
Leader, Magic 
Quadrant Mobile 
Data Protection 
2013 
NGFW Earns 
“Recommend” 
Rating from NSS 
2013 
IPS Earns 
“Recommend” 
Rating from NSS 
2012 
Leader, Magic 
Quadrant - UTM 
2014 
Computing Security 
Awards Security 
Company of the Year 
2012 
Network Security 
Vendor of the Year 
2012 
Firewall Earns 
“Recommend” 
Rating from NSS 
2013 
Best Firewall 
Reader Trust 
Award 
2013
An Ever-Changing Threat Landscape 
Every year threats are becoming MORE 
SOPHISTICATED and MORE FREQUENT 
2014 
©2014 Check Point Software Technologies Ltd. 10 
VIRUSES 
AND 
WORMS 
ADWARE 
AND 
SPYWARE 
DDOS 
APTS 
RANSOMWARE 
HACTIVISM 
STATE SPONSORED 
INDUSTRIAL ESPIONAGE 
NEXT GEN APTS 
(MASS APT TOOLS) 
UTILIZING WEB 
INFRASTRUCTURES (DWS) 
2010 
2007 
2004 
1997 
1,300 
known 
viruses 
50,000 
known 
viruses 
100,000+ 
malware variants 
daily
Networks need protection 
against ALL 
types of threats 
©2014 Check Point Software Technologies Ltd. 11
M A N A G E M E N T L A Y E R 
Integrates security with business 
process 
C O N T R O L L A Y E R 
Delivers real-time protections to the 
enforcement points 
©2014 Check Point Software Technologies Ltd. 12 
Check Point Security 
Unified 
Management 
Threat 
Prevention 
End-to-End 
Next 
Generation Security 
E N F O R C E M E N T L A Y E R 
Inspects traffic and enforces protection 
in well-defined segments 
Built on a comprehensive 
Software-defined Protection (SDP) Architecture
End-to-End Next Generation Security 
Across the Infrastructure 
Mobile Endpoint Network Data Center Cloud 
Firewall IPSec 
VPN 
600 + 1100 21000 series Smart-1 series 
©2014 Check Point Software Technologies Ltd. 13 
Software Blades 
Across ALL Platforms 
2200 
series 
4400 
series 
12000 + 13000 
series 
41000 + 61000 
series 
series 
Mobile 
Access 
Identity 
Awareness 
Application 
Control 
IPS DLP Web 
Security 
URL 
Filtering 
Anti-bot 
Threat 
Emulation 
Antivirus Anti- 
Spam 
Advanced 
Networking 
and Clustering 
VoIP Security 
Gateway 
Virtual 
Edition 
Full Disk 
Encryption 
Smart 
Reporter 
Smart 
Event 
Multi- 
Domain 
Security 
Management 
Advanced 
Networking 
Media 
Encryption 
Remote 
Access 
Anti- 
Malware 
Network 
Policy 
Endpoint 
Policy 
Logging 
and 
Status 
Smart 
Workflow 
Monitoring Management 
Portal 
User 
Directory 
Smart 
Provisioning 
Compliance
©2014 Check Point Software Technologies Ltd. 14 
A cloud based 
collaboration platform, 
translating intelligence 
to protections for 
security Gateways
Over 14 million malware-infested sites & signatures 
©2014 Check Point Software Technologies Ltd. 15 
ThreatCloud At-A-Glance 
Variety of intelligence sources: Check Point research, 
worldwide network of sensors, community analysis & feeds 
Over 250 million addresses analyzed 
500,000 updates every day 
Thousands of gateways
Check Point Research Global Sensor Data Industry Feeds 
Known Known Known Known 
ThreatCloud 
Emulation 
©2014 Check Point Software Technologies Ltd. 16 
Multi-Layer Threat Prevention 
Known and Unknown Malware 
Known 
Unknown 
XXX XXX XXX 
Service
©2014 Check Point Software Technologies Ltd. 17 
Unified Management 
Customized 
Visibility 
Unified 
Policy 
Monitoring 
Best ROI for Management
Consolidated Visibility: 
Next Generation SmartEvent 
 Unified event analysis with 360° visibility across Software Blades 
 High-level view with drill down to policy 
©2014 Check Point Software Technologies Ltd. 18
Next Generation End-to-End Security 
©2014 Check Point Software Technologies Ltd. 19 
Summary 
Multi-Layer Threat Prevention 
Best-in-Class Management 
Check Point: Your Trusted Security Partner
More Security, Additional Power 
About Check Point 
The Security You Want 
The Performance You Need 
[Confidential] For designated groups and individuals 
DLP 
Software Blade 
Application 
Control 
Software Blade 
IPS 
Software Blade 
FW & VPN 
Software Blades 
URL Filtering 
Software Blade 
Antivirus 
Software Blade 
Identity 
Awareness 
Software Blade 
Anti-Bot 
Software Blade 
Security Appliance
INTRODUCING 
Check Point 
Appliances
41000 & 61000 
21000 Appliances 
(3 Models) 
©2014 Check Point Software Technologies Ltd. 22 
Check Point Appliances 
Meeting any security requirement 
4000 Appliances 
(4 Models) 
Enterprise 
2200 Appliance 
1100 Appliances 
(3 models) 
Branch 
Office 
Ultra High End 
13000 Appliance 
(2 Models) 
12000 Appliances 
(3 Models) 
Data Center 
600 Appliances 
(3 models) 
Small 
Office
Top Design Principles 
for Check Point Appliances 
Best Security 
Optimized for 
Software Blades
Appliances From Check Point 
PERFORMANCE New Features & Performance 
SECURITY Consolidate Security 
Optimized for Software Blades 
SCALABILITY Any Business & Environment
Filled with New Features… 
©2014 Check Point Software Technologies Ltd. 25
Big Security for Small Branch Offices 
©2014 Check Point Software Technologies Ltd. 26 
Check Point 1100 
Built for the Branch Office Environment 
Wi-Fi 802.11 b/g/n 
8 x 1GbE LAN Ports 
1GbE DMZ Port 
1GbE WAN Port 
ADSL Modem Port 
RJ45 Console Port 
2 x USB Ports 
Express Card Slot 
SD Memory Slot
©2014 Check Point Software Technologies Ltd. 27 
Check Point 4800 
Built for the Branch Office Environment 
 Variety of network interface expansions 
 Same cards for 4000 and 
12000 appliances 
 Copper and fiber (1GE / 10GE) 
 Out-of-band management (LOM ) 
 8x1GE onboard ports 
 Graphic LCD 
display 
 Hot-swappable 
redundant power 
supplies 
True Serviceability with Rich Connectivity
Designed for The Datacenter 
©2014 Check Point Software Technologies Ltd. 28 
Check Point 12600 
Datacenter-Grade, Robust Performance 
 3 slots for network expansion 
 Copper and fiber (1GE / 10GE) 
 Up to 24 1GE ports/ 12 10GE ports 
 Hot-swappable power 
supply and 
hard drive 
 Out-of-band management (LOM) 
 Graphic LCD display
Wide-Spectrum of Network Interfaces 
