PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,

Slides:



Advertisements
Similar presentations
Enabling business beyond the corporate network.
Advertisements

(c) 2003, SOHOware, Inc. Proprietary and Confidential Your OEM Partner for Intel XScale based Networking Appliances Targeting Small and Medium Business.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1 © Copyright 2013 Fortinet Inc. All rights reserved. Fortinet High Performance Network Security Data Connectors – Los Angeles Edwin Mendoza – Manager.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
© Copyright 2012 Cyberoam Technologies Pvt. Ltd. All Rights Reserved. Securing You Cyberoam Virtual UTM Our Products Unified Threat Management.
Bucharest, July 31, 2012 | Bitdefender 2012 Cloud Security for Endpoints Customer Presentation.
Network Security for the Distributed Enterprise January 2011.
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Changing the Face of Intrusion Prevention: Check Point IPS Software Blade.
© Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. Check Point Appliances “Expanding your business “
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
©2005 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software SSL VPN Solutions Technical Overview Thorsten Schuberth Technical.
All-In-One Security Overview The most benefits for your dollar, period.
MSIT 458: Information Security & Assurance By Curtis Pethley.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
Unified Logs and Reporting for Hybrid Centralized Management
1 SharePoint Momentum 17K+ Customers, 100M Licenses Leader in Gartner ® Magic Quadrants, Forrester Wave TM Continued Platform and Application Innovation.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
MIGRATION FROM SCREENOS TO JUNOS based firewall
SecPath Firewall Architecture. Objectives Upon completion of this course, you will be able to: Understand the architecture of SecPath series firewalls.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Norman Endpoint Protection Advanced security made easy.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
WatchGuard: Your Security Partner of Choice Your Name Here.
Barracuda Networks Steve Scheidegger Commercial Account Manager
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Network Security Professor Professor Dr. Adeel Akram.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties MORE, BETTER, SIMPLER Security Oded Gonda.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
000000_1 Confidential and proprietary information of Ingram Micro Inc. — Do not distribute or duplicate without Ingram Micro's express written permission.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Barracuda Load Balancer Server Availability and Scalability.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Fortinet An Introduction
ShareTech 2015 Next-Gen UTM.
WatchGuard ® Firebox ® X Presenter Date. The Security You Really Need WebBlocker FW/VPN SpamScreen Authentication Model Upgrades Intrusion Prevention.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Network Security Update IDG Security Forum th of April 2008 Péter L. Juhász, Sales Manager South East Europe.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
1 ABNER GERMANOW DIRECTOR ENTERPRISE MARKETING. 2 NEW ATTACK SURFACES DATACENTER CONSOLIDATIONNEW DEVICESBRANCH LOCATIONS.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential Moving Beyond the Perimeter with Intelligent Security Alfredo Cusin Channel Mgr.
Agenda Current Network Limitations New Network Requirements About Enterasys Security Branch Office Routers Overall Enterprise Requirements Proposed Solution.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Barracuda NG Firewall ™
Network Security Solution
Centralized Management for Barracuda Networks products
Barracuda Firewall The Next-Generation Firewall for Everyone
Configuring ALSMS Remote Navigation
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
UTM (Unified Threat Management) Firewalls
Hybrid Management and Security
Forefront Security ISA
SPECIAL OFFER NetDefend UTM Firewall RRP€ 1063 SP€ 932 DFL-870
Check Point Connectra NGX R60
Cloud Security for Endpoints
(With Hybrid Network Support)
AT&T Firewall Battlecard
Presentation transcript:

PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007, Praha, Hotel Diplomat

2 Check Point Proprietary & Confidential Material IPO VPN-1 Check Point has driven many of the industry innovations since 1993 Establishment Acquisition of FireWall-1 1.0, Stateful inspection Architecture VPN-1 Power, VPN-1 UTM Web security IDS/IPS SSL VPN Application Intelligence Acquisition of FW-1 VPN-1 UTM-1

3 Check Point Proprietary & Confidential Material Technology from the industry leader Best Enterprise Firewall 2006 Best VPN IPSec Remote Access Solution 2006 Best SOHO Security Solution 2006 Midmarket Product Of The Year 2005 Most Innovative Product 2005 Leader - Magic Quadrant for Enterprise Network FW 2006 Leader – Magic Quandrant for Personal Firewalls 2006 Leader – META Spectrum Intrusion Control 2005 Global Market Leadership Award for End Point Security 2005 Worldwide FW/VPN Market Leader 2005

4 Check Point Proprietary & Confidential Material 1993 Check Point patented “Stateful inspection”, the technology behind all modern firewalls 100% Of the Fortune100 companies rely on Check Point to protect their network and application The industry-standard firewall is the core of the UTM-1 appliance

5 Check Point Proprietary & Confidential Material Introducing UTM-1 UTM-1

6 Check Point Proprietary & Confidential Material Small office/ Home Office Small office/ Home Office Mid Market Branch office & Mid size businesses Mid Market Branch office & Mid size businesses Enterprise & Data Centers Enterprise & Data Centers price Performance Right in the middle HW platform The right Platform The right Platform $3,000$300$15, Gbps 1 Gbps 100 Mbps Edge UTM-1 VPN-1 UTM, VPN-1 Power VPN-1 UTM, VPN-1 Power

7 Check Point Proprietary & Confidential Material Built-In Central Management Check Point’s Proven Security The security you need More than 8 Integrated Security Applications in One Device More than 8 Integrated Security Applications in One Device

8 Check Point Proprietary & Confidential Material Packed with advanced security features Intrusion prevention subscription Anti spyware subscription Web application firewall expansion SSL VPN expansion URL filtering* subscription VPN (site-to-site, remote access) standard Antivirus (at the gateway) subscription The best Firewall in the market HTTPFTP Instant Msg P2P VoIPSQL standard * End of Q1 2007

9 Check Point Proprietary & Confidential Material Anti-virus IPS VPN / Firewall “ Sum-of-the-parts ” security Coordinated security Security benefit from integration A tightly integrated security solution: Total protection > the sum of the parts Appliances are based on Check Point’s Unified Security Architecture: NGX technology allows all components to work together in harmony

10 Check Point Proprietary & Confidential Material Truly integrated central management Update Across all enforce points (users, gateways, offices, etc.) Across all security functions (FW, VPN, AV, etc.) UNIFIED SECURITY ARCHITECTURE ONE Console Operation Administrator ONE GUI (and GUI layout)

11 Check Point Proprietary & Confidential Material Total management flexibility Appliance can be used to manage other appliances Appliance can work stand-alone Appliance can be managed by existing SmartCenter / Provider-1 infrastructure Existing Check Point management platform Fits in the Check Point Unified Security Architecture Management platform pre-loaded, no separate system required

12 Check Point Proprietary & Confidential Material One single management console: pre-loaded on every appliance ALL security functions in 1 place ALL enforce points in 1 place 1 consistent GUI for all functions

13 Check Point Proprietary & Confidential Material Example: real-time event logging Example: real-time traffic summary Central monitoring of threats

14 Check Point Proprietary & Confidential Material Pre-loaded extensions that can be activated through a simple license extension Anti Spyware Web application firewall Anti Spyware SSL VPN

15 Check Point Proprietary & Confidential Material The simplicity you want Easy installation and management Simple licensing Well-defined RMA / support process

16 Check Point Proprietary & Confidential Material Up and Running in 10 Minutes Unpack, turn on Click through setup wizard Start configuring policies minutes

17 Check Point Proprietary & Confidential Material Well-defined support process 2 year included Standard supportPremium support Hardware warranty 2 HW: Next business day shipment latest hotfixes, service packs and major upgrades 12 x 5 x 4 hours Standard Support Premium Support HW: Same business day shipment latest hotfixes, service packs and major upgrades 24 x 7 x 30 minutes

18 Check Point Proprietary & Confidential Material Build-in Central Management Build-in Central Management Check Point’s Proven Security Check Point’s Proven Security The security you need, The simplicity you want The security you need The simplicity you want More than 8 Integrated Security Applications in One Devices More than 8 Integrated Security Applications in One Devices Easy installation and management Simple licensing Well-defined RMA / support process

19 Check Point Proprietary & Confidential Material Ethernet ports FW throughput VPN throughout Sessions Users (rec.) USB ports UTM GE 400 Mbps 190 Mbps 500, UTM GE + 4 FE 1Gbps 250 Mbps 1.2 million UTM GE + 4 FE 2 Gbps 400 Mbps 2 million 1,000 2 Always a model that fits your need More models to be released soon

20 Check Point Proprietary & Confidential Material Questions?