Threat Management Server Eusebio Nieva Director Técnico Check Point España y Portugal.

Slides:



Advertisements
Similar presentations
TrustPort Net Gateway Web traffic protection. Keep It Secure Contents Latest security threats spam and malware Advantages of entry point.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Network Security Essentials Chapter 11
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Supplied on \web site. on January 10 th, 2008 Customer Security Management Reducing Internet fraud June 1 st, 2008 eSAC Walk Thru © Copyright Prevx Limited.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Windows Defender Next Generation Anti-malware
Security Observations & Ideas from the field
Unified Logs and Reporting for Hybrid Centralized Management
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
The Evolution of the Kaspersky Lab Approach to Corporate Security Petr Merkulov, Chief Product Officer, Kaspersky Lab Kaspersky Lab Cyber Conference, Cancun,
WCL209. GA3/23GA3/23 Manage & Secure PCs Anywhere All you need is an internet connection The Best Windows Experience Standardize your OS on the latest.
©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
Adversaries in Clouds: Protecting Data in Cloud-Based Applications Nick Feamster Georgia Tech.
1 Panda Malware Radar Discovering hidden threats Technical Product Presentation Name Date.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals Preventing the next breach or discovering the one.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Monday, June 27, 2011Copyright© 2011 Dragnet Dragnet ® Cloud Service Introduction Matthew McLeod, Managing Director
TalkTalk network security overview 14 th April 2011.
Tim Vander Kooi Systems
October 15, 2002Serguei A. Mokhov, 1 Intro to Internet-services from Security Standpoint SOEN321-Information-Systems Security Revision.
MANAGEMENT ANTIMALWARE PLATFORM Microsoft Malware Protection Center Dynamic Signature Svc Available only in Windows 8 Endpoint Protection Management.
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
CPT 123 Internet Skills Class Notes Internet Security Session A.
The Changing World of Endpoint Protection
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
Bill Jensen Bashar Kachachi Session Code: SIA309.
Sky Advanced Threat Prevention
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
COBRA® V5 Janet L. Anderson, M.S., D-ABC Forensic Toxicologist Alcohol and Drug Testing Program Technical Director.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
©2014 Check Point Software Technologies Ltd. 1 ©2014 Check Point Software Technologies Ltd [Restricted] ONLY for designated groups and individuals©2014.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
IoT Security Part 2, The Malware
Barracuda Web Security Flex
Hank Johnson, Area Manager Check Point Software Technologies
Power BI Security Best Practices
Software-Defined Secure Networks in Action
The Next Generation Cyber Security in the 4th Industrial Revolution
Contact Center Security Strategies
Defending high value targets in the cloud using IP Reputation
Presentation transcript:

Threat Management Server Eusebio Nieva Director Técnico Check Point España y Portugal

WE BELIEVE ONLY IN THE BEST SECURITY WE ARE THE STANDARD BY WHICH ALL SECURITY SOLUTIONS ARE MEASURED [Restricted] ONLY for designated groups and individuals

*Source: THREATS BECOME A COMMODITY [Restricted] ONLY for designated groups and individuals

©2016 Check Point Software Technologies Ltd. 4 9 hours Check Point Palo Alto 4 days Fortinet 5 days Heartbleed Shellshock Poodle-TLS Venom 22 hours Check Point 18 hours Check Point 30 hours Check Point Palo Alto 29 days Fortinet 14 days Palo Alto 56 days Fortinet 10 days Palo Alto 10 days Fortinet 9 days But once known, we’re the fastest to react

[Restricted] ONLY for designated groups and individuals

Malware that has not previously been seen can often get past traditional technology WHAT YOU DON’T KNOW… …ZERO-DAY How do you protect against [Restricted] ONLY for designated groups and individuals ©2015 Check Point Software Technologies Ltd. Malwares can infect internal networks through USB flash drives, spread across network and connect to C&C through infected hosts Let’s disconnect… WHAT I CAN’T SEE WON’T HURT ME The Internet is full of scary stuff! ?

Case Study: Stuxnet (offline network) Infection via USB Communication with C&C Infecting another host and operator [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. CAN YOU REALLY KEEP UP? Offline updates… [Restricted] ONLY for designated groups and individuals

Download Center Check Point Cloud Services Overview [Restricted] ONLY for designated groups and individuals Anti-BotAnti-VirusApplication Control URL Filtering IPSThreat Emulation Sources of threat data Anti-BotURL Filtering Anti-Malware & Forensics CPUSE Software Updates

Check Point Cloud-based Services [Restricted] ONLY for designated groups and individuals CPUSE IPS and Application Control Updates ThreatCloud – Advanced Threat Prevention Cloud enables operational efficiencies, security Smart, fast, safe gateway software updates Automation for multi-domain environments Real-time threat intelligence

The Offline Challenge [Restricted] ONLY for designated groups and individuals How to harness Cloud… While keeping off the Internet?

©2015 Check Point Software Technologies Ltd. THE ANSWER: PRIVATE THREATCLOUD [Restricted] ONLY for designated groups and individuals

On-premises Private ThreatCloud Check Point Cloud Private ThreatCloud Delta updates Packages Software updates Updates MDM Packages, queries logs Indicators files AV/AB APCL, URLF, IPS Packages Sub-cloud [Restricted] ONLY for designated groups and individuals

Sample Use Cases [Restricted] ONLY for designated groups and individuals Customers with offline networks Managed Security Service Providers Security Aggregation Points All use cases share a need for private cloud Govt., Defense, ICS, regulated industries Distribution of custom threat intelligence Endpoints, SDDC micro-segmentation, IoT

Self-contained ThreatCloud Appliance Gaia OS w. onboard software blades for self protection Managed by Check Point Management Server – Existing MDM; dedicated management; or standalone Plus: CLI / APIs [Restricted] ONLY for designated groups and individuals CLI RESTful APIs Management Monitoring MDM AppDB

Stateless Load Sharing / HA Load Balancing Download Agent Public ThreatCloud [Restricted] ONLY for designated groups and individuals ThreatCloud Appliances Management (Active, Standby) ThreatCloud clients GatewaysEndpointsManagementSandBlast Each appliance rated to serve up to 1,000 clients (constrained by license)

Guaranteed one-way cloud updates [Restricted] ONLY for designated groups and individuals

Download Agent Options (On-board) [Restricted] ONLY for designated groups and individuals On-board Download Agent Public ThreatCloud Load Balancing GatewaysEndpointsManagement All queries are local to the environment SandBlast

Download Agent Options (DMZ) [Restricted] ONLY for designated groups and individuals Security Gateway enforces uni-directionality Public ThreatCloud Load Balancing DMZ All queries are local to the environment GatewaysEndpointsManagementSandBlast

Download Agent Options (Data Diode) [Restricted] ONLY for designated groups and individuals Public ThreatCloud Load Balancing All queries are local to the environment Diodes enforce uni-directionality GatewaysEndpointsManagementSandBlast

Download Agent Options (Manual) Public ThreatCloud Load Balancing All queries are local to the environment Sneakernet GatewaysEndpointsManagementSandBlast [Restricted] ONLY for designated groups and individuals

Roadmap [Restricted] ONLY for designated groups and individuals

©2015 Check Point Software Technologies Ltd. A MULTI-TENANT CONTENT DISTRIBUTION NETWORK FOR SECURITY DATA, SERVING ENFORCEMENT POINTS WITH REAL-TIME DATA IN SUPPORT OF SECURITY AUTOMATION What is ThreatCloud? [Restricted] ONLY for designated groups and individuals

Roadmap Expanded data services – Custom threat indicators and signatures – Automated indicator generators (SandBlast, Forensics) – Intellistore feeds – Intelligence sharing (STIX/TAXII) – ThreatWiki and other metadata (e.g. intelligence reports) Additional cloud client types – Sub-clouds – Dedicated threat prevention appliances Feedback mechanisms – Anonymized indicator match statistics and analytics – Controlled sharing (upstream, peer to peer) [Restricted] ONLY for designated groups and individuals

Sub-clouds [Restricted] ONLY for designated groups and individuals Download Agent Threat Management Server

Sandblast Cloud Front-end Emulator Monitoring Average processing time Average emulation time POD Monitoring # Of connections #Of open sessions Collector and queue manager Emulators Public ThreatCloud Updates [Restricted] ONLY for designated groups and individuals

Summary

[Restricted] ONLY for designated groups and individuals Threat prevention requires online access Online updates reduce admin overhead Private ThreatCloud lets you enjoy Cloud If you’re not up to date, you’re vulnerable Especially in multi-management networks While keeping your network off the ‘Net

[Restricted] ONLY for designated groups and individuals