 Copper & fiber (1, 10 & 40 GbE ready) 
 Up to 26x1GbE, 12x10GbE 
©2014 Check Point Software Technologies Ltd. 29 
13000 Platform Reliability 
High Manageability 
 Out-of-band management (LOM) 
 Graphic LCD 
 Console, management and USB 
Integrated Redundancy and Serviceability 
 Hot-swap redundant hard drives & fans 
 Hot-swap redundant power supply
©2014 Check Point Software Technologies Ltd. 30 
Scalable Solution 
With wide variety of NIC options 
4 x 10/100/1000BaseT 
4 x 1GbE copper or 
fiber Fail-Open 
4 x 1000BaseF 
8 x 10/100/1000BaseT 
4 x 10GBaseF 
2 x 1000BaseF 
2 x 10GBaseF 
Fail-Open 
2 x 10GBaseF 
Commonly shared NICs with 
4000, 12000 and 13000 appliance 
families 
• Copper and fiber 
(1GE / 10GE) 
• Up to 26 1GE or 12 
10GE ports 
• Fail-Open NIC option
Expansion Options & Accessories 
4200 4400 4600 4800 12200 12400 12600 13000 21000 
©2014 Check Point Software Technologies Ltd. 31 
Expansion 
Base 1xGbE copper 4 8 8 8 8 10 14 14 14 
Expansion slots 1 1 1 1 1 3 3 3 3 
2x1GbE fiber √ √ √ √ √ √ √ √ 
4x1GbE copper √ √ √ √ √ √ √ √ 
4x1GbE copper (FO) √ √ √ √ √ √ √ √ 
4x1GbE fiber √ √ √ √ √ √ √ √ 
4x1GbE fiber (FO) √ √ √ √ √ √ √ √ 
8x1GbE copper √ √ √ √ √ 
12x1GbE copper √ 
12x1GbE fiber √ 
2x10GbE fiber √ √ √ √ √ 
2x10GbE fiber (FO) √ √ √ √ √ 
4x10GbE fiber √ √ √ √ √ 
Hard Drive 1+1 1+1 2 2 2 
Power supply 1+1 1+1 2 2 2 2 
Slide Rails √ √ √ Included Included Included Included Included Included 
Memory Upgrade √ √ √ √ √ √
How About Performance? 
©2014 Check Point Software Technologies Ltd. 32 
[Confidential] For designated groups and individuals 
[Confidential] For designated groups and individuals
3551* 
SPU 
Predictable Real-World Performance 
3200 
SPU 
©2014 Check Point Software Technologies Ltd. 33 
Check Point SecurityPower 
* With Security Acceleration Module 
121 
SPU 
2200 4200 
405 
SPU 
4400 4800 12200 12400 12600 21400 
121 
SPU 
230 
SPU 
673 
SPU 
811 
SPU 
1185 
SPU 
2050 
SPU 
2900* 
SPU 
21700 
3800* 
SPU 
13500 13800 
4600 
37 
SPU 
1100 
4300* 
SPU 
21800
©2014 Check Point Software Technologies Ltd. 34 
More Capacity… 
Connection 
Capacity 
Up to 28 million 
concurrent 
connections* 
* With Memory Upgrade & GAiA OS 
13500 Appliance 
30- 
20- 
10- 
0- 
Million 
Session 
Rate 
Up to 300K 
connections per 
second 
21000 Appliance* 
300- 
200- 
100- 
0- 
Conn/Sec (k) 
* With Security Acceleration Module
SAM-108 Dedicated Acceleration Module for 
©2014 Check Point Software Technologies Ltd. 35 
21K Series 
 Sub 5 μs Firewall latency 
 110 Gbps Firewall throughput 
 50 Gbps VPN throughput 
 60 Million Packets per Second 
 300,000 Connections per Second
Check Point 41000 and 61000 
Ready For Over 1 Terabit Per Second 
©2014 Check Point Software Technologies Ltd. 36 
Secure the 
most demanding 
networks 
Advanced security - Scalable performance 
[Confidential] For designated groups and individuals
Ultra-fast performance for demanding 
environments 
11,000 
SPU 
©2014 Check Point Software Technologies Ltd. 37 
Datacenter Portfolio SecurityPower 
33,000 
SPU 
2,900* 
SPU 
3,300* 
SPU 
3,300 
SPU 
3,550* 
SPU 
21400 21600 13500 21700 41000 61000 
* With SAM acceleration module 
[Confidential] For designated groups and individuals
High Performance Multi-Blade Gateways 
©2014 Check Point Software Technologies Ltd. 38 
[Confidential] For designated groups and individuals 
Size 
Security Power 
Firewall Throughput 
(Production Performance) 
IPS Throughput 
(Production Performance) 
Virtual Systems 
Session Rate 
(Connection/Seconds) 
Concurrent Connections 
41000 
6U 
Up to 11,000 SPU 
Up to 40Gbps 
25Gbps 
Up to 250 
1.1M 
80M 
61000 
14U 
Up to 33,000 SPU 
Up to 120Gbps 
70Gbps 
Up to 250 
3.3M 
240M
61000 
(SSM)160 1-2 1-4 
©2014 Check Point Software Technologies Ltd. 39 
Scalable Performance 
41000 
1-4 1-12 
Security Gateway Module 
(SGM) 260 
Security Switch Module 
Field proven architecture 
[Confidential] For designated groups and individuals
©2014 Check Point Software Technologies Ltd. 40 
Appliances From Check Point 
PERFORMANCE New Features & Performance 
SECURITY Consolidate Security 
Optimized for Software Blades 
SCALABILITY Any Business & Environment 
[Confidential] For designated groups and individuals
©2014 Check Point Software Technologies Ltd. 41 
Optimized for Software Blades 
Any Software Blade You Need 
in Every New Appliance 
Anti-Bot 
Software Blade 
Application 
Control 
Software Blade 
IPS 
Software Blade 
FW & VPN 
Software Blades 
URL Filtering 
Software Blade 
Antivirus 
Software Blade 
Identity 
Awareness 
Software Blade 
1100 2200 4000 12000 13500 21000 
[Confidential] For designated groups and individuals
©2014 Check Point Software Technologies Ltd. 42 
ThreatCloud Emulation Service 
Branch 
Headquarters 
Branch 
Agent for Exchange Server 
ThreatCloud 
Emulation Service 
Single Global Solution – For the Entire Organization 
[Confidential] For designated groups and individuals
Enable Hardware Consolidation 
With Optimal Support of Check Point Virtual Systems 
©2014 Check Point Software Technologies Ltd. 43 
Consolidate Up to 250 Gateways to 
Secure Many Customers & Networks 
Central Management With 
Check Point SM and MDSM 
High Scalability and Full 
Redundancy with VSLS 
[Confidential] For designated groups and individuals 
Check Point 13500
Integrated Solutions 
[Confidential] For designated groups and individuals ©2014 Check Point Software Technologies Ltd. 44
Next 
Generation 
Firewall 
Next Generation 
Threat Prevention 
The Security You Want 
The Performance You Need 
©2014 Check Point Software Technologies Ltd. 45 
More Security 
With 4 Predefined Security Packages 
[Confidential] For designated groups and individuals 
Next Generation 
Secure Web 
Gateway 
Next Generation 
Data Protection 
1100 2200 4000 12000 13500 21000
Pre-Packaged Turn-Key Solutions 
Firewall     
Identity 
    
Awareness 
IPsec VPN     
ADN&C     
Mobile Access    
IPS    
App Control     
DLP  
URL Filtering   
Antivirus   
Anti-Bot  
Anti-Spam  
©2014 Check Point Software Technologies Ltd. 46 
Next 
Generation 
Firewall 
Next Generation 
Threat 
Prevention 
Next Generation 
Secure Web 
Gateway 
Next Generation 
Data Protection 
[Confidential] For designated groups and individuals
High Performance Appliance Packages 
12600 13000 21400 21700 21800 
Next Gen Firewall, Secure Web Gateway, Data Protection and Threat Prevention Packages 
©2014 Check Point Software Technologies Ltd. 47 
On-board 
interfaces 
 2x1GbE 
Copper 
 2x1GbE 
Copper 
 1x1GbE 
Copper 
 1x1GbE 
Copper 
 1x10GbE 
SFP+ 
 SR 
transceiver 
 1x1GbE 
Copper 
 1x10GbE 
SFP+ 
 SR 
transceiver 
Network 
Interface Cards 
included 
 8x1GbE 
Copper 
 4x10Gb SFP+ 
 4xSR 
transceivers 
 8x1GbE 
Copper 
 4x10Gb SFP+ 
 4xSR 
transceivers 
 4x10GbE 
SFP+ (Accel-ready) 
 4xSR 
transceivers 
 4x10GbE 
SFP+ (Accel-ready) 
 4xSR 
transceivers 
 4x10GbE 
SFP+ (Accel-ready) 
 4xSR 
transceivers 
Memory 12GB 64GB 24GB 64GB 64GB 
Security Acceleration Module Package (Additions) 
SAM-108  Yes  Yes  Yes 
SAM-108 
Memory 
 24 GB  24 GB  24 GB 
[Confidential] For designated groups and individuals
Consolidated Management 
©2014 Check Point Software Technologies Ltd. 48 
[Confidential] For designated groups and individuals
Network Security Management 
Single Unified Console for All Security Functions 
©2014 Check Point Software Technologies Ltd. 49 
Centrally Managed 
ONE PLACE 
Control All Security 
Functions
©2014 Check Point Software Technologies Ltd. 50 
Easy Security Status View 
 Security 
Status 
Overview 
 Real-time 
Synopsis 
 Trending 
Analysis
©2014 Check Point Software Technologies Ltd. 51 
Appliances From Check Point 
PERFORMANCE New Features & Performance 
SECURITY Consolidate Security 
Optimized for Software Blades 
SCALABILITY Any Business & Environment
©2014 Check Point Software Technologies Ltd. 52 
Check Point Appliances 
—Securing Any Environment 
Branch Office 
Solution 
Network 
Perimeter 
Internal 
Networks 
Data Center & 
Cloud Security
Thank You 
sales@cisco-mall.com 
solution@cisco-mall.com

More Related Content

What's hot

Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentationdavebrosnan
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportGroup of company MUK
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointNextel S.A.
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point FirewallsBen Rothke
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationnetworkershome
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectRobb Boyd
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewChristine MacDonald
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentMarketingArrowECS_CZ
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPSmmiznoni
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionDejan Jeremic
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 

What's hot (20)

Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
Firewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration ReviewFirewall, Router and Switch Configuration Review
Firewall, Router and Switch Configuration Review
 
Ngfw overview
Ngfw overviewNgfw overview
Ngfw overview
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 

Viewers also liked

Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation SolutionRadware
 
хэрэглээний програмууд ба системийн програмууд
хэрэглээний програмууд ба системийн програмуудхэрэглээний програмууд ба системийн програмууд
хэрэглээний програмууд ба системийн програмуудTsetsenkhuu Otgonbayar
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Securityneoma329
 

Viewers also liked (7)

Spss programmiin talaar
Spss programmiin talaarSpss programmiin talaar
Spss programmiin talaar
 
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
Radware DefensePipe:  Cloud-Based Attack Mitigation SolutionRadware DefensePipe:  Cloud-Based Attack Mitigation Solution
Radware DefensePipe: Cloud-Based Attack Mitigation Solution
 
1017
10171017
1017
 
хэрэглээний програмууд ба системийн програмууд
хэрэглээний програмууд ба системийн програмуудхэрэглээний програмууд ба системийн програмууд
хэрэглээний програмууд ба системийн програмууд
 
Checkpoint r77
Checkpoint r77Checkpoint r77
Checkpoint r77
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 

Similar to Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products

Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overviewRajesh Kapoor
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin RodillasTI Safe
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...NetworkCollaborators
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
Juniper Corporate Presentation
Juniper Corporate PresentationJuniper Corporate Presentation
Juniper Corporate Presentationmauthay
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança Cisco do Brasil
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...Cisco Canada
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Rafael Maranon
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei SymantecUtopia Media
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersPatrick Lopez
 

Similar to Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products (20)

Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Zcom Wireless products application overview
Zcom Wireless products application overviewZcom Wireless products application overview
Zcom Wireless products application overview
 
[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas[CLASS 2014] Palestra Técnica - Delfin Rodillas
[CLASS 2014] Palestra Técnica - Delfin Rodillas
 
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
VMworld 2013: Network Function Virtualization in the Cloud: Case for Enterpri...
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
Network is the Firewall
Network is the FirewallNetwork is the Firewall
Network is the Firewall
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Juniper Corporate Presentation
Juniper Corporate PresentationJuniper Corporate Presentation
Juniper Corporate Presentation
 
Partner Welcome Kit
Partner Welcome KitPartner Welcome Kit
Partner Welcome Kit
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...During the Next Generation Network and Data Centre – Now and into the Future ...
During the Next Generation Network and Data Centre – Now and into the Future ...
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014Scaling the Internet of Things at IoT & WSN Berlin 2014
Scaling the Internet of Things at IoT & WSN Berlin 2014
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
An introduction to Huawei Symantec
An introduction to Huawei SymantecAn introduction to Huawei Symantec
An introduction to Huawei Symantec
 
Edge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalersEdge Computing risks and Opportunities for Telco and hyperscalers
Edge Computing risks and Opportunities for Telco and hyperscalers
 

Recently uploaded

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 

Recently uploaded (20)

What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 

Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products

  • 1. Аюулгүй байдлын зарим бүтээгдэхүүнүүд
  • 2. TECHNOLOGY IS EVERYWHERE The Internet of things BRINGS WITH IT NEW challenges
  • 3. THREATS BECOME A COMMODITY *Source: http://www.forbes.com
  • 4. Today’s IT Security Challenges Growing Security Threats Increased Demand in Network Performance Simple + Effective = Secured
  • 5.
  • 6. Check Point Software Technologies ©2014 Che©c2k0 P14o iCnht eScokf tPwoainrte S Toeftcwhanreo lToegcihenso Llotdgi.es Ltd6 Corporate Presentation August 2014
  • 7. ©2014 Check Point Software Technologies Ltd. 7 Security Focus and Leadership $1.39 Billion (Revenue) Software Blades strategy fueling growth 100% (Security) Pure focus on security All of Fortune 500 are Check Point customers Network Security Leader Top Ranked NGFW by NSS Labs, Gartner, SC Magazine “Leader” in Gartner Enterprise Firewall, UTM and MDP Who should you trust to secure your business?
  • 8. ©2014 Check Point Software Technologies Ltd. 8 Hospital record update Online bank balance check Social network update Supermarket checkout PDA email check Credit card payment ATM withdrawal Remote data backup ERP supplier catalog update Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot Securing Businesses Everywhere
  • 9. Award Winning Security Products ©2014 Check Point Software Technologies Ltd. 9 Best IPS/IDS Product Reader Trust Award 2013 Leader, Magic Quadrant Enterprise Network Firewall 2014 Leader, Magic Quadrant Mobile Data Protection 2013 NGFW Earns “Recommend” Rating from NSS 2013 IPS Earns “Recommend” Rating from NSS 2012 Leader, Magic Quadrant - UTM 2014 Computing Security Awards Security Company of the Year 2012 Network Security Vendor of the Year 2012 Firewall Earns “Recommend” Rating from NSS 2013 Best Firewall Reader Trust Award 2013
  • 10. An Ever-Changing Threat Landscape Every year threats are becoming MORE SOPHISTICATED and MORE FREQUENT 2014 ©2014 Check Point Software Technologies Ltd. 10 VIRUSES AND WORMS ADWARE AND SPYWARE DDOS APTS RANSOMWARE HACTIVISM STATE SPONSORED INDUSTRIAL ESPIONAGE NEXT GEN APTS (MASS APT TOOLS) UTILIZING WEB INFRASTRUCTURES (DWS) 2010 2007 2004 1997 1,300 known viruses 50,000 known viruses 100,000+ malware variants daily
  • 11. Networks need protection against ALL types of threats ©2014 Check Point Software Technologies Ltd. 11
  • 12. M A N A G E M E N T L A Y E R Integrates security with business process C O N T R O L L A Y E R Delivers real-time protections to the enforcement points ©2014 Check Point Software Technologies Ltd. 12 Check Point Security Unified Management Threat Prevention End-to-End Next Generation Security E N F O R C E M E N T L A Y E R Inspects traffic and enforces protection in well-defined segments Built on a comprehensive Software-defined Protection (SDP) Architecture
  • 13. End-to-End Next Generation Security Across the Infrastructure Mobile Endpoint Network Data Center Cloud Firewall IPSec VPN 600 + 1100 21000 series Smart-1 series ©2014 Check Point Software Technologies Ltd. 13 Software Blades Across ALL Platforms 2200 series 4400 series 12000 + 13000 series 41000 + 61000 series series Mobile Access Identity Awareness Application Control IPS DLP Web Security URL Filtering Anti-bot Threat Emulation Antivirus Anti- Spam Advanced Networking and Clustering VoIP Security Gateway Virtual Edition Full Disk Encryption Smart Reporter Smart Event Multi- Domain Security Management Advanced Networking Media Encryption Remote Access Anti- Malware Network Policy Endpoint Policy Logging and Status Smart Workflow Monitoring Management Portal User Directory Smart Provisioning Compliance
  • 14. ©2014 Check Point Software Technologies Ltd. 14 A cloud based collaboration platform, translating intelligence to protections for security Gateways
  • 15. Over 14 million malware-infested sites & signatures ©2014 Check Point Software Technologies Ltd. 15 ThreatCloud At-A-Glance Variety of intelligence sources: Check Point research, worldwide network of sensors, community analysis & feeds Over 250 million addresses analyzed 500,000 updates every day Thousands of gateways
  • 16. Check Point Research Global Sensor Data Industry Feeds Known Known Known Known ThreatCloud Emulation ©2014 Check Point Software Technologies Ltd. 16 Multi-Layer Threat Prevention Known and Unknown Malware Known Unknown XXX XXX XXX Service
  • 17. ©2014 Check Point Software Technologies Ltd. 17 Unified Management Customized Visibility Unified Policy Monitoring Best ROI for Management
  • 18. Consolidated Visibility: Next Generation SmartEvent  Unified event analysis with 360° visibility across Software Blades  High-level view with drill down to policy ©2014 Check Point Software Technologies Ltd. 18
  • 19. Next Generation End-to-End Security ©2014 Check Point Software Technologies Ltd. 19 Summary Multi-Layer Threat Prevention Best-in-Class Management Check Point: Your Trusted Security Partner
  • 20. More Security, Additional Power About Check Point The Security You Want The Performance You Need [Confidential] For designated groups and individuals DLP Software Blade Application Control Software Blade IPS Software Blade FW & VPN Software Blades URL Filtering Software Blade Antivirus Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Security Appliance
  • 22. 41000 & 61000 21000 Appliances (3 Models) ©2014 Check Point Software Technologies Ltd. 22 Check Point Appliances Meeting any security requirement 4000 Appliances (4 Models) Enterprise 2200 Appliance 1100 Appliances (3 models) Branch Office Ultra High End 13000 Appliance (2 Models) 12000 Appliances (3 Models) Data Center 600 Appliances (3 models) Small Office
  • 23. Top Design Principles for Check Point Appliances Best Security Optimized for Software Blades
  • 24. Appliances From Check Point PERFORMANCE New Features & Performance SECURITY Consolidate Security Optimized for Software Blades SCALABILITY Any Business & Environment
  • 25. Filled with New Features… ©2014 Check Point Software Technologies Ltd. 25
  • 26. Big Security for Small Branch Offices ©2014 Check Point Software Technologies Ltd. 26 Check Point 1100 Built for the Branch Office Environment Wi-Fi 802.11 b/g/n 8 x 1GbE LAN Ports 1GbE DMZ Port 1GbE WAN Port ADSL Modem Port RJ45 Console Port 2 x USB Ports Express Card Slot SD Memory Slot
  • 27. ©2014 Check Point Software Technologies Ltd. 27 Check Point 4800 Built for the Branch Office Environment  Variety of network interface expansions  Same cards for 4000 and 12000 appliances  Copper and fiber (1GE / 10GE)  Out-of-band management (LOM )  8x1GE onboard ports  Graphic LCD display  Hot-swappable redundant power supplies True Serviceability with Rich Connectivity
  • 28. Designed for The Datacenter ©2014 Check Point Software Technologies Ltd. 28 Check Point 12600 Datacenter-Grade, Robust Performance  3 slots for network expansion  Copper and fiber (1GE / 10GE)  Up to 24 1GE ports/ 12 10GE ports  Hot-swappable power supply and hard drive  Out-of-band management (LOM)  Graphic LCD display
  • 29. Wide-Spectrum of Network Interfaces  Copper & fiber (1, 10 & 40 GbE ready)  Up to 26x1GbE, 12x10GbE ©2014 Check Point Software Technologies Ltd. 29 13000 Platform Reliability High Manageability  Out-of-band management (LOM)  Graphic LCD  Console, management and USB Integrated Redundancy and Serviceability  Hot-swap redundant hard drives & fans  Hot-swap redundant power supply
  • 30. ©2014 Check Point Software Technologies Ltd. 30 Scalable Solution With wide variety of NIC options 4 x 10/100/1000BaseT 4 x 1GbE copper or fiber Fail-Open 4 x 1000BaseF 8 x 10/100/1000BaseT 4 x 10GBaseF 2 x 1000BaseF 2 x 10GBaseF Fail-Open 2 x 10GBaseF Commonly shared NICs with 4000, 12000 and 13000 appliance families • Copper and fiber (1GE / 10GE) • Up to 26 1GE or 12 10GE ports • Fail-Open NIC option
  • 31. Expansion Options & Accessories 4200 4400 4600 4800 12200 12400 12600 13000 21000 ©2014 Check Point Software Technologies Ltd. 31 Expansion Base 1xGbE copper 4 8 8 8 8 10 14 14 14 Expansion slots 1 1 1 1 1 3 3 3 3 2x1GbE fiber √ √ √ √ √ √ √ √ 4x1GbE copper √ √ √ √ √ √ √ √ 4x1GbE copper (FO) √ √ √ √ √ √ √ √ 4x1GbE fiber √ √ √ √ √ √ √ √ 4x1GbE fiber (FO) √ √ √ √ √ √ √ √ 8x1GbE copper √ √ √ √ √ 12x1GbE copper √ 12x1GbE fiber √ 2x10GbE fiber √ √ √ √ √ 2x10GbE fiber (FO) √ √ √ √ √ 4x10GbE fiber √ √ √ √ √ Hard Drive 1+1 1+1 2 2 2 Power supply 1+1 1+1 2 2 2 2 Slide Rails √ √ √ Included Included Included Included Included Included Memory Upgrade √ √ √ √ √ √
  • 32. How About Performance? ©2014 Check Point Software Technologies Ltd. 32 [Confidential] For designated groups and individuals [Confidential] For designated groups and individuals
  • 33. 3551* SPU Predictable Real-World Performance 3200 SPU ©2014 Check Point Software Technologies Ltd. 33 Check Point SecurityPower * With Security Acceleration Module 121 SPU 2200 4200 405 SPU 4400 4800 12200 12400 12600 21400 121 SPU 230 SPU 673 SPU 811 SPU 1185 SPU 2050 SPU 2900* SPU 21700 3800* SPU 13500 13800 4600 37 SPU 1100 4300* SPU 21800
  • 34. ©2014 Check Point Software Technologies Ltd. 34 More Capacity… Connection Capacity Up to 28 million concurrent connections* * With Memory Upgrade & GAiA OS 13500 Appliance 30- 20- 10- 0- Million Session Rate Up to 300K connections per second 21000 Appliance* 300- 200- 100- 0- Conn/Sec (k) * With Security Acceleration Module
  • 35. SAM-108 Dedicated Acceleration Module for ©2014 Check Point Software Technologies Ltd. 35 21K Series  Sub 5 μs Firewall latency  110 Gbps Firewall throughput  50 Gbps VPN throughput  60 Million Packets per Second  300,000 Connections per Second
  • 36. Check Point 41000 and 61000 Ready For Over 1 Terabit Per Second ©2014 Check Point Software Technologies Ltd. 36 Secure the most demanding networks Advanced security - Scalable performance [Confidential] For designated groups and individuals
  • 37. Ultra-fast performance for demanding environments 11,000 SPU ©2014 Check Point Software Technologies Ltd. 37 Datacenter Portfolio SecurityPower 33,000 SPU 2,900* SPU 3,300* SPU 3,300 SPU 3,550* SPU 21400 21600 13500 21700 41000 61000 * With SAM acceleration module [Confidential] For designated groups and individuals
  • 38. High Performance Multi-Blade Gateways ©2014 Check Point Software Technologies Ltd. 38 [Confidential] For designated groups and individuals Size Security Power Firewall Throughput (Production Performance) IPS Throughput (Production Performance) Virtual Systems Session Rate (Connection/Seconds) Concurrent Connections 41000 6U Up to 11,000 SPU Up to 40Gbps 25Gbps Up to 250 1.1M 80M 61000 14U Up to 33,000 SPU Up to 120Gbps 70Gbps Up to 250 3.3M 240M
  • 39. 61000 (SSM)160 1-2 1-4 ©2014 Check Point Software Technologies Ltd. 39 Scalable Performance 41000 1-4 1-12 Security Gateway Module (SGM) 260 Security Switch Module Field proven architecture [Confidential] For designated groups and individuals
  • 40. ©2014 Check Point Software Technologies Ltd. 40 Appliances From Check Point PERFORMANCE New Features & Performance SECURITY Consolidate Security Optimized for Software Blades SCALABILITY Any Business & Environment [Confidential] For designated groups and individuals
  • 41. ©2014 Check Point Software Technologies Ltd. 41 Optimized for Software Blades Any Software Blade You Need in Every New Appliance Anti-Bot Software Blade Application Control Software Blade IPS Software Blade FW & VPN Software Blades URL Filtering Software Blade Antivirus Software Blade Identity Awareness Software Blade 1100 2200 4000 12000 13500 21000 [Confidential] For designated groups and individuals
  • 42. ©2014 Check Point Software Technologies Ltd. 42 ThreatCloud Emulation Service Branch Headquarters Branch Agent for Exchange Server ThreatCloud Emulation Service Single Global Solution – For the Entire Organization [Confidential] For designated groups and individuals
  • 43. Enable Hardware Consolidation With Optimal Support of Check Point Virtual Systems ©2014 Check Point Software Technologies Ltd. 43 Consolidate Up to 250 Gateways to Secure Many Customers & Networks Central Management With Check Point SM and MDSM High Scalability and Full Redundancy with VSLS [Confidential] For designated groups and individuals Check Point 13500
  • 44. Integrated Solutions [Confidential] For designated groups and individuals ©2014 Check Point Software Technologies Ltd. 44
  • 45. Next Generation Firewall Next Generation Threat Prevention The Security You Want The Performance You Need ©2014 Check Point Software Technologies Ltd. 45 More Security With 4 Predefined Security Packages [Confidential] For designated groups and individuals Next Generation Secure Web Gateway Next Generation Data Protection 1100 2200 4000 12000 13500 21000
  • 46. Pre-Packaged Turn-Key Solutions Firewall     Identity     Awareness IPsec VPN     ADN&C     Mobile Access    IPS    App Control     DLP  URL Filtering   Antivirus   Anti-Bot  Anti-Spam  ©2014 Check Point Software Technologies Ltd. 46 Next Generation Firewall Next Generation Threat Prevention Next Generation Secure Web Gateway Next Generation Data Protection [Confidential] For designated groups and individuals
  • 47. High Performance Appliance Packages 12600 13000 21400 21700 21800 Next Gen Firewall, Secure Web Gateway, Data Protection and Threat Prevention Packages ©2014 Check Point Software Technologies Ltd. 47 On-board interfaces  2x1GbE Copper  2x1GbE Copper  1x1GbE Copper  1x1GbE Copper  1x10GbE SFP+  SR transceiver  1x1GbE Copper  1x10GbE SFP+  SR transceiver Network Interface Cards included  8x1GbE Copper  4x10Gb SFP+  4xSR transceivers  8x1GbE Copper  4x10Gb SFP+  4xSR transceivers  4x10GbE SFP+ (Accel-ready)  4xSR transceivers  4x10GbE SFP+ (Accel-ready)  4xSR transceivers  4x10GbE SFP+ (Accel-ready)  4xSR transceivers Memory 12GB 64GB 24GB 64GB 64GB Security Acceleration Module Package (Additions) SAM-108  Yes  Yes  Yes SAM-108 Memory  24 GB  24 GB  24 GB [Confidential] For designated groups and individuals
  • 48. Consolidated Management ©2014 Check Point Software Technologies Ltd. 48 [Confidential] For designated groups and individuals
  • 49. Network Security Management Single Unified Console for All Security Functions ©2014 Check Point Software Technologies Ltd. 49 Centrally Managed ONE PLACE Control All Security Functions
  • 50. ©2014 Check Point Software Technologies Ltd. 50 Easy Security Status View  Security Status Overview  Real-time Synopsis  Trending Analysis
  • 51. ©2014 Check Point Software Technologies Ltd. 51 Appliances From Check Point PERFORMANCE New Features & Performance SECURITY Consolidate Security Optimized for Software Blades SCALABILITY Any Business & Environment
  • 52. ©2014 Check Point Software Technologies Ltd. 52 Check Point Appliances —Securing Any Environment Branch Office Solution Network Perimeter Internal Networks Data Center & Cloud Security
  • 53. Thank You sales@cisco-mall.com solution@cisco-mall.com

Editor's Notes

  1. Growing Security Threats Sophisticated security solutions are required Increased Demand for Network Performance More Power and higher bandwidth Simple, effective and Manageable Consolidated and scalable security solutions
  2. Network Architecture from existing brand City Represents Enterprise, SMB, and Consumers Global element
  3. 8
  4. 9
  5. Threats have been growing exponentially every year and they are become more intelligent and sophisticated .
  6. Networks need protection against all of these growing threats.
  7. As security has evolved over the years, Check Point has evolved with it. We invented the stateful firewall technology and brought it to market. That became the foundation of all firewalls, traditional and next generation. We then added VPN to our firewall to secure data in transit.   As we saw on the horizon that additional security software would be needed to be integrated into the security gateways, we arrived at a very unique software blade architecture that allowed our customers to add more security technology to the same security gateway without any compromise to security performance. This allowed us to add in integrated access control technologies like application control and URL filtering to safeguard employees from risky sites.   We added data loss prevention to educate and remediate employees on how to safely and securely share corporate documents.   We also provide DDOS protection to ensure that this type of attack doesn’t impact organizations.   We also integrated a compliance blade to our gateways to help organizations easily adhere to regulations and leverage best practice recommendations.   And as companies move their data and services to public, hybrid and private clouds we’re there to protect them with high performance security appliances, cloud security and with security for virtual environments.   Our security now extends from corporate headquarters to remote mobile devices with unified policy management for network and mobile employees. And we offer our gateway appliance solutions to support the smallest of small businesses to the very largest of companies.
  8. Threat intelligence comes from ThreatCloud. In 2012, Check Point established ThreatCloud-- the first collaborative platform to fight cybercrime TC translates threat intelligence into protections to address this very problem. ThreatCloud is the biggest global network to fight cybercrime
  9. As threats have evolved so has our technology. Where threats are concerned, we are all in this fight together. We have created the largest collaborative threat prevention cloud that collects input from 100’s of check point researchers, industry feeds and our own Check Point gateway sensors, the most extensive in geography and deployment. We call it ThreatCloud. Once it collects the intelligence, it translates it into real-time protections that are implemented in the Check Point gateways to stop threats.   We also have created an intelligence marketplace with TC IntelliStore that gives organizations more protection and access to unique intelligence feeds that may be relevant to their industry, geography or specific attack types.   Beyond protecting against the known threats, we have also innovated to build threat emulation technologies so that we can protect you against unknown malware. Today, IPS, Antivirus and Anti-Bot are effective technologies against known malware. But hackers create variants to evade signature-based detection.   To detect these unknown variants and to find zero-day attacks we run the malware in a virtual sandbox to detect and prevent these malicious files. As these unknowns are found and become known, we feed the information to our ThreatCloud and then update other gateways so that all of our customers have the most up to date protection.  
  10. In order to overcome the challenges we need more security functions and this requires much more power from the appliance
  11. These are the design principles when designing Check Point appliances
  12. The 13000 Appliances is a totally scalable platform with a nice variety of network interface options – up to 26 1GbE, 12 -10GbE or (coming soon!) 2 -40 GbE Ports There’s no downtime with Integrated Redundancy and Serviceability --so you don’t have to take the appliance down to swap hard drives, fans or power supplies- they’re all hot-swappable. And it’s very easy to manage with Lights Out Management, a nice graphical LCD display as well as console, management and USB ports.
  13. Check Point offers a full line of security appliances delivering integrated security ranging from the small offices all the way up to the large data centers and high-end enterprises.
  14. Here’s the performances specs of the 21000 with the Security Acceleration Module –you get the famous sub 5 micro seconds of latency perfect for financial institutions, 110Gbps of Firewall, 50Gbps of VPN, 60 million packets per second and a really significant number of connections per second – 300,000!
  15. We are excited to raise the bar even further with the fastest security platform – the Check Point 61000
  16. This slide provides an overview of the datacenter portfolio showing each appliances with its SPU performance. As can be seen the 41000 and the 61000 provides significantly higher performance given their multi-blade architecture.
  17. This slides provide a more detailed comparison between 61000 and 41000. As can be seen typically the performance of the 41000 will be 1/3 of the 61000 given the amount of utilized blades (4 in 41000 v 12 in 61000).
  18. This slide provides a comparison between the 61000 and the 41000. As can be seen the 41000 allows between 1 to 4 Security blades (SGM260) while the 61000 allows between 1 to 12 Security blades (SGM260). In the networking side, 41000 allows between 1 to 2 Switching blades (SSM160) while the 61000 allows between 1 to 4 Switching blades (SSM160)
  19. Threat Emulation is provided as a cloud service. Organizations can set up any gateway running R77 in their environment to inspect incoming files over email or web (HTTP & HTTPS). In case that the file is suspicious – the gateway will send the file to the Threat Emulation Cloud Service for emulation. The cloud service allows the organization to use a global-quota of files that can be inspected, and any security gateway can send files for emulation. We are also introducing an Exchange Agent that can inspect incoming emails on the mail server, and will send files for emulation in the cloud. The exchange agent allows organizations that don’t have Check Point gateways (or not upgrading to R77) to inspect files.
  20. With intensive security power, Virtual Systems also enable hardware consolidation. High End Appliances supports up to 250 virtual systems. SM = Security Management MDSM = Multi-Domain Security Management VSLS = Virtual System Load Sharing
  21. Check Point Appliances support all S/W blades, and offers four pre-defined security packages including Next Generation Firewall, Threat Prevention, Data Protection and Secure-Web Gateway. These security packages allow for protection consolidation per appliance, delivering better performance to protect organizations against modern cyber-attacks.
  22. High Performance hardware package simplifies the purchasing and licensing process, and includes the most typical configuration that customers buy. 1. A 4x10 GBE SFP+ NIC (Acceleration Ready in the 21000 Appliances) 2. 4x4x10 GBE SFP+ transceivers 3. Copper interfaces, depending upon the appliance model 4. And extended memory, also depend on the appliance model
  23. The “SmartEvent Overview Pane” will give you: A high-level view of your overall security status Real-time synopsis of the security environment showing both events’ severity and number of actual events Easy trending analysis and maximum visibility of out-of-ordinary events