SlideShare una empresa de Scribd logo
1 de 34
Check Point R75 makes
3D Security a reality




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone
Boundaries Are Disappearing

              Users Have Different
              Use Different Devices
              WorkShare Anywhere
               Use from Data
                   Internet Tools
                      Needs


        Boundaries
     are disappearing


                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   2
                                                                                                            2
On Complexity and Point-product Sprawl




Your world:
                                     IPS         IPS                  Firewall
And don’t forget
Top network
                             URLURL                                                        VPN
security
endpoint—nearly            Filtering
                              Filtering                                                  VPN
technologies and
doubling the
point products
number of point
products…
deployed
                                                            NAC




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   3
                                                                                                            3
New environment, new challenges




          To secure this new environment,
               IT needs to do more

                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   4
                                                                                                            4
VNISA Survey 2010


 Vietnam ranked fifth among 10 countries at higher risk of
 having its info security breached in 2010
 The 2010 survey shows

  Discovered network security attacks                                                                              33%

  Unaware their network under attacks                                                29%

  Do not understand the motivation behind the attacks             22%




                                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   5
                                                                                                                                 5
Avatar 3D




            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   6
                                                                                                 6
Introducing 4 New Software Blades

           R75 Network Security Suite




CHECK POINT R75 MAKES 3D SECURITY A REALITY BY
 COMBINING POLICIES, PEOPLE AND ENFORCEMENT


                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   7
                                                                                                           7
Who is in my network?




           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   8
                                                                                                8
Typical Network Access
                             Managed                                                          Data Center
                              Assets

                                                                                                  HR Server
                                                    Corporate
                                                     Network
                 Corporate
                                                                                                                 Finance Server
  Contractor      Laptop




                                                                           Data Center
                                                                            Firewall

Guest


                               AD /Directory
        PDA / SmartPhones


                                                                     Perimeter
                                                                     Firewall

                                                                                                      Internet
                                       Web Server Pool
                                           DMZ




                                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   9
                                                                                                                                        9
Typical Network Access
Challenges
                               Managed                                                          Data Center
                                Assets

                                                                                  IP: 10.122.115.8 HR Server
                                                     Corporate                    User: ???????
                                                      Network                     Machine: ??????
                   Corporate
                                                                                                                   Finance Server
    Contractor      Laptop




                                                                             Data Center
                                                                              Firewall
                                                                                                            IP: 192.168.0.99
  Guest                                                                                                     Guest Name:?????

                                 AD /Directory
          PDA / SmartPhones


                                                                       Perimeter
                                                                       Firewall

                                                  IP: 10.222.1.100                                      Internet
                                         Web Server Pool ???????
                                                  User:
                                             DMZ
                                                  Application: ???




                                                     ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 10
                                                                                                                                        10
Typical Network Access Challenges
                               Managed                                                      Data Center
             IP-Based Firewall Policy
                                Assets

                                                                                                HR Server
                                                 Corporate
                                                  Network
                   Corporate
                                                                                                               Finance Server
    Contractor      Laptop




                                                                         Data Center
                                                                          Firewall

  Guest


                                 AD /Directory
          PDA / SmartPhones


                                                                   Perimeter
                                                                   Firewall
            ►Need to identify users based on their access role
                                                             Internet
            ►Need to differentiate between thousands of applications
                                 Web Server Pool
                                     DMZ
            ►Need to segment physical and logical layers of networks


                                                 ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 11
                                                                                                                                    11
INTRODUCING ...
 CHECK POINT IDENTITY AWARENESS




ACCURATE    INTUITIVE                                    FULL
SECURITY   MANAGEMENT                                INTEGRATION



                 ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 12
                                                                                                    12
Identity Aware Access
                             Managed                                                       Data Center
                              Assets
                                                                             IP: 10.122.115.8
                                                                                              HR Server
                                                                             User: John Morgan /
                                                 Corporate                         Finance_Group
                                                  Network
                 Corporate                                                   Machine: John_XP
                                                                                                               Finance Server
  Contractor      Laptop




