©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.

Slides:



Advertisements
Similar presentations
Palo Alto Networks Jay Flanyak Channel Business Manager
Advertisements

1 © Copyright 2013 Fortinet Inc. All rights reserved. Комплексная экосистема безопасности Мирослав Мищенко Менеджер по работе с ключевыми клиентами.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Modern Day Attacks and a Silent Security Audit Kierk.
Top of Content Box Line Subtitle Line Title Line Ruslans Barbasins| Territory Manager – CIS, Central Asia, Caucasus Leading The World Into Connected Security.
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Modern Day Attacks and a Silent Security Audit Kierk.
Simon Garcia Jaramillo Network Administrator ATS Automation Tooling Systems.
Lisa Farmer, Cedo Vicente, Eric Ahlm
MSIT 458: Information Security & Assurance By Curtis Pethley.
Security Observations & Ideas from the field
National Symposium for Command & Control and Cyber Security
Unified Logs and Reporting for Hybrid Centralized Management
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
MIGRATION FROM SCREENOS TO JUNOS based firewall
© Copyright 2013 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Our Products © Copyright 2013 Cyberoam Technologies.
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals What’s Hiding on Your Network? Kevin Jones.
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Sophos anti-virus and anti-spam for business OARNET October 13, 2004.
The World's Most Secured Browsing Solution COCKPIT4i is a radically new, powerful solution that protects against the security risks posed by exposure to.
Meet the Next Generation Firewall (NGFW)
Barracuda Networks Steve Scheidegger Commercial Account Manager
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
1 1©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Visibility & Control – Identity, Application & Content Awareness.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
Fortinet An Introduction
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Vantage Report 3.0 Product Sales Guide
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Network Security Update IDG Security Forum th of April 2008 Péter L. Juhász, Sales Manager South East Europe.
The Changing World of Endpoint Protection
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Protecting your site from DDoS and data breach attacks Ronan Lavelle LeaseWeb Web Application Security Group.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Threat Landscape Ryan Kane – SWAT Specialist - Secure Wireless, & Access Technologies Data Connectors ABQ December 2015.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Small Business Solutions Copyright 2014 Trend Micro Inc.
1 Sophos Security made simple. Steven Hecht Channel Account Executive Andy Miller Enterprise Account Manager
1 CONFIDENTIAL – INTERNAL ONLY1 Fortinet Confidential June 23, 2016 Securing The Cloud & Data Center.
Threat Management Server Eusebio Nieva Director Técnico Check Point España y Portugal.
Final Project: Advanced Security Blade IPS and DLP blades.
TCP SPLIT HANDSHAKE ATTACK Mehmet Burak AKGÜN 04/27/2011.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Predrag Spasic | Sales Manager Serbia and Macedonia
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
Virtualization & Security real solutions
Prevent Costly Data Leaks from Microsoft Office 365
BOMGAR REMOTE SUPPORT Karl Lankford
Check Point Connectra NGX R60
Topic What is Network & Network Security ? Network Security Companies
Hosted Security.
Presentation transcript:

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013 Elif Günaydın

2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point in 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3

3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Financial Performance Market Value Billion $ Market Value Billion $

4 4©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | The New Face of Next Generation Firewall

5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point’s Next Generation Firewall Discover and block threats in real time Secure use of Web 2.0 tools and data Comprehensive understanding of security events Look beyond IP—define security by user identity

6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Context-based Security Consolidated on the Security Gateway DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Check Point’s Next Generation Firewall

7 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 114 SPU 114 SPU 374 SPU 623 SPU 738 SPU 1046 SPU 1861 SPU 2900 SPU SPU 3x performance3x performance Security Accelerator ModuleSecurity Accelerator Module New high-end platformNew high-end platform Single OS: GAiASingle OS: GAiA Security Appliances 14,600 SPU

8 8©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3551 SPU 114 SPU 114 SPU 374 SPU 623 SPU 738 SPU 1046 SPU 1861 SPU 2900 SPU SPU Security Appliances 14,600 SPU Expand real-world performanceExpand real-world performance Raise the bar at super high endRaise the bar at super high end 21700

9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security Appliances Full range of Security small / branch appliances to high end enterprise

10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Multiple sources of data SensorNet 3D Reports Threat Cloud

