©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott.
Guide to Network Defense and Countermeasures Second Edition
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point InterSpect ™ The Internal Security Gateway ™ ISSA April 15 th, 2004.
SAFE Blueprint and the Security Ecosystem. 2 Chapter Topics  SAFE Blueprint Overview  Achieving the Balance  Defining Customer Expectations  Design.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Introduction to ISA 2004 Dana Epp Microsoft Security MVP.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
MSIT 458: Information Security & Assurance By Curtis Pethley.
Unified Logs and Reporting for Hybrid Centralized Management
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Information Security in Real Business
© 2003, Cisco Systems, Inc. All rights reserved _07_2003_Richardson_c11 Security Strategy Update Self Defending Network Initiative Network Admission.
Introducing Quick Heal Endpoint Security 5.3. “Quick Heal Endpoint Security 5.3 is designed to provide simple, intuitive centralized management and control.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Firewall Slides by John Rouda
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
© 2005,2006 NeoAccel Inc. Training Access Modes. © 2005,2006 NeoAccel Inc. Agenda 2. Access Terminals 6. Quick Access Terminal Client 3. SSL VPN-Plus.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Norman SecureSurf Protect your users when surfing the Internet.
Secure remote access to applications through any web browser Internet Headquarters SSL Customers Suppliers Partners Mobile Workforce Applications .
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Course 201 – Administration, Content Inspection and SSL VPN
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
BY- NIKHIL TRIPATHI 12MCMB10.  What is a FIREWALL?  Can & Can’t in Firewall perspective  Development of Firewalls  Firewall Architectures  Some Generalization.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
NW Security and Firewalls Network Security
Introducing Quick Heal Endpoint Security 5.2. “Quick Heal Endpoint Security 5.2 is designed to provide simple, intuitive centralized management and control.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 Overview of Microsoft ISA Server Introducing ISA Server Protects resourcesProtects resources Connects directly to the Internet and your private.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Name Company A Day in the Life… A Demonstration of Application Delivery.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Module 11: Designing Security for Network Perimeters.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Security fundamentals Topic 10 Securing the network perimeter.
Lesson 2a © 2005 Cisco Systems, Inc. All rights reserved. SNPA v4.0—2-1 Firewall Technologies and the Cisco Security Appliance.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Chapter 8.  Upon completion of this chapter, you should be able to:  Understand the purpose of a firewall  Name two types of firewalls  Identify common.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
Security fundamentals
Barracuda Web Filtering Service
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Check Point Connectra NGX R60
Topic 12: Virtual Private Networks
Check Point Software Technologies Ennio Pesenti VAD mgr Computerlinks University Verona, 18 Ottobre 2005 Check Point Software Technologies Corporate.
Presentation transcript:

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr Italy Paolo Della Pietra Product Manager e-Security COMPUTERLINKS

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 2 Agenda Internet Security Drivers in 2004: Security must be intelligent Our Security Leadership: Raising the Bar Our Vision for Perimeter, Internal and Web Security Summary

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 3 A Changing World Internet reliance Security threats Network Attacks Application Attacks Web Attacks Intelligent, Adaptive, Pre-Emptive Security

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 4 Damage Hour 1Hour 2Hour 3Etc. None Everywhere Reactive: Clean-up after the damage is done. Proactive: Catch it before the damage is done. Web Intelligent, Adaptive, and Pre-Emptive Security is a MUST

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 5 INSPECT Stateful Inspection Application Intelligence Web Intelligence Malicious Code Protector To Be Effective, Security Must Be Intelligent, Adaptive and Pre-Emptive

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 6 Check Point INSPECT – More than Deep Packet Inspection Based on INSPECT Engine: –Stateful Inspection for high-performance network protection –Application Intelligence for application-level protection Support for over 150 applications plus custom services Over 3 Gbps throughput

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 7 Stateful Inspection/ FireWall OPSEC 1997 VPN Application Intelligence 2001 InterSpect 2002 Web Intelligence + Malicious Code Protector 2003 Check Point: Always a step ahead of customer’s real-world challenges Check Point: Always a step ahead of customer’s real-world challenges Check Point is Proactively Meeting Customer Needs

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 8 Application Intelligence Introduced Application Intelligence Enhanced Web Intelligence Introduced Q203 Q403 Q104 Q303 SECURITY INNOVATION ? Q204 Cisco PIX OS 6.3 Check Point security solutions are proactively adapting to meet security challenges of tomorrow…. Juniper Screen OS 5.0 InterSpect Introduced Check Point Continues to Lead by Raising the Bar in Security

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 9 SOURCE: Frost and Sullivan, April 2004 *Check Point Family includes all hardware revenue from OPSEC appliance partners and open server hardware Check Point 36% Cisco Juniper 26% 10% 5% 4% 19% Nortel SonicWall Other Check Point is the Global Leader

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 10 Blocking Attacks: Perception vs. Reality

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 11 CiscoNetScreen Check Point SMART Common Security Architecture -- Scalable to Manage 1000s of devices CiscoWorks VMS limited to 1000 devices - Solution Designed for Service Providers -- 1-click VPN technology -- Management High Availability -- Centralized policy & software management - Visualization of security - No way to view interaction between objects & rules SMART Security Management: No One Comes Close!

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 12 SMART management Worry-free protection Intelligent Security Solutions Perimeter In-depth inspection Internal Web In 2004 Check Point Launched Our Expanded Strategy: Perimeter, Internal and Web Security Protecting Beyond the Perimeter

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 13 Delivering Intelligent Solutions  Perimeter  Internal  Web

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 14 Perimeter Security Challenges Attack protection solutions must Protect network and servers Protect applications Web, DNS, mail, SQL, Microsoft, P2P… Deploy timely defenses against new attacks Defend against known and unknown threats Secure office connectivity Cost effective management Consistent application of policy Large scale VPNs Remote employee access Easy configuration and deployment Client protection – Outside the office Resilient network availability Controllable Internet access Perimeter Security

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 15 Check Point Perimeter Security Solutions Application Intelligence [Q2 2003] –Fully integrated application-level protection Check Point Express [Q3 2003] –Most Comprehensive Mid-Market Solutions VPN-1 Edge [Q4 2003] –The Best Solutions for Branch Office Access Installed base 330,000+ gateways 60,000+ accounts

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 16 Internal Security Challenges Contain threats Prevent worms from spreading Contain attacks to a single device or network segment Compartmentalize the network Must be simple Must be fast Do not disrupt legitimate traffic Protect the Desktop Inside the office Protect the Server Secure the Data Center Internal Security

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 17 New Solutions Internal Security New Solutions InterSpect [Q1 2004] –New Category of Internal Security Gateways Endpoint Security [Q1 2004] –Zone Labs Integrity

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 18 Cumbersome configuration, management burden Limited Basic IDS/IPS No, Requires virus definitions Varies by vendor--- Pre-emptive Attack Protection Check Point InterSpect Requires setup on every device Granular policy based on explicitly allowed traffic Security policy difficult to configure and manage Seamless Deployment & Management Only from the host perspective Varies by vendor --- LAN Protocol Protection Available--- Quarantine --- Limited Network Zone Segmentation Signature and/or Response Based (Reactive) Varies by vendor --- Worm Defenses Anti-Virus Perimeter Firewalls Secure Switches/ Routers Others Try, But …

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 19 Web Security Challenges Protect Web servers & applications Protect against Web-specific threats Transparent security Easy-to-deploy Must not interfere with simplicity of the Web Secure Web access Unified Web portal to internal resources Protect internal resources Integrate access control Including authentication and authorization Integrate multiple logins & authentication systems Endpoint security Protect the desktop Protect the server against the desktop Web Security Web Security (Web protection and access control)

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 20 Internal Web Security New Solutions Web Intelligence [Q2 2004] –Web application firewall – In-depth web protection –Add-on license to VPN-1 gateways SSL Network Extender [Q2 2004] –Secure application access (non-web) over SSL Connectra Web Security Gateways [Q2 2004] –Web-based Connectivity with unmatched Security

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 21 Web Security & SSL VPN - Server Security Protecting the Web Server and the Operating System on which it Runs Minimal Network Access over Web Native Access ANY Application (Legacy, Terminal, ERP, Voice) through a Web Tunnel Secure Browser Access Using the Browser to access Pages, Files, through a Secure Socket Layer (SSL) Varies by vendor Endpoint Security Protecting the Web Client and the Operating System Environment, PC, PDA SSL VPNs Connectra with Web Intelligence SSL VPN Solutions

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 22 Check Point Raised the Bar for IPSec Check Point Sets the Bar for SSL VPN Integrated Firewall for IPSec VPN Personal Firewall in Secure Client Application Intelligence Web Intelligence & Connectra Non-Check Point SSL VPN The New Security Bar SSL VPN: 1st Gen SSL VPN with Check Point Connectra Non-Check Point SSL VPN Check Point Sets the Security Bar

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Summary

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 24 Check Point Intelligent Solutions Management VPN & Remote Access Application Access SMART Stateful Inspection Application Intelligence Integrity SecureClient Web Portal Network & Application Security Endpoint Security Integrity Integrity Clientless Security WebInternal Perimeter Granular Access Control Application Level Authorization Network Zone Segmentation SSL Remote Access IPSec Remote Access Site to Site VPN (IPSec) Web Intelligence InterSpect Internal Security Gateway Connectra Web Security Gateway VPN-1 Perimeter Security Gateway Web Intelligence SSL Network Extender VPN-1 Endpoint Security Product Line Integrated Security & Management Architecture (SMART)

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 25 Compartmentalizing the network Contain threats Desktop protection Server protection Data center security Web Security Perimeter Security Attack protection Secure office connectivity Remote employee access Controllable Internet Access Easy access Unified front end Integrated Authentication Content Verification Internal Security Auditable Broader Deeper Smarter Intelligent Security Solutions

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential 26 Summary Check Point has always anticipated customer requirements and set the security bar Our Roadmap Focuses on Layering Solutions for Perimeter, Internal and Web Security We always have … and always will! Check Point provides the industry’s best and most intelligent security solutions

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Thank You!