Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.

Similar presentations


Presentation on theme: "©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott."— Presentation transcript:

1

2 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies

3 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 2 A Changing World 19932003 Internet reliance Security threats 19962000 Worst Year On Record 2004

4 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 2004’s Top Security Concerns Security: Still A Challenge! New Constituents; Web Services; Partner Web Access; WLAN; Remote Employees New, Dynamic & Blended Security Threats IT Budgets need to stay productivity focused Security Breach: Network Downtime, Lost Revenue, Regulatory Commitments, Damage to Corporate Reputation Dedicated Security Resources are Limited

5 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Why is Security such a Big Challenge?  In a connected world everyone is a target  Attacks spread quickly  Multitude of distributed systems to protect (and connect)  Multiple disparate technologies to implement and manage Web Server Exponential Management Complexity

6 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 5 Industry Trends - Enterprises Resource Limitations  5-5.5% of IT budget designated for security  Average of 1 full-time security employee/1,000 users Top Security Concerns:  Protection of company/ private information  Protection against financial losses  Need for customer and supplier confidence  Concerns around internal network/system security  Use of Web services  Shareholder confidence Increased Risk  84% suffer operational or financial losses  Application level attacks highest consequences  Current security system shortcomings –Depth of protection –Management complexity Sources: Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003 Vanson Bourne, The Global IT Security Report, 2003

7 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Australia’s Position  Relaxed culture, plague of set and forget strategies that are not sufficient  Point products permeate  Complexity = complacency  Behind the 8-ball (especially the mid-tier)  Lag behind US, Europe, Asia Pac and NZ in management involvement  Opportunity For Change!

8 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 7 Risks to Your Infrastructure Internal Security Web Security (Web protection and access control) Perimeter Security  Worms/viruses  LAN exposure  Access abuse  Unpatched systems Expanding perimeter Sophisticated attacks Application-level attacks Increased Web dependence Secure access Web server exposure

9 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 8 Options in Today’s Market Internal Security Web Security Perimeter Security App Specific Personal FW HIDS NIDS SSL VPNs SSO Portal Web FW VPN Authentication App Firewall NW Firewall Multiple Technologies, Inconsistent and Disparate Management Systems

10 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Stateful Inspection/ FireWall-1 1993 OPSEC 1997 VPN-1 1998 Next Generation 2001 SmartDefense 2002 Application Intelligence 20032004 EAL 4 EAL 4+ Check Point: security is our focus A History of Innovation 1994 19951996 19992000

11 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture – What does it mean?  1. The art or science of building (Webster)  2. The way in which anything is physically constructed or designed (Cambridge)  3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com)  4. (Vendors) Anything with our brand

12 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices People Culture + Behaviour + Education Process Policy Publication + Review Technology Deployment of multiple technologies + Integrate + Single Management + Scale (from the mobile phone PDA and Laptop)

13 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 12 Architecture Not Devices SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web

14 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential 13 Architecture Not Devices Interoperability Trend Micro SurfControl Sun Micro Citrix Tivoli Nortel Nokia +171 Other product sets Integrated Management & Reporting CP Multiple, Market Leading Technologies OPSEC

15 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Managing Security with Intelligence Enforce SecurityDefine Policy Monitor & Report Analyze & Change Intelligent Security Lifecycle

16 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Security Management Life Cycle Security Management Life Cycle Define Policy Easy-to-use Graphical interface Graphical policy visualization Monitor & Report Real-time monitoring Instant status of all security elements Automatic reports Analyze & Change Detailed logging Enforce Security Stateful Inspection Application Intelligence SMART Management Your Goal: Lowest Total Cost of Ownership Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralised information database minimises capital expenditures

17 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices  Protect investments  Enhance client relationships through IT enablement  Allow you to focus on your business, not on IT  Increase productivity SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web

18 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Forward: Deeper, Broader, Smarter Security Broader deployments gateways, switches, clients, servers desktop, handheld Smarter security management, integrated management tools, event analysis and correlation Deeper content analysis, multi-layer analysis, application specific

19 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Summary  Intelligently Managed Security Process  Perimeter, Internal and Web Security –Broader, Deeper, Smarter 19932003 Internet relianceSecurity threats 1996 2000 Security Technology Evolution Intelligent Security Solutions FireWall-1 VPN-1 2005

20 ©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Architecture Not Devices Visit the Check Point Stand and register for a free evaluation kit


Download ppt "©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott."

Similar presentations


Ads by Google