©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.

Slides:



Advertisements
Similar presentations
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Advertisements

Introducing Quick Heal Terminator.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Agenda Product Overview Hardware Interfaces Software Features
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
Not to be distributed or reproduced by anyone other than Qwest entities. Copyright © 2010 Qwest. All Rights Reserved. Government Services TIC from an Industry.
 SONA ENTERPRISE was founded in 2008 as a manufacturer and developer of high performance, versatile wireless solutions for Wireless Internet Service.
1 Improving Efficiency, Reliability and Security in the Mobile Communications & Data Environment Coban User Group 2013, Rob Boback – Public Safety Sales.
Wireless and Network Security Integration Defense by Hi-5 Marc Hogue Chris Jacobson Alexandra Korol Mark Ordonez Jinjia Xi.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Security Observations & Ideas from the field
Unified Logs and Reporting for Hybrid Centralized Management
Wi-Fi Structures.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
Introductory deck to Avaya WLAN 9100 Series
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
802.11n Wireless Broadband Router
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Meet the Next Generation Firewall (NGFW)
Norman SecureSurf Protect your users when surfing the Internet.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Introducing the Symbol AP-5131
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
1999 Cabletron Systems. Wireless Networking RoamAbout Introduction to Wireless Networking Overview of the Wireless functionality Applications for Wireless.
ShareTech 2015 Next-Gen UTM.
Common Devices Used In Computer Networks
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
WIRELESS NETWORK SECURITY By Mohammad Khairul Hazwan Bin Sarihan.
Prepared by : Nur Syafikin Shaheera bt Mat Zaini TSK Prof Madya Mohd Hazali bin Mohamed Halip.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Popular Models & New Features of Cisco ISR G2 Router.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
How to Make your Networks Smoothly by Using Huawei AR2200 Routers?
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
INTRODUCTION WIRELESS GATEWAY.  A device that allows a computer and other Internet-enabled devices to access the Internet connection.  Functioned as.
 Wireless gateway is computer networking device that routers packet from a wireless LAN to another network, typically a wired Wan.  It is a combination.
 Two wireless gateways for home use that I choose are : - Linksys Wireless-G ADSL Home Gateway WAG354G - WAG160N Wireless-N ADSL2+ Gateway  The wireless.
Wireless Access Point Product Overview
Barracuda NG Firewall ™
Network Security Solution
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Wireless IP products: GWN series
Wireless Access Point Product Overview
Sizing …today. T: Here’s how. .
Cloud Security for Endpoints
(With Hybrid Network Support)
Presentation transcript:

©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime Ltd. [Restricted] ONLY for designated groups and individuals

2©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals

3©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 63% Of organizations are infected with bots

4©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 75% of organizations, a host accesses a malicious website Source: Check Point 2013 Security Report In

5©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Your headquarter defense line

6©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals But what about your branches?

7©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Your Defense is as strong as your weakest link…

8©2013 Check Point Software Technologies Ltd. [Protected] For public distribution

9©2013 Check Point Software Technologies Ltd. Why do you not consider cyber-attacks a serious threat to your company? We are too small to be targeted for an attack 50% We protect our business 47% OtherOther 7% [Protected] For public distribution Source: SMB Threat Awareness Poll 2012 SMBs don’t think they’re a target for cyber-attacks

10©2013 Check Point Software Technologies Ltd. [Protected] For public distribution 67% of reported data breaches were at companies with employees Source: Verizon Data Breach Investigation Report 2012 Smaller businesses are an ideal target for cyber raids, and cyber criminals understand this very well… “ ”

11©2013 Check Point Software Technologies Ltd. Source: 2012 Cost of Cyber Security Study, Ponemon Institute [Protected] For public distribution

12©2013 Check Point Software Technologies Ltd. New Check Point 1100 Introducing [Restricted] ONLY for designated groups and individuals

13©2013 Check Point Software Technologies Ltd. Check Point 1100 Appliances Compact desktop form factor suitable for remote offices Check Point 1100 Appliance offers BIG security for small branches Secure your Branches with Industry Leading Security Administer and Control branch Gateways with Local or Central Management [Restricted] ONLY for designated groups and individuals

14©2013 Check Point Software Technologies Ltd. More Security – now for the Branch Application Control Software Blade IPS Software Blade FW & VPN Software Blades URL Filtering Software Blade Antivirus Software Blade Identity Awareness Software Blade Anti-Bot Software Blade* Extended Enterprise Security to all your network * Anti-bot blade for the 1100 Appliance will be available in H Security Software Blade [Restricted] ONLY for designated groups and individuals Security Appliance

15©2013 Check Point Software Technologies Ltd. More Security – now for the Branch Application Control IPS FW & VPN URL Filtering Antivirus Identity Awareness Anti-Bot Security Corporate Headquarter Branch / Remote office * Anti-Bot blade will be available on 1100 Appliance in H Extended Industry Leading Security across entire corporate network [Restricted] ONLY for designated groups and individuals *

16©2013 Check Point Software Technologies Ltd. Accredited Leading Security Vendor Firewall Next Generation Firewall IPS Threat Prevention Best Security with Highest Scores for Firewall, Next Gen Firewall and IPS [Restricted] ONLY for designated groups and individuals

17©2013 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Secure Your Branch Office with Industry Leading Security

18©2013 Check Point Software Technologies Ltd. Distributed Enterprise Management Challenge Consistent Security Policy across entire organization 1 2 Easy deployment at remote sites 3 Simple management of hundred of devices [Restricted] ONLY for designated groups and individuals

19©2013 Check Point Software Technologies Ltd Appliance Management Central Local Powered by Check Point Leading Security Management [Restricted] ONLY for designated groups and individuals

20©2013 Check Point Software Technologies Ltd. Easy and Intuitive Local Management Simplified Management Local Maintenance Web-based UI Simplified Management Local Maintenance [Restricted] ONLY for designated groups and individuals

21©2013 Check Point Software Technologies Ltd. Central Management Centrally managed for consistent security policy and visibility across all appliances [Restricted] ONLY for designated groups and individuals

22©2013 Check Point Software Technologies Ltd. Scalable Deployment Define Security Profile in SmartConsole Associate 1100 Appliances with profile Appliances are automatically updated Simplified remote deployment via USB also available! Scalable deployment of hundreds of devices with bulk-operation security management [Restricted] ONLY for designated groups and individuals

23©2013 Check Point Software Technologies Ltd. Simple Operability with GAiA Offering unified operational experience across all appliances in the organization  GAiA Dynamic routing support  GAiA CLI  SNMP v2 and v3 support Simple day-to-day maintenance and operability powered by Embedded GAiA [Restricted] ONLY for designated groups and individuals

24©2013 Check Point Software Technologies Ltd. Check Point Appliances Ultra High End Enterprise Small Office Data Center System & Appliance Appliances (3 Models) 4000 Appliances (4 Models) 2200 Appliance Remote Office / Branch Extending Enterprise Security to the Branch Appliance for the entire enterprise range 1100 Appliance (3 Models) [Restricted] ONLY for designated groups and individuals

25©2013 Check Point Software Technologies Ltd Appliances Family Target Customer Small branch Recommended for up to 10 users Small branch Recommended for up to 25 users Small branch Recommended for up to 50 users Security Power28 SPU34 SPU37 SPU Max Firewall Throughput 750 Mbps1 Gbps1.5 Gbps Max VPN Throughput 140 Mbps175 Mbps220 Mbps [Restricted] ONLY for designated groups and individuals 1180 Appliance1140 Appliance1120 Appliance  4 Hardware models available per appliance 1.Wired 2.Wired + Wireless 3.ADSL 4.ADSL + Wireless

26©2013 Check Point Software Technologies Ltd Appliance Hardware 8x1GbE LAN Ports 1x1GbE DMZ Port 1x1GbE WAN Port RJ45 Console Port ADSL Modem Port USB Ports WiFi Antenas Express Card Slot SD Card Slot Wide variety of access options and high port density [Restricted] ONLY for designated groups and individuals

27©2013 Check Point Software Technologies Ltd Appliances – Specifications 1120 Appliance1140 Appliance1180 Appliance Hardware Port density10x1GbE Wireless Interface b/g/n (Optional) ADSL modemOptional PCI Express slotYes SD Card slotYes 3G Modem SupportYes EnclosureDesktop Performance Security Power28 SPU34 SPU37 SPU Recommended UsersUp to 10 usersUp to 25 UsersUnlimited (up to 100) Max Firewall Throughput750 Mbps1000 Mbps1.5Gbps Max VPN Throughput140 Mbps175 Mbps220 Mbps Max IPS Throughput720/100 Mbps (default/recommended policy) Max Antivirus Throughput100 Mbps [Restricted] ONLY for designated groups and individuals

28©2013 Check Point Software Technologies Ltd Appliance vs. UTM-1 Edge UTM-1 Edge N Series1100 Appliance Operating SystemEmbedded NGX firmware 8.x  Embedded Gaia  Full UTM-1 Edge feature parity (except 802.1x NAC) SW ArchitectureNGXSoftware Blades Architecture Security Capabilities  Firewall  VPN  SmartDefense  URL Filtering  Antivirus  Security  Firewall  VPN  Identity Awareness  IPS  URLF  Application Control  URL Filtering  Antivirus  Antibot (H2 2013) Port density6x1GbE10x1GbE HW OptionsWired (w/wo) WIFI / ADSL (w/wo) WIFI Max Firewall TPT1 Gbps1.5 Gbps Max connections60,000200,000 Max VPN TPT200 Mbps220 Mbps Max VPN Tunnels ManagementLocal, Central [Restricted] ONLY for designated groups and individuals

29©2013 Check Point Software Technologies Ltd. Check Point 1100 Appliances Compact desktop form factor suitable for remote offices Check Point 1100 Appliance offers BIG security for small branches Secure your Branches with Industry Leading Security Administer & Control branch Gateways with Local or Central Management [Restricted] ONLY for designated groups and individuals

©2013 Check Point Software Technologies Ltd. Thank You! [Restricted] ONLY for designated groups and individuals