Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security.

Similar presentations


Presentation on theme: "©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security."— Presentation transcript:

1 ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security Ion Valentin COJOACA Senior Security Consultant OMNILOGIC

2 Agenda  About Check Point  Today’s Dynamic Internet Security Landscape  Customer Requirements  SVN: A Framework for Success  Check Point Solutions, Programs and Partnerships  The Check Point Advantage

3 About Check Point  History –Founded June 1993 –IPO June 1996 –Strong growth in revenues and profits  Global market leadership –De-facto standard for Internet security –VPN and Firewall market share leadership –273,000+ VPN/firewalls –Securing 97 of Fortune 100 companies  Strong business model –Technology innovation and leadership –Technology partnerships –Strong and diversified channel partnerships –Open philosophy 273,000 Installations VPN/Firewall Gateways

4 Dynamic Security Landscape  Internet threats are becoming increasingly sophisticated  Attacks against corporate networks are rising  Personnel resources available to manage network security may be limited or not security specific  Network down-time and security breaches erode customer trust and satisfaction

5 Business Drivers  Revenue Growth  Cost Efficiency  Business Continuity  Security and Privacy

6 IT Imperatives  Connect Employees to Information  Integrate Business Units, Partners and Suppliers  Cut Costs  Keep Networks and Systems Available  Ensure Privacy and Security Always

7 Customer Requirements Protect Wired and wireless networks Applications Remote clients Mobile devices Broadband users Connect Remote and branch offices Teleworkers Partners Manage Thousands of users Consistent security policy across entire network Tools for enterprise security Accelerate Network security for optimized: Performance Availability Reliability

8 Customer Requirements  Industry support  Best-of-breed platforms  Broad channel support CHOICE

9 SVN: A Framework for Success  Policy management framework  Integrated enforcement points  Open architecture Check Point’s Secure Virtual Network Architecture The industry’s only end-to-end Internet security platform

10 Innovative Technology Market leading technologies are the foundation of a Secure Virtual Network Unique to Check Point  Stateful Inspection –The industry de facto standard  SMART –Unparalleled security management  One-Click Technology –Easy to use; fast VPN deployment  SecureXL –Maximum performance and reliability

11 FireWall-1 10 Most Important Products of the Decade Network Computing Magazine October 2000 Check Point Solutions: Protect with FireWall-1 Corporate Network FireWall-1 Internet The de facto standard, Check Point’s FireWall-1 protects Internet data

12 SmartDefense detects and protects against known and unknown attacks Check Point Solutions: Detect & Protect with SmartDefense

13 Corporate Network Mobile Users Remote Access VPN Site-Site VPN Branch Office Check Point Solutions: Connect with VPN-1 Extranet VPN Check Point’s VPN-1 securely connections between offices, users and devices in wired and wireless environments VPN-1/FireWall-1 integration enables the most secure communications Web Browsers via SSL Internet

14 Check Point Solutions: Manage with SmartCenter Pro  Integrates management of: –Security, VPNs and Quality of Service (QoS)  Enabling: –Seamless end-to-end security –Comprehensive view of security infrastructure –Management of hundreds of firewalls and thousands of VPNs from one central console SmartCenter Pro is an easy-to-use centralized policy management solution

15 Check Point Solutions Manage with SmartCenter Pro

16 Check Point Solutions: Accelerate with Performance Pack  Wire-speed throughput for any network –Multi-gigabit firewalls and VPNs  Non-stop availability –Innovative clustering solutions  Quality of Service for critical applications –Prioritization of business-critical traffic Fastest performance & best price/performance FireWall-1 VPN-1

17 Check Point Solutions: Connect, Protect, Manage, Accelerate Protect FireWall-1 SmartDefense FireWall-1 SmallOffice Safe@ Product Family FireWall-1 VSX FireWall-1 SecureServer FireWall-1 GX (Wireless) Connect VPN-1 Pro VPN-1 Net VPN-1 SecuRemote/SecureClient VPN-1 SmallOffice Safe@ Product Family VPN-1 VSX VPN-1 SecureServer Manage SmartCenter SmartCenter Pro Provider-1 SiteManager-1 User Authority Visual Policy Editor Accelerate Performance Pack ClusterXL FloodGate-1 VPN-1 Accelerator Card

18 Global Security & Networking Expertise Solutions Partners Certified Support Partners Authorized Training Centers Certified Security Consultants Managed Service Providers Check Point Service & Support Secured by Check Point Deployment Platforms Gateways Appliances, Servers, Switches, Routers Clients PCs, Mobile, PDAs Servers Unix, Linux, Windows Security Applications Security Enforcement Management and Reporting eBusiness Applications Performance and Availability SecureChoice

19 Server-based Solutions Appliance Solutions Remote Client Connectivity Unparalleled Platform Choice WindowsSecurePlatformSolaris Linux RapidStream Nokia Intrusion Nortel SofaWareVPN DynamicsCelestix Cubix Pyramid Siemens Resilience Windows MacintoshWirelessPDAs CrossBeam

20 Application Service SupportApplication Service Support Authorization ManagementAuthorization Management Enterprise ApplicationsEnterprise Applications Integrators & ASP ’ sIntegrators & ASP ’ s MiddlewareMiddleware AccelerationAcceleration High AvailabilityHigh Availability Load BalancingLoad Balancing VPN Capacity PlanningVPN Capacity Planning Wirless LANWirless LAN AuthenticationAuthentication Content SecurityContent Security Desktop SecurityDesktop Security Intrusion DetectionIntrusion Detection PKIPKI Smart CardsSmart Cards Enterprise DirectoriesEnterprise Directories Enterprise ManagementEnterprise Management Event Monitoring & AnalysisEvent Monitoring & Analysis ReportingReporting Security AssessmentSecurity Assessment OPSEC Applications SecurityEnforcement Management & Reporting Performance & Availability eBusiness Applications OPSEC – Breadth of Applications  Industry-standard framework for integrating complementary security technologies

21 Strong Broad Partnerships Over 2,500 partners in 86 countries Solutions Partners Certified Support Partners Authorized Training Centers Certified Security Consultants Managed Service Providers Check Point Service & Support

22 World-class Technical Services  Support Services –24 X 7 coverage for all Check Point solutions –Certified support partners –Backline support for partners –Frontline support for customers  Education Services –Certified training available across all Check Point solutions –Authorized Training Centers (ATC’s) worldwide Services and Support to Maximize Check Point Investment

23 Wireless Data DataCenter Complete Market Coverage POPEnterpriseCPESMBCPEConsumerRemote Access Access Market Segments SofaWare VPN-1 SecureClient/ SecuRemote VPN-1/FireWall-1 Small Office VPN-1/FireWall-1 Pro/Net Subscriber VPN Platforms VPN-1/ FireWall-1 GX VPN-1/FireWall-1 VSX

24 The Check Point Advantage  Successful business model  Innovative technology  Recognized industry leadership  Largest number of security engineers  Focus on customer needs  Scalable solutions  OPSEC – Industry’s standard security platform  Strong partnerships  Best TCO Best Products Partnerships Open Solutions

25 Thank You! We Secure the Internet www.checkpoint.com


Download ppt "©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security."

Similar presentations


Ads by Google