©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новинки Check Point Антон Разумов Check Point Software Technologies.

Slides:



Advertisements
Similar presentations
KASPERSKY ANTI VIRUS Independent tests show Kaspersky to be the #1 in terms of Virus detection, false positives and response time for new viruses. Antivirus.
Advertisements

1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
The Cable Guys Inc. Drew Leach Tom McLoughlin Philip Mauldin Bill Smith.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
© 2008 McAfee, Inc. “Endpoint” Security Defining the endpoints and how to protect them.
MSIT 458: Information Security & Assurance By Curtis Pethley.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
Unified Logs and Reporting for Hybrid Centralized Management
Information Security in Real Business
MIGRATION FROM SCREENOS TO JUNOS based firewall
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Комплексные решения безопасности масштаба предприятия. Решения от компании Check.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
WatchGuard: Your Security Partner of Choice Your Name Here.
Barracuda Networks Steve Scheidegger Commercial Account Manager
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
Unified Threat Management
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Новый VPN клиент – Discovery Антон Разумов Консультант.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Welcome to the Human Network Matt Duke 11/29/06.
Fortinet An Introduction
ShareTech 2015 Next-Gen UTM.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Exploring the Network Introduction to Networks.
Dell Connected Security Solutions Simplify & unify.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
Exploring the Network.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Network Security Update IDG Security Forum th of April 2008 Péter L. Juhász, Sales Manager South East Europe.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Sophos Live Protection. Agenda 1.Before and After Scenarios 2.Minimum Required Capabilities 3.How we do it 4.How we do it better.
The Changing World of Endpoint Protection
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
Astaro Security Gateway V7.5 Screenshots. Astaro Overview – Page 2 © Astaro 2009 Dashboard.
© Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. Introducing Check Point Endpoint Security J E (John)
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Chapter 1: Explore the Network
Fortinet Unified Threat Management ProCurve Open Network Ecosystem
Instructor Materials Chapter 1: Explore the Network
Barracuda Firewall The Next-Generation Firewall for Everyone
Barracuda Web Security Flex
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Chapter 1: Explore the Network
Matt G change over point ?
Check Point Connectra NGX R60
Hosted Security.
Presentation transcript:

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новинки Check Point Антон Разумов Check Point Software Technologies Консультант по безопасности

2 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Компании развиваются 2 Tele- working Application sharing Connecting branch offices ing with outsiders on PDAs Web applications Extranets Instant messaging IP Telephony Mobile workers

3 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. IPS UTM VPN Firewall Развитие интегрированных шлюзов

4 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. IPS UTM VPN Firewall Personal firewall Disk Encryption Anti-Virus VPN Client Защита в едином агенте на конечных точках

5 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. SMART Security Management Architecture Management Compliance Reporting Monitoring IPS Personal firewall UTM Disk Encryption VPNAnti-Virus FirewallVPN Client Единая консоль управления

6 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. 31% Others 33% Cisco 25% Juniper 11% Source: Frost & Sullivan, World Firewall IPSec VPN Gateway Markets, 2006 Only major 100% pure security-focused software provider Essential products, services and partners to lead industry Longevity and experience to better defend against existing and emerging threats Frost & Sullivan ranks Check Point as #1 in worldwide market share in the firewall & IPSec VPN market Worldwide Leader in Firewall and IPSec VPN Gateways

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Шлюзы безопасности Total Security UTM-1 Power-1

8 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Механизмы защиты Total Security Intrusion prevention subscription Anti spyware subscription Web application firewall expansion SSL VPN expansion Web Filtering subscription VPN (site-to-site, remote access) standard Antivirus (at the gateway) subscription The best Firewall in the market HTTPFTP Instant Msg P2P VoIPSQL standard * End of Q Messaging security subscription NEW!

9 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Pro-active Protection (ex: 2007)

10 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Gateway security landscape Point product providersRequirementsPure security Firewall IDS/IPS Messaging Security Remote access Content Security Firewall Vendors VPN Vendors IDS/IPS Vendors Msg Sec Vendors Content Vendors Market leading firewall with Application Intelligence™ IPS/IDS – dedicated and integrated VPN: site-to-site, access, client/clientless, IPSEC/SSL Unified, managed, integrated into the gateway Content & Messaging Security Data Leak Prevention* Any scale, size, performance, virtualization, availability Firewall with application awareness IDS/IPS VPN Site-to-site / remote access Data, content, messaging security Virtualization, availability, scalability Unified, managed, integrated with endpoint * planned Check Point is only company to integrate these security components into single gateway Scaleable for any size with Unified Management

11 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. List Price The Expanded Appliance Line 4 FW Throughput (Gbps) Small Office / Branch Small Office / Branch SMB / Medium Branch SMB / Medium Branch $5K$20K$55K Enterprise Perimeter / Core / Large Branch Enterprise Perimeter / Core / Large Branch UTM-1 Edge X32 $15K$45K$10K$35K$25K$2.5K UTM UTM UTM UTM UTM UTM M2 M6 M8 Power Power

12 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новые модели начального уровня 3 новых UTM-1 Total Security  Новые модели начального уровня с ценой от $5,000  Высокая производительность от 400 Mbps до 4 Gbps  Комплексная безопасность  Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam  Обновления безопасности включены в стоимость  Встроенное централизованное управление UTM-1 270UTM-1 570UTM

13 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances  Рекордное отношение цена/производительность –От $4/Mbps  Высочайшая производительность и безопасность –Пропускная способность шлюзов до 14 Gbps –Предотвращение атак до 6 Gbps  Удобное внедрение –ПО и железо от одного вендора High Security for High Performance Environments Power Power

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Внутренние угрозы. Что делать?

15 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Кто нас атакует? PriceWaterHouseCoopers : The Global State of Information Security (2007) Who attacked us? Security ExecutivesOnly Employee/former employee51%69%84% Hacker54%41%40%

16 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Проблемы безопасности рабочих станций Malware: viruses, worms, spyware, zero-day Простой систем, затраты на восстановление, кража паролей Secure Access: ensure control, confidentiality Неавторизованный доступ, перехват, неуправляемые ПК Data Loss: lost/stolen endpoint devices Соответствие законодательству, ущерб репутации Management: multiple agents, consoles Рост стоимости, трудозатрат, низкая производительность

17 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Единая система управления для контроля всей системы ИБ

18 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Наиболее полное решение  Снижает риски на рабочих станциях  Унифицирует основные компоненты защиты  Единственное решение, включающее и защиту данных и VPN  Снижает риски на рабочих станциях  Унифицирует основные компоненты защиты  Единственное решение, включающее и защиту данных и VPN Antivirus Anti-spyware Data Security VPNFirewall/NAC 15 years leadership in firewalls Based on award- winning ZoneAlarm Market-leading Pointsec ® technology 12 years leadership in remote access VPN Unified Management

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Выводы

20 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Perimetrix: Самые популярные средства ИБ Самые популярные средства ИБ

21 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

22 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

23 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

24 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

25 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

26 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

27 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

28 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Итог  Простота, снижение расходов  Но не в ущерб безопасности!!! –И все под контролем

29 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. ENDPOINT One single security client GATEWAY One unified product line MANAGEMENT One single console totalsecurity from Check Point

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Антон Разумов Check Point Software Technologies Консультант по безопасности