©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Новый VPN клиент – Discovery Антон Разумов Консультант.

Slides:



Advertisements
Similar presentations
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Advertisements

2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Introduction to Systems Management Server 2003 Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
SIM317 Built on top of Microsoft ® System Center Configuration ManagerBuilt on top of Microsoft ® System Center Configuration Manager Supports all.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Changing the Face of Intrusion Prevention: Check Point IPS Software Blade.
Securing Remote Network Access FirePass ®. Business Case VirginiaCORIS is an initiative to modernize the way that offender information is managed, to.
Module 3 Windows Server 2008 Branch Office Scenario.
Connect with life Gopikrishna Kannan Program Manager | Microsoft Corporation
Chapter 9: Troubleshooting and Repairing Networking.
Лицензирование Lync Представляем Microsoft Lync R2.
Managing a Windows Server 2003 Environment - SMS and MOM Michael Kleef IT Pro Evangelist Microsoft Pty Ltd
IT:Network:Apps.  Security Options  Group Policy  AppLocker  ACL.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Module 16: Software Maintenance Using Windows Server Update Services.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Installing a DHCP Server role on Windows Server 2008 R2 in a home network. This is intended as a guide to install the DHCP role on a Domain Controller.
Course 201 – Administration, Content Inspection and SSL VPN
Copyright Security-Assessment.com 2004 New Technology Enforcement Strategies by Peter Benson.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Clinic Security and Policy Enforcement in Windows Server 2008.
SOE and Application Delivery Gwenael Moreau, Abbotsleigh.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Что нового появилось после выхода R70 Антон Разумов
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новинки Check Point Антон Разумов Check Point Software Technologies.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple.
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
W O R L D W I D E L E A D E R I N S E C U R I N G T H E I N T E R N E T Technical Lab n°1 Guidelines End-to-End Security and VPN.
4x + 2y = 18 a. (1,8) = 18 a. 4(1) + 2(8) = 18 b. (3,3)20 = 18 b. 4(3) + 2(3) = = = 18 15x + 5y = 5 a. (-2,7) NoYes b. (-1,4) a.
Using Windows Firewall and Windows Defender
Using Microsoft Network Access Protection to test Dr.Web anti-virus software The workstations successfully checked by NAP can be used in a corporate network.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Введение в R71 Антон Разумов Консультант по безопасности.
70-411: Administering Windows Server 2012
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
Chapter 8: Configuring Networking. Exploring the Network and Sharing Center 2.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Module 2: Installing and Maintaining ISA Server. Overview Installing ISA Server 2004 Choosing ISA Server Clients Installing and Configuring Firewall Clients.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Name Company A Day in the Life… A Demonstration of Application Delivery.
The Future of Windows ComNET 2002 DC David Strom
Module 9: Designing Network Access Protection. Scenarios for Implementing NAP Verifying the health of: Roaming laptops Desktop computers Visiting laptops.
Microsoft Virtual Academy SP1. Real time Endpoint Protection operations from console Simplified Administration Single administrator experience for simplified.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone SmartEvent (Intro) Антон Разумов Консультант по безопасности.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Module 9: Designing Public Key Infrastructure in Windows Server 2008.
Module 8: Managing Terminal Services. Overview Use and manage Terminal Services RemoteApp programs Use and manage Terminal Services Gateway Optimize and.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Configuring Network Connectivity Lesson 7. Skills Matrix Technology SkillObjective DomainObjective # Using the Network and Sharing Center Use the Network.
© 2008 Microsoft Corporation. All rights reserved. This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED,
Walter Pitrof Technology Solution Professional Microsoft Switzerland Client Lifecycle Management mit Configuration Manager 2012 Chris Greuter Partner |
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security VPN R75 (SecureClient Next Generation)
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
69% of employees say they are accessing business apps on personal devices Organizations say 34% of their employees are accessing business apps on.
System Center 2012 Configuration Manager Service Pack 1 Overview.
Wireless Data Security Peter Michel CSC 8560 February 24, 2004.
IBM Software Group © 2008 IBM Corporation IBM Tivoli Provisioning Manager 7.1 OS Management with TPM for OS Deployment.
Windows Vista Configuration MCTS : Advanced Networking.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
Self-service enrollment for Windows desktops
Modernizing your Remote Access
Matt G change over point ?
Barracuda Solutions VMware® vCloud® Air™ Version 1.0 | February 2015.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Designing IIS Security (IIS – Internet Information Service)
SCCM in hybrid world Predrag Jelesijević Microsoft 7/6/ :17 AM
Making Windows Azure Relevant to IT Professionals
Presentation transcript:

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Новый VPN клиент – Discovery Антон Разумов Консультант по безопасности Check Point Software Technologies

2 2©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | План 1 Представляем Discovery 2 34 Сравнение продуктов Как это работает 5 Лицензирование и цены Требования к внедрению

3 3©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | План 1 Представляем Discovery 2 34 Сравнение продуктов Как это работает 5 Лицензирование и цены Требования к внедрению

4 4©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Зачем менять VPN клиента? Поддержка SecureClient скоро закончится (06’11) Требуется поддержка 64bit OS Развитие решений для удаленного доступа, управляемых централизованно и обеспечивающих расширенные функции безопасности

5 5©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Вспомним – Безопасное подключение Secure Client Secure Access Discovery Secure Client Security Gateway Security Management VPN Connect Firewall Policy Compliance Единая точка подключения

6 6©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Вспомним – Безопасное подключение Secure Client Secure Access Discovery Security Gateway Secure Access Security Management Improved VPN Connect Firewall Policy Endpoint Security Server Compliance Подключение VPN отдельно от управления

7 7©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Представляем Discovery Desktop Firewall & Compliance Check Управляется со SmartCenter/Provider-1 Лучший VPN клиент

8 8©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | “назад, в будущее” Secure Client Secure Access Discovery “Discovery” Security Gateway Security Management Improved VPN Connect Firewall Policy Compliance Единая точка подключения и улучшенный VPN

9 9©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | План 1234 Представляем Discovery Сравнение продуктов Как это работает 5 Лицензирование и цены Требования к внедрению

10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Расширенный функционал VPN Auto connect & network detection NoYes YES! Secure Client Endpoint Security R72 Discovery Automatic hotspot detection PartialYes YES! Secondary Connect YesNo YES! Location awareness PartialYes YES! Roaming NoYes YES! MEP Yes YES! Secure Domain Logon YesNo YES!

11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Функции безопасности Firewall rules Desktop PolicyFirewall rulesDesktop Policy Secure Client Endpoint Security R72 Discovery Compliance Check SCVCompliance Check SCV

12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Поддержка платформ Secure Client Secure Access with Endpoint Connect Discovery Cellular Modem cards in Win 7 NoYes YES! Vista / Windows 7 32 bit Vista / Windows 7 32 bit Yes YES! Vista/ Windows 7 64 bit Vista/ Windows 7 64 bit NoYes YES! Connect to VSX YesR67+

13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | План 1234 Представляем Discovery Сравнение продуктов Как это работает 5 Лицензирование и цены Требования к внедрению

14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Примеры Desktop Policy New Site creation Connectivity and firewall policy push

15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Примеры Desktop Policy New Site creation Connectivity and firewall policy push Discovery

16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Примеры Desktop Policy New Site creation Connectivity and firewall policy push Discovery

17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | План 1234 Представляем Discovery Сравнение продуктов Как это работает 5 Лицензирование и цены Требования к внедрению

18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Discovery как VPN blade ! $10 $15 $30 $60 Software blade VPN Firewall and Security Compliance Price per year $6 Included! Требуется: endpoint container + VPN software blade

19 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Up-sell opportunities $10 $15 $30 $60 Software blade VPN Firewall and Security Compliance Media Encryption / Port Protection Full Disk Encryption Antimalware / Program Control WebCheck Secure Browsing Total Endpoint Security Price per year $6 Included! $6 $20 $6 $30 Add additional functionality for just $6 !

20 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Миграция на Software Blades Бесплатный апгрейд на SW blade! Оставить «вечные» лицензии SecureClient Вариант 1 Обновить на контