Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael.

Similar presentations


Presentation on theme: "©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael."— Presentation transcript:

1 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael Amselem Head of Sales Europe Data Security and protection

2 2 2©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Market Trends 2 R80 – Manage Your users 3 Success stories

3 3 3©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Market Trends IDC World Wide Enterprise Endpoint Security forecast Total Market Estimation in 2010/11: $2.8B -$3.1B CAGR: +20.2% CAGR: -8.5% CAGR: +12.6% CAGR: +10.7%

4 4 4©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Top 10 Trends of 2011 Cloud Computing Virtualization Threat Landscape IT Consumerization Consolidation & Complexity Data Security and Loss Web 2.0 & Social Media Governance, Risk & Compliance (GRC) Cost Reduction Green IT

5 5 5©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2011 Security Trends Threat Landscape 44

6 6 6©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Today’s Threat LandscapeIncreasingSophistication  Multi-vector  Polymorphic  Blended and multi-variant

7 7 7©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2011 Security Trends Consolidation and Complexity 55

8 8 8©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | InformationWeek 2010 Survey of security decision makers Biggest IT Security Challenges Which of the following are the biggest information/network security challenges facing your company? Managing the complexity of security 51% Enforcing security policies 35% Preventing data breaches from outside attackers 29% Preventing data theft by employees or other insiders 23% The requirement to manage security complexity grows steadily each year. On Complexity and Point-product Sprawl

9 9 9©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | IPS Firewall VPN Antivirus/ Anti-spam NAC DLP URL Filtering IPS Network FW VPN AV / Anti-spam NAC DLP URL Filtering Client VPN Host FW Encryption Program Control Port Protection On Complexity and Point-product Sprawl Top network security technologies and point products deployed Your world: And don’t forget endpoint—nearly doubling the number of point products…

10 10 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2011 Security Trends Governance, Risk and Compliance 88

11 11 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Regulatory Overload SOX PCI DSS GLBA E.U. Data Privacy Directive BASEL II HIPAA-HITECH SEC STATE LAWS Prevalent IT GRC Standards

12 12 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | “Compliance has the greatest influence on information security costs” InformationWeek 2010 Survey of security decision makers Most Influential Factors On Security Program Which of the following factors have the greatest influence on your information security program? Industry and/or government compliance mandates 60% Our security group’s assessment of threats and risks the company faces 42% Information security best practices 37% Threats and risks associated with business models or processes 26% On Governance, Risk and Compliance

13 13 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | On key CSO priorities for 2011 The 2011 Global State of Information Security Survey Increasing the focus on data protection 71% Prioritizing security investments based on risk 69% Strengthening the company’s governance, risk and compliance programs 67% Refocusing on core of existing strategy 66% Accelerating the adoption of security-related automation technologies to increase efficiencies and cut costs 66% Pursuing more complete configuration of DLP tools 65%

14 14 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Market Trends 2 2 R80 – Manage your users 3 Success stories

15 15 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 D SECURITY

16 16 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Consolidated into a single view Security that involves people Policy that focuses on business needs Security as a business process

17 17 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Unique Visibility and Control Monitor… Manage… Enforce… …everything that’s important to you …policy and exceptions on the fly …compliance before the network is accessed

18 18 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Best User Experience Interface Single Agent Single Update Single Scan Single Logon Single Check Point McAfee Symantec Anti-malware Scan Time Seconds Check Point McAfee Symantec System Boot Time Seconds Check Point McAfee Symantec Memory Footprint MBytes Fastest Scan TimeFastest Boot TimeSmallest Footprint

19 19 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Software Blades Laptops Desktops Quickly deploy the right level of protection for the right machines

20 20 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | HR machines have many users Manage Security of Users, Not Just Machines Security policy follows the user Rose has many machines

21 21 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Drill down on groups, users and all their machines in a few clicks Manage Security of Users, Not Just Machines Quickly determine Rose’s status Search or click AD to investigate group or user status Find Rose’s machines quickly View Rose’s policies

22 22 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Agenda 1 Market Trends 2 R80 – Manage your users 3 Success stories

23 23 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Endpoint Security Management R80… …wins opportunities in 5 continents

24 24 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Supermarket Chain – South EuropeApproachApproach ►Introduction to desktop team ►Unified client, Unified management and blades ►SE Started a PoC ResultsResults ► Installed 100 seats Total Security in a week ► McAfee footprint was higher ► Bought 600 total security, removing McAfee AV BackgroundBackground ► Network security customer, but have different groups for network and desktop admins ► Ask for a full security suite with a single management ► McAfee AV incumbent

25 25 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Military Equipment Manufacturer – UKResultsResults ► Successful PoC with pre-GA ► Customer impressed with blade deployment and its flexibility ► Started deployment with GA ► 1500 FDE and 500 TS seats BackgroundBackground ►Customer runs Secure Client. Bought endpoint security for 2,000 endpoints ►Deployment was held due to complexity and prioritizations ►Following a successful rollout at the partner’s site, performed a PoC at the customer’s site

26 26 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | New York Department of State Approach & Results ►Already upgraded to GA ►Customer’s trust has re-gained! QuoteQuote BackgroundBackground ►Bought 1,000 Total security seats in the past ►Never completed deployment, due to complexity internally “We're able to unify our security policies across the entire organization; from groups to users and devices. We can manage our encryption, AV and other solutions in one place.“ Rob Stevens, Supervisor of User Services

27 27 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Gas explorer and producer - AustraliaApproachApproach ►Complete solution of data security with DLP, Liquid Machines and Abra ResultsResults ► Deployed 150 seats for PoC, for pilot groups tests. ► Got top performance results ► Acquired and deployed 10,000 seats ► Next steps: 5,000 Abra, Liquid Machines and DLP-1 BackgroundBackground ►Not a Check Point customer. ►Issued an RFP for data security due to some security incidents ►Centralized management a must ►All competitors answered ►Symantec provides AV

28 28 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Gartner’s feedback on R80

29 29 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Questions?

30 30 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Thank You!

31 31 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | RF Technology company - Middle EastApproachApproach ►Broke Microsoft’s solution with discussions about incomplete security and administration ►Engaged the EA team to install the management and 3 seats ResultsResults ► The customer installed independently 80 seats ► Found Symantec’s solution as not complete ► Bought 100 seats ► Upgraded to GA already BackgroundBackground ►Network security customer ►Looked for Media Encryption and Full Disk Encryption ►Competition with Symantec and Microsoft ►Centralized management: must

32 32 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Financial Consultant Firm – South AfricaApproachApproach ►Endpoint Security and DLP ResultsResults ► Installed 102 seats in 4 days ► Like the blade approach ► McAfee failed in PoC ► Bought 400 TS seats & DLP-1, and replacing McAfee AV BackgroundBackground ► Network security customer ► Customer mentioned a need to protect their data ► McAfee customer

33 33 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 Month Period Detection Comparison


Download ppt "©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael."

Similar presentations


Ads by Google