12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A comprehensive survey 888companies 1,494gateways 120,000Monitoring hours 112,000,000security events

13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A comprehensive survey % of companies Americas EMEA APAC Industrial Finance Government Telco Consulting Other By geographyBy sector

14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | The majority of companies are infected 63% 100% = 888 companies of the organizations in the research were infected with bots

15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Once in … always on Communicating with command & control every 21 minutes

16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Downloading malware all the time 53% of organizations saw malware downloads

17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Most attacks originate in the US Top malware locations, % US 71% Canada 8% Czech Rep 2% Slovakia 2% France 2% UK 2% Germany 2% Israel 3% Turkey 3% China 3%

18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Anonymizers inside the corporation 43%43% of organizations had users of Anonymizers (80% were not aware that their employees use Anonymizers) 100% = 888 companies

19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | P2P inside the corporation 61% of organizations had a P2P file sharing app in use 100% = 888 companies

20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | How common is it? 54% of organizations experienced data loss

21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Many types of data leaked 24% Source Code 7% marked as confidential 14% Password protected file 29% Credit card information 13% Salary compensation information 7% Bank accounts numbers 6% Business data record 21% Other

22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | PCI compliance can be improved36% Of financial organizations sent credit card data outside the organization

23 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

24 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 2012 Awards

25 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3

26 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | NSS Labs – Tested Appliances  CheckPoint  Dell SonicWALL SuperMassive E10800  Fortinet FortiGate 3600C  Juniper SRX 3600  Palo Alto PA-5020  Sourcefire 8250  Sourcefire 8290  Stonesoft 3202  WatchGuard XTM 2050

27 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Top Scores with Triple Recommend NGFW 98.5% Management and Security Effectiveness 2013 NGFW Group Test Firewall 100% Management and Security Effectiveness 2013 Firewall Group Test IPS 99.0% Overall Protection Product Analysis Report

28 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Top Score for NGFW with NSS Labs 98.5% Highest overall score 99.2% Blocked server application attacks 97.7% Blocked client applications attacks “Recommend” 2013 NGFW Group Test 98.5% NGFW Enterprise Management and Security Effectiveness CHECK POINT CONTINUES NGFW LEADERSHIP WITH RECOMMEND RATING

29 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | NSS Labs 2013 NGFW Security Value Map (SVM) Security Value Map NSS Labs 2013 NGFW Group Test Check Point is the NGFW Leader with the Highest “Enterprise management and security Effectiveness”

30 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3 years TCO

31 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A Perfect Score in Firewall Tests 100% Score in All Firewall Test Areas Outstanding performance while maintaining low TCO ($11.72 per protected Mbps) “Recommend” 2013 Firewall Group Test 100% Enterprise Management and Security Effectiveness LONG STANDING RECORD OF EXCELLENCE AFFIRMED BY FIREWALL TEST RESULTS

32 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Best IPS Overall Protection 99.0% Overall protection score 100% Resistance to Evasion Excellent Stability and Reliability Management comes through again, powerful and easy-to-use “Recommend” rating 99.0% Overall Protection Check Point IPS SETTING THE STANDARD IN OVERALL PROTECTION FOR IPS

33 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Highest Security Effectiveness The security effectiveness of the IPS component of the NGFW can be seen in the following table as we factor in evasions and leakage to the exploit block rate. Check Point is the leader NGFW with 100% immunity to Evasions and Leakage

34 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Summary [Protected] Non-confidential content TRIPLE RECOMMEND RATINGS WITH TOP SCORES IN LATEST NSS LABS TESTS 98.5% NGFW Management and Security Effectiveness 2013 NGFW Group Test 100% Firewall Management and Security Effectiveness 2013 Firewall Group Test 99.0% IPS Overall Protection Product Analysis Report

35 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Ajanda 1 1 Check Point 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3

36 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Competitors – Firewall  ASA Serisi  SRX Serisi  FortiGate  PA

37 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Magic Quadrant for Enterprise Network Firewalls, LEADER

38 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Competitors - UTM  UTM (Astaro) Serisi  XTM Serisi  FortiGate  NSA

39 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Magic Quadrant for Unified Threat Management (UTM), 2012 LEADER

40 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | What’s new in 2013? Smartlog SmartEvent Compliance DDoS Protector 1100

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank you