Check Point Connectra NGX R60

Slides:



Advertisements
Similar presentations
The Remote Access Revolution: Practical Solutions for the Enterprise
Advertisements

© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Call Center Call Center on a Stick Ceedo for Call Center Presentation.
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
!! Are we under attack !! Consumer devices continue to invade *Corporate enterprise – just wanting to plug in* Mobile Device Management.
© 2012 All rights reserved to Ceedo. Flexible Desktops. Dynamic Workplace. Ceedo for Citrix Optimal User Experience & Maximum IT Control Ceedo for Call.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Introducing Kaspersky OpenSpace TM Security Introducing Kaspersky ® OpenSpace TM Security Available February 15, 2007.
1 Panda GateDefender Performa Your First Line of Defense Product Presentation Name 2008.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
Secure Access using IAG 2007 Presented by: Brian Dunleavy - Healthcare Business Manager - Eurodata Susanna Watson – Pre Sales Technical Consultant - Eurodata.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Information Security in Real Business
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Norman SecureSurf Protect your users when surfing the Internet.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Policy and Configuration Compliance for Devices Connecting to the Wireless Network.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
One Platform, One Solution: eToken TMS 5.1 Customer Presentation November 2009.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Selling Strategies Microsoft Internet Security and Acceleration (ISA) Server 2004 Powerful Protection for Microsoft Applications.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
Forefront – Security in Education Stephen Cakebread Security Solutions Sales Professional Microsoft Corporation.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
SonicWALL SSL-VPN Series Easy Secure Remote Access Cafferata Cristiano SE Italia.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
Edge Security with Forefront Sandeep Modhvadia Security Specialist.
Asif Jinnah Field Desktop Services Enabling a Flexible Workforce, an insider’s view.
© Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. Introducing Check Point Endpoint Security J E (John)
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
Kaspersky Small Office Security INTRODUCING New for 2014!
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Novell iFolder Novell Academy QuickTrain. What is iFolder? Novell iFolder lets users’ files follow them anywhere A simple and secure way to access, organize.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Web Content Security Unlock the Power of the Web
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
BUILD SECURE PRODUCTS AND SERVICES
Stop Those Prying Eyes Getting to Your Data
Barracuda Web Security Flex
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Filtering Service
AT&T Premises-Based Firewall Enhanced SBS Solution
Chapter 6 Application Hardening
Securing the Network Perimeter with ISA 2004
Forefront Security ISA
Threat Management Gateway
Introducing ProxyClient
Virtual Private Network
Cloud Security for Endpoints
Implementing Client Security on Windows 2000 and Windows XP Level 150
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Increase and Improve your PC management with Windows Intune
Field Systems Engineer F5 Networks Central Europe
Designing IIS Security (IIS – Internet Information Service)
Presentation transcript:

Check Point Connectra NGX R60 Patrick Hanel 24 November 201824 November 2018

Agenda SSL VPN - Anywhere access - Everywhere issue - The future of SSL VPN Check Point Connectra: Secure Web-based connectivity - Integrated endpoint security and application security - Universal updateability - Easy deployment and management - Flexible platform options - Uniqueness in SSL VPN 24 November 2018

SSL VPN: Anywhere Access Add more remote users beyond current 20 percent Less technical employees Partners Reduce remote access support costs Browser based; no client maintenance Less end user complexity Additional access options Access from home PC, corporate PC, Internet kiosk Day Extenders Email Basic applications Home computer Teleworkers Email Applications Company computer Mobile workers Email Basic applications Company computer or public computer Intranet Email Applications Files Extranet Portal Extranet access Partner computers 24 November 2018

SSL VPN: Everywhere Access With IPSec you knew who was coming in With SSL VPN you don’t (usually) Firewall, antivirus + Company- owned PC Partner PC Access Agreement Company- owned PC Employee home PC Partner PC Public Internet kiosk Completely unmanaged/unsecured 24 November 2018

SSL VPN: The Everywhere Issue “Spyware is no longer just an annoying pest swarming home PCs; rather, it has evolved into a serious enterprise security threat.” – IDC Worldwide Spyware 2004-2008 Forecast and Analysis (Nov. 2004) Internal applications Generally nonhardened SSL VPN Gateway External endpoints Range from secure to completely unsecured 24 November 2018

The Future of SSL VPN: Unification SSL VPNs will follow IPSec evolution: Connectivity + Security Key SSL VPN Needs ANYWHERE ACCESS Browser-based access Provide access to client/server applications Anywhere Access Network Access EVERYWHERE SECURITY Enforce Policy and Secure Data Manage the everywhere security problem Harden applications from security threats Secure Applications UNIFIED MANAGEMENT Easy to Deploy Minimize deployment and support time 24 November 2018

Check Point Connectra Web Connectivity with Unmatched Security Server Authentication Server (Optional) Email Server File Share Server Non-Web Application Server Check Point Connectra Anywhere Access Network Access Enforce Policy and Secure Data Secure Applications Easy to Deploy Unified Web Security Gateway Secure Web-Based Connectivity Integrated Endpoint Security Integrated Application Security Easy Deployment and Management Flexible Deployment Options 24 November 2018

Secure Web Based Connectivity Connectra Web Portal Access client/server applications through browser plug-in Web-based access to email Access Web sites and applications Access file share servers 24 November 2018

Integrated Endpoint Security Key benefits Minimizes risk from unsecured endpoints Stops ID, password, and data theft Check Point Connectra Guest PC, unmanaged Limit access rights Scans for spyware and malware Enforces endpoint security compliance (antivirus/firewall) Provides secure browser for data encryption and cache cleaning Real-time endpoint security updates Public PC using secure browser Grant higher access rights Spyware and malware Antivirus and firewall compliance Secure browser Spyware detected Deny access 24 November 2018

Integrated Application Security Application Intelligence and Web Intelligence Application-layer protection DNS, FTP, HTTP, Microsoft CIFS, etc. Block malicious data Buffer overflows, DOS attacks, SQL injection, worms, etc. Real-time security updates Key benefits Ensures internal applications and resources are secure Increases security protection for when endpoints are less secure Normal user Hacker/ infected PC Check Point Connectra Normal user 24 November 2018

Universal Updateability Perimeter, Internal, Web Strategy: Universal Updateability Update to All Security Components Application Intelligence and Web Intelligence Endpoint Security Universal SmartDefense Delivers the power to update each Check Point solution in real time against the latest known and unknown security threats 24 November 2018

Easy Deployment and Management Key benefits Simplifies installation and management Leverages existing infrastructure Authentication Integration LDAP, RADIUS, SecureID Application Integration OWA, Citrix, iNotes, etc. Email, File Share SSO Management Web-based Optional SmartCenter integration SmartCenter Server Authentication Server SSL Check Point VPN-1 Check Point Connectra Management Station (SmartCenter) 24 November 2018

Connectra NGX R60 and SmartCenter Unified Security Management NGX SmartCenter SmartView Tracker SmartView Monitor Smart Update SmartDefense Service 24 November 2018

Flexible Platform Options Key benefits Match platform with price/performance requirements Connectra appliance Turnkey solution Hardened Check Point or OPSEC hardware platform Multiple platforms to match deployment size Connectra software Software for open servers Based on SecurePlatform Available as dedicated appliance or software for open servers Connectra software Connectra appliance 24 November 2018

Connectra Uniqueness in SSL VPN Connectra 2.0 warrants consideration, especially when compared with other enterprise remote-access solutions. It has all of the core features, plus solid end-point security. With Connectra 2.0, Check Point Software Technologies Ltd. leverages its vast experience securing networks, applications and client endpoints to provide the most comprehensive security feature set we've seen in an SSL VPN product to date. March 14, 2005 Key SSL VPN Needs CONNECTIVITY Anywhere Access Almost all vendors deliver similar set of connectivity features SSL Network Extender a solid performer Some deliver some features Most rely on third-party startups to fill in gaps Connectra the most integrated security, only solution with real-time security updates Standalone solutions, no integration Unified Security Architecture: Centralized security management Network Access SECURITY Enforce policy and Secure Data Secure Applications MANAGEABILITY Easy to Deploy 24 November 2018

Unified Web Security Gateway Thank You! Web Server Authentication Server (Optional) Email Server File Share Server Non-Web Application Server Check Point Connectra Anywhere Access Network Access Enforce Policy and Secure Data Secure Applications Easy to Deploy Unified Web Security Gateway Secure Web-Based Connectivity Integrated Endpoint Security Integrated Application Security Easy Deployment and Management Flexible Deployment Options 24 November 2018