©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.

Slides:



Advertisements
Similar presentations
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Advertisements

Securely connecting users and applications from anywhere to anywhere in todays global economy MY-ARRAY DesktopDirect Bring.
Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo Client Offerings For Service Providers Ceedo Client Workspace Virtualization.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
INFORMATION TECHNOLOGY FOR MINNESOTA GOVERNMENT Christopher P. Buse Assistant Commissioner and CISO State of Minnesota Mobile Device Management Assessing.
Meraki Mobile Device Management
© Copyright RES Software. v2012-Mar30. RES HyperDrive Patrik Zander, Product Manager 1.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Secure Private Cloud Storage for Business. The Market Trend File Sharing Any Device Any Where Public clouds are good enough to personal users but security.
Introduction to Microsoft Office Web Apps with Jim Mollé Learn iT! Computer Software Training.
SSL From Your Smartphone Support for Android Smartphones /
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Your storage on the ground; Your files in the cloud.
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Building Hosted Desktop: Expand Your Profits as IT Evolves Microsoft Hosting Service Providers Conversation #4 1.
Security Awareness ITS SECURITY TRAINING. Why am I here ? Isn’t security an IT problem ?  Technology can address only a small fraction of security risks.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
DSM-260. Features Streaming Stream photos and videos from a mobile device, laptop, or network storage drive Stream music to your audio system Stream your.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
GOTBACKUP THE BEST BACKUP SOLUTIONS. SIGN UP TODAY! CLICK HERECLICK HERE.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Sophos EndUser Protection Complete endpoint, mobile, web and data security licensed by the user – not the device.
User and Device Management
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.
© 2015 IBM Corporation John Guidone Account Executive IBM Security IBM MaaS360.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
SME in the Cloud Awingu Edition Partner presentation Rolan Linsen Combined Solutions Design | Solutions IT
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
Kaspersky Small Office Security INTRODUCING New for 2014!
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
JUNOS PULSE Junos PULSE for Windows Junos PULSE Mobile Security Suite.
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
Enterprise | education | public printing locations PrinterOn for Manufacturing.
Short Customer Presentation September The Company  Storgrid delivers a secure software platform for creating secure file sync and sharing solutions.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Office 365 Upsell Paths.
Barracuda Mobile Device Manager
Upsell Small Business Customers to an Office 365 plan
Using Office 365 Across All Your Devices
Customized Solutions to your needs
SmartHOTEL Planner Add-In for Outlook: Office 365 Integration Enhances Room Planning, Booking, and Guest Management for Small Hotels and B&Bs OFFICE 365.
Get Office 2016 with Office 365 and get down to business
Office 365 Business is your familiar Office in the cloud
+Vonus: An Intuitive, Cloud-Based Point-of-Sale Solution That’s Powered by Microsoft Office 365 with Tools to Increase Sales Using Social Media OFFICE.
With IvSign, Office 365 Users Can Digitally Sign Word Documents in the Cloud from Any Device Without Having to Install Any Digital Certificates OFFICE.
Securely run and grow your business with Microsoft 365 Business
Which is right for your business, Office 365 or Microsoft 365?
Microsoft Ignite /20/2018 2:21 PM
Which is right for your business, Office 365 or Microsoft 365?
Getting Started.
BluVault Provides Secure and Cost-Effective Cloud Endpoint Backup and Recovery Using Power of Microsoft OneDrive Business and Microsoft Azure OFFICE 365.
Getting Started.
System Center Marketing
Anyshare solution.
Microsoft 365 Business Technical Fundamentals Series
Presentation transcript:

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security Engineer

2©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Bring Your Own Device Remote Desktop Business Apps

3©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | IT Manager 3,000 users in the company… …3,000 corporate endpoints… …and almost 6,000 devices connected to the network!

4©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Today’s Workforce Source: The impact of mobile devices on information security January Check Point Software Technologies. N=768The impact of mobile devices on information security65% Allow personal devices Allow mobile devices in the organization89% Organizations Enable Mobile Devices

5©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Data Protection Challenges in Endpoint and Mobile Environments ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 6

6©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Communication Eavesdropping

7©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Physical Access to Lost/Stolen Device

8©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Allow Apps to Access Business Data

9©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Store Data on Unmanaged Devices Save Work from home on a personal device via Outlook Web Access

10©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Infected Devices May Leak Data Exploit vulnerabilities Rogue Applications Social Targeted Rooted device

11©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Data Security Challenges – Summary Secure Unmanaged & BYOD Secure the Documents Secure the Data Secure the Communication

12©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Securing Data in Endpoint and Mobile Environments ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 13

13©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point Protects Business Data Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication

14©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Communication Privacy Remote Access Solutions for Any Device

15©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point Mobile Introducing: VPN Apps for iOS & Android Portal for Web-Apps Single Sign On Online access Portal for Web-Apps Single Sign On Online access VPN tunnel for any App Automatic connect IPsec or SSL VPN VPN tunnel for any App Automatic connect IPsec or SSL VPN Check Point Mobile VPN Android v4 support Q2.2012

16©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Simple to set up Install “Check Point Mobile VPN” via the App Store Set up your profile: Click a link OR Scan a QR Code Done! VPN secures your Communication

17©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Strong Authentication Certificate and username/password Pair device with its owner for a safer connection Two-factor authentication for safe connectivity

18©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | User and Device Access Control Personalized portal, based on identity Set up device security features Control data access by user and device settings Remote-wipe device upon loss

19©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data

20©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Full Disk and Media Encryption Protect Business Data from Unauthorized Access when Laptops and Storage Devices are Lost or Stolen 11 Years of Leadership in the Gartner’s Mobile Data Protection Magic-Quadrant

21©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | User Engagement and Education CONFUSING EXPLAINING Personal removable storage device (1TB) E80.40 – Q3 2012

22©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80 “The value of E80 is most clearly the central policy and the rich reports. The client interface is easy and transparent for most users.” —Government Agency, Total Security, 1500 seats, E80.20 UNIFIED Management for all Endpoint Security Software Blades Control and view the security for USERS, not just for machines

23©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80.40 E80.40 – Q Express a Simple and Understandable Organizational Endpoint Security Policy

24©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80.40 Know that the organization follows the required security policy

25©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data

26©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protecting Data with Document Security Document Security H The Security follows the document Simple access to documents from PC, Mac, Smartphones and tablets Share documents securely with co-workers and external partner

27©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | CEO Document Security – User Experience Document Security H Dana (co-worker) Full Access Dana (co-worker) Full Access Suzan (not in the project) No Access Suzan (not in the project) No Access John (Purchasing partner) Read and Print John (Purchasing partner) Read and Print Tammy creates a document Assigns a security policy to the document

28©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Simple to Access Protected Documents Document Security App for iPhone, iPad and Android Web Portal for other devices Transparent access with the Document Security Agent

29©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data

30©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point GO – Turn Any PC to Your Business Environment  Work with corporate data from any PC  Virtual workspace  Plug-and-play  Portable apps  Secure USB mode  Work with corporate data from any PC  Virtual workspace  Plug-and-play  Portable apps  Secure USB mode

31©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | GO Portable Application Store Available in the Cloud One Click Application Download and Install Growing Application Portfolio

32©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | GO Folder Mode GO launches virtual desktop Unmanaged Computer GO allows native accesss mode Trusted Computer Direct access to files from trusted computers

33©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Let’s review the challenges again…

34©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Secure Unmanaged & BYOD Secure the Documents Secure the Data Secure the Communication Data Security Challenges – Summary Check Point GO turns any device into a secure business environment Document Security enables secure sharing with co-workers and business partners Endpoint Security Suite protects data stored on mobile devices Remote Access Clients and VPN Portal protect the communication to the business

35©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Summary  Secures COMMUNICATION  Protects DISKS and STORAGE DEVICES  Proactively Secures DOCUMENTS  Protects the UNMANAGED DEVICES  UNIFIED management and control Check Point Protects Business Data on Endpoints and Mobile Devices

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Thank You