                                                                        Data Center
                                                                         Firewall
                                                                                                   IP: 192.168.0.99
Guest
                                                                                                   Guest Name: Anna Smith

                               AD /Directory
        PDA / SmartPhones

                                 Identity
                                Awareness                         Perimeter
                                                                  Firewall

                                    +       IP: 10.222.1.100
                                      Web Server Pool Gore /
                                Application
                                            User: Frank
                                          DMZ Marketing_Group
                                                                                                   Internet

                                 Control Application: FaceBook




                                                ©2011 Check Point Software Technologies Ltd.   |    [Unrestricted] For everyone   | 13
                                                                                                                                    13
Identity Sources


                     Captive
  Clientless                                                   Light Agent
                     Portal

     1                 2                                                          3
                   Flexible options to obtain
                         Users’ Identity




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 14
                                                                                                           14
There’s an app for that
    File Storage       Web mails                                     Monitoring

             150
                          40
                                                                               300
    Social Networks    Anonymizers
       Including                                              Instant Messaging
    Apps & Widgets
                                  40

                      Virtual Worlds                                           400

        52000            120                                                    Multimedia

       VOIP           Web Conferencing


       100
                            400                                                      100

                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 15
                                                                                                               15
R75 - The App Control Software Blades


                  World’s largest
       Application Classification Library


                    Over 4,200 applications
                    Over 100,000 social-network
                     widgets
                    Grouped in over 80 categories
                    (including Web 2.0, IM, P2P,
                     Voice & Video, File Share)
                       appwikicheckpoint.com


                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 16
                                                                                                          16
Increase Security - App Control
- Application Detection and Usage Controls




Application Detection
 and Usage Controls




             Identify, allow, block or limit usage of
                    applications at user or group level

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 17
                                                                                                                                17
©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 18
                                                                                   18
Customer Scenario

  Customer expectations                                         Results

 Allow certain applications                        44 apps, 90 users
     to certain groups                          BitTorent, IPTV events
   ―Very useful to see these events – management wants
                                    Defined policy based
        Block P2P
    to warn employees, to make them more productive‖
                                     on actual AD group

     Limit bandwidth                Forwarded the results
   ―We can block BitTorrent – that’s illegal, we could lose
     used by branches                 to management level
    our internet connection.‖
                                                       Retail
                                                       Belgium
                                                       36 Branches
                                                       1,500 users

                                ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 19
                                                                                                                   19
Flexible Deployment Options

              Check Point DLP
              Makes data loss prevention work




                            New R75




                   On Existing Gateways                                     DLP-1
                     or Open Servers




                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 20
                                                                                                                20
People Taking Part in Security




                               EXPLANATION



                                 RESOLUTION



                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 21
                                                                                                          21
Mobile Access Software Blade


      Easy Access to Email and Applications




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 22
                                                                                                            22
Industry-Leading IPS

           CHECK POINT SETS A
         NEW STANDARD IN LATEST
           NSS GROUP IPS TEST

                                          The Check Point
                                          IPS Software Blade
                                          outperformed nearly every
                                          vendor in overall accuracy
                                          and blocking:
                                               97.3% security
                                                effectiveness
                                               Multi-gigabit rated
                                                throughput of 2.4Gbps
                                               100% anti-evasion
                                                coverage


                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 23
                                                                                                          23
Follow the Security LEADERS …

2010: Enterprise LEADER                   2010: UTM LEADER




Leadership via Innovations




                          ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 24
                                                                                                             24
Check Point Endpoint Ranks Highest in Latest VB100 Reactive and
Proactive (RAP) Malware Detection Test
Oct 2010 – Apr 2011




                                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 25
                                                                                                                            25
Get Increased Flexibility and Simplicity
    Segment your Security Management Environment into
               Smaller Virtual Domains

                         Multi Domains




   Perimeter     Corporate        Internal                      DMZ                       Data center
   firewalls     branches        firewalls                   firewalls                     firewalls




                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 26
                                                                                                                 26
Get Increased Flexibility and Simplicity
    Segment your Security Management Environment into
               Smaller Virtual Domains

                         Multi Domains




   Perimeter     Corporate        Internal                      DMZ                       Data center
   firewalls     branches        firewalls                   firewalls                     firewalls




                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 27
                                                                                                                 27
Granular Control of All Security Layers

       IPS




   Mobile




                                                                                     Granular Visibility
   Access




      DLP


                                                                                                           SmartEvent

Application
   Control




   Identity
Awareness




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone        | 28
                                                                                                                    28
Independent Researchers’ Comments
Gartner 2009 - Next Generation Firewalls

    Security Gateway Features
      – Gartner started talking about NGFW in 2005
              Identity Awareness
      – Security Gateways are NGFW and include:
         – Integrated Deep Packet Inspection
              Integrated IPS
         – Application Intelligence
              Integrated DLP
         – Extra firewall intelligence
              Integrated App Control
         – Firewall Policy Management
              Smart WorkFlow
              Multi-Domain Security Management
              Plus more than 30+ software blades

              Leaping Performance

                                 ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 29
                                                                                                                    29
First NSS Labs recommended Award


 Check Point has completed the testing of R75 by NSS
 Labs, achieving 100% in firewall, identity awareness and
 application control enforcement tests—achieving the
 industry's first NSS Labs "Recommend" rating for Next
 Generation Firewalls




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 30
                                                                                                               30
TCP Split Handshake Vulnerability




Forbes.com today:
Check Point the Only Firewall to Pass Latest NSS Test   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 31
                                                                                                                                           31
Check Point 3D Next-Gen Firewall
                                    Application         Identity           Antivirus &
  FW & VPN             IPS             Control       Awareness            Anti-Malware           URL Filtering                DLP
Software Blades   Software Blade   Software Blade   Software Blade       Software Blade         Software Blade           Software Blade




                                                    Power-1

                      SmartEvent Software Blade                                  SmartWorkflow Software Blade
                      Unified Event Analysis                                     Policy Change Management




                                                                                              Smart-1


                     CHECK POINT UNIFIED SECURITY MANAGEMENT
                                                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 32
                                                                                                                                           32
Questions?




             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 33
                                                                                                33
©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 34
                                                                                   34

Más contenido relacionado

La actualidad más candente

Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data CenterCisco Canada
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDRlenlax
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pkslucpaquin
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview Lilian Schaffer
 
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Mundo Contact
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services managementLilian Schaffer
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1changcai
 
CNP Company overview
CNP Company overviewCNP Company overview
CNP Company overviewbwainscott
 
RTI Data-Distribution Service (DDS) Master Class - 2010
RTI Data-Distribution Service (DDS) Master Class - 2010RTI Data-Distribution Service (DDS) Master Class - 2010
RTI Data-Distribution Service (DDS) Master Class - 2010Gerardo Pardo-Castellote
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Managementdavidzucker
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart CompaniesPeter Coffee
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsPankesh Patel
 

La actualidad más candente (17)

Security and Virtualization in the Data Center
Security and Virtualization in the Data CenterSecurity and Virtualization in the Data Center
Security and Virtualization in the Data Center
 
OptiFiber Pro OTDR
OptiFiber Pro OTDROptiFiber Pro OTDR
OptiFiber Pro OTDR
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 
CNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pksCNISP - Platform Introduction 071511pks
CNISP - Platform Introduction 071511pks
 
2nd day 2 - bsm overview
2nd day   2 - bsm overview 2nd day   2 - bsm overview
2nd day 2 - bsm overview
 
JavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFWJavaOne Keynote: Programmable Networking is SFW
JavaOne Keynote: Programmable Networking is SFW
 
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
Comunicaciones Unificadas, Colaboración y Movilidad como Aplicaciones de un C...
 
Day 2 p2 - business services management
Day 2   p2 - business services managementDay 2   p2 - business services management
Day 2 p2 - business services management
 
Cisco Presentation 1
Cisco Presentation 1Cisco Presentation 1
Cisco Presentation 1
 
Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008Guard Era Corp Brochure 2008
Guard Era Corp Brochure 2008
 
CNP Company overview
CNP Company overviewCNP Company overview
CNP Company overview
 
Corporate overview 1.2
Corporate overview 1.2Corporate overview 1.2
Corporate overview 1.2
 
Going to the Cloud
Going to the Cloud Going to the Cloud
Going to the Cloud
 
RTI Data-Distribution Service (DDS) Master Class - 2010
RTI Data-Distribution Service (DDS) Master Class - 2010RTI Data-Distribution Service (DDS) Master Class - 2010
RTI Data-Distribution Service (DDS) Master Class - 2010
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Management
 
Smart Clouds for Smart Companies
Smart Clouds for Smart CompaniesSmart Clouds for Smart Companies
Smart Clouds for Smart Companies
 
Enabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of ThingsEnabling High Level Application Development In The Internet Of Things
Enabling High Level Application Development In The Internet Of Things
 

Similar a Check Point75 Makes3 D Security A Reality Q22011

Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCECenk Ersoy
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityInternap
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012Infoblox
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
IBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsIBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsAlex Amies
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorialLen Bass
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk managementAEC Networks
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Agora Group
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterGeneXus
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfOpenStack Foundation
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance ManagementRiverbed Technology
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityPiyush Mittal
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 PredictionsFlexera
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4EnterpriseGRC Solutions, Inc.
 

Similar a Check Point75 Makes3 D Security A Reality Q22011 (20)

DirectAccess
DirectAccessDirectAccess
DirectAccess
 
Cloud Computing and VCE
Cloud Computing and VCECloud Computing and VCE
Cloud Computing and VCE
 
Cloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. RealityCloud Security: Perception Vs. Reality
Cloud Security: Perception Vs. Reality
 
WinWire_azure_session
WinWire_azure_sessionWinWire_azure_session
WinWire_azure_session
 
Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012Cloud Computing Technology Overview 2012
Cloud Computing Technology Overview 2012
 
Education webinar april 2012
Education webinar april 2012Education webinar april 2012
Education webinar april 2012
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
IBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational SolutionsIBM SmartCloudEnterprise use of IBM Rational Solutions
IBM SmartCloudEnterprise use of IBM Rational Solutions
 
WICSA 2012 tutorial
WICSA 2012 tutorialWICSA 2012 tutorial
WICSA 2012 tutorial
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Juniper Provision - 13martie2012
Juniper Provision - 13martie2012Juniper Provision - 13martie2012
Juniper Provision - 13martie2012
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Oracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao DatacenterOracle - Soluções do device ao Datacenter
Oracle - Soluções do device ao Datacenter
 
Integrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdfIntegrating network virtualization security in OpenStack Deployments.pdf
Integrating network virtualization security in OpenStack Deployments.pdf
 
Application-Aware Network Performance Management
Application-Aware Network Performance ManagementApplication-Aware Network Performance Management
Application-Aware Network Performance Management
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions2010 Software Licensing and Pricing Survey Results and 2011 Predictions
2010 Software Licensing and Pricing Survey Results and 2011 Predictions
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
 
NFV SDN for carriers
NFV SDN for carriersNFV SDN for carriers
NFV SDN for carriers
 

Último

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Check Point75 Makes3 D Security A Reality Q22011

  • 1. Check Point R75 makes 3D Security a reality ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  • 2. Boundaries Are Disappearing Users Have Different Use Different Devices WorkShare Anywhere Use from Data Internet Tools Needs Boundaries are disappearing ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2
  • 3. On Complexity and Point-product Sprawl Your world: IPS IPS Firewall And don’t forget Top network URLURL VPN security endpoint—nearly Filtering Filtering VPN technologies and doubling the point products number of point products… deployed NAC ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3
  • 4. New environment, new challenges To secure this new environment, IT needs to do more ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4
  • 5. VNISA Survey 2010  Vietnam ranked fifth among 10 countries at higher risk of having its info security breached in 2010  The 2010 survey shows Discovered network security attacks 33% Unaware their network under attacks 29% Do not understand the motivation behind the attacks 22% ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5
  • 6. Avatar 3D ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6
  • 7. Introducing 4 New Software Blades R75 Network Security Suite CHECK POINT R75 MAKES 3D SECURITY A REALITY BY COMBINING POLICIES, PEOPLE AND ENFORCEMENT ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7
  • 8. Who is in my network? ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8
  • 9. Typical Network Access Managed Data Center Assets HR Server Corporate Network Corporate Finance Server Contractor Laptop Data Center Firewall Guest AD /Directory PDA / SmartPhones Perimeter Firewall Internet Web Server Pool DMZ ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9
  • 10. Typical Network Access Challenges Managed Data Center Assets IP: 10.122.115.8 HR Server Corporate User: ??????? Network Machine: ?????? Corporate Finance Server Contractor Laptop Data Center Firewall IP: 192.168.0.99 Guest Guest Name:????? AD /Directory PDA / SmartPhones Perimeter Firewall IP: 10.222.1.100 Internet Web Server Pool ??????? User: DMZ Application: ??? ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10
  • 11. Typical Network Access Challenges Managed Data Center IP-Based Firewall Policy Assets HR Server Corporate Network Corporate Finance Server Contractor Laptop Data Center Firewall Guest AD /Directory PDA / SmartPhones Perimeter Firewall ►Need to identify users based on their access role Internet ►Need to differentiate between thousands of applications Web Server Pool DMZ ►Need to segment physical and logical layers of networks ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11
  • 12. INTRODUCING ... CHECK POINT IDENTITY AWARENESS ACCURATE INTUITIVE FULL SECURITY MANAGEMENT INTEGRATION ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12
  • 13. Identity Aware Access Managed Data Center Assets IP: 10.122.115.8 HR Server User: John Morgan / Corporate Finance_Group Network Corporate Machine: John_XP Finance Server Contractor Laptop Data Center Firewall IP: 192.168.0.99 Guest Guest Name: Anna Smith AD /Directory PDA / SmartPhones Identity Awareness Perimeter Firewall + IP: 10.222.1.100 Web Server Pool Gore / Application User: Frank DMZ Marketing_Group Internet Control Application: FaceBook ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13
  • 14. Identity Sources Captive Clientless Light Agent Portal 1 2 3 Flexible options to obtain Users’ Identity ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14
  • 15. There’s an app for that File Storage Web mails Monitoring 150 40 300 Social Networks Anonymizers Including Instant Messaging Apps & Widgets 40 Virtual Worlds 400 52000 120 Multimedia VOIP Web Conferencing 100 400 100 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15
  • 16. R75 - The App Control Software Blades World’s largest Application Classification Library  Over 4,200 applications  Over 100,000 social-network widgets  Grouped in over 80 categories  (including Web 2.0, IM, P2P, Voice & Video, File Share) appwikicheckpoint.com ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16
  • 17. Increase Security - App Control - Application Detection and Usage Controls Application Detection and Usage Controls Identify, allow, block or limit usage of applications at user or group level ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17 17
  • 18. ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18
  • 19. Customer Scenario Customer expectations Results Allow certain applications 44 apps, 90 users to certain groups BitTorent, IPTV events ―Very useful to see these events – management wants Defined policy based Block P2P to warn employees, to make them more productive‖ on actual AD group Limit bandwidth Forwarded the results ―We can block BitTorrent – that’s illegal, we could lose used by branches to management level our internet connection.‖ Retail Belgium 36 Branches 1,500 users ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19 19
  • 20. Flexible Deployment Options Check Point DLP Makes data loss prevention work New R75 On Existing Gateways DLP-1 or Open Servers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20
  • 21. People Taking Part in Security EXPLANATION RESOLUTION ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21
  • 22. Mobile Access Software Blade Easy Access to Email and Applications ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22
  • 23. Industry-Leading IPS CHECK POINT SETS A NEW STANDARD IN LATEST NSS GROUP IPS TEST The Check Point IPS Software Blade outperformed nearly every vendor in overall accuracy and blocking:  97.3% security effectiveness  Multi-gigabit rated throughput of 2.4Gbps  100% anti-evasion coverage ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23
  • 24. Follow the Security LEADERS … 2010: Enterprise LEADER 2010: UTM LEADER Leadership via Innovations ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24
  • 25. Check Point Endpoint Ranks Highest in Latest VB100 Reactive and Proactive (RAP) Malware Detection Test Oct 2010 – Apr 2011 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25
  • 26. Get Increased Flexibility and Simplicity Segment your Security Management Environment into Smaller Virtual Domains Multi Domains Perimeter Corporate Internal DMZ Data center firewalls branches firewalls firewalls firewalls ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26 26
  • 27. Get Increased Flexibility and Simplicity Segment your Security Management Environment into Smaller Virtual Domains Multi Domains Perimeter Corporate Internal DMZ Data center firewalls branches firewalls firewalls firewalls ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27
  • 28. Granular Control of All Security Layers IPS Mobile Granular Visibility Access DLP SmartEvent Application Control Identity Awareness ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28
  • 29. Independent Researchers’ Comments Gartner 2009 - Next Generation Firewalls  Security Gateway Features – Gartner started talking about NGFW in 2005 Identity Awareness – Security Gateways are NGFW and include: – Integrated Deep Packet Inspection Integrated IPS – Application Intelligence Integrated DLP – Extra firewall intelligence Integrated App Control – Firewall Policy Management Smart WorkFlow Multi-Domain Security Management Plus more than 30+ software blades Leaping Performance ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29 29
  • 30. First NSS Labs recommended Award  Check Point has completed the testing of R75 by NSS Labs, achieving 100% in firewall, identity awareness and application control enforcement tests—achieving the industry's first NSS Labs "Recommend" rating for Next Generation Firewalls ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 30 30
  • 31. TCP Split Handshake Vulnerability Forbes.com today: Check Point the Only Firewall to Pass Latest NSS Test ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 31 31
  • 32. Check Point 3D Next-Gen Firewall Application Identity Antivirus & FW & VPN IPS Control Awareness Anti-Malware URL Filtering DLP Software Blades Software Blade Software Blade Software Blade Software Blade Software Blade Software Blade Power-1 SmartEvent Software Blade SmartWorkflow Software Blade Unified Event Analysis Policy Change Management Smart-1 CHECK POINT UNIFIED SECURITY MANAGEMENT ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 32 32
  • 33. Questions? ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 33 33
  • 34. ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 34 34

Notas del editor

  1. It’s a free world – We work from anywhere (and with different devices)Doing different things (our roles and responsibilities differ, and are frequently changing)With different people (inside and outside the organization, sharing data – consultants, contractors)Using different tools (Internet tools)Personal is mixed with businessOur work environment is dynamic – the organization’s boundaries are disappearing:Physical and logical boundaries no longer matter, they’re dissolvingDynamicDiverseFree
  2. People Link: http://www.istockphoto.com/stock-photo-4562183-business-team-standing.phpLaptop:http://www.istockphoto.com/stock-illustration-12292351-laptop.php
  3. Wurth BeLux
  4. Flexible options On exising SPLAT based gateways
  5. People Link: http://www.istockphoto.com/stock-photo-4562183-business-team-standing.phpLaptop:http://www.istockphoto.com/stock-illustration-12292351-laptop.php
  6. Security management in today’s environment is not easy. Administrators need to manage and handle multiple security GWs
  7. Security management in today’s environment is not easy. Administrators need to manage and handle multiple security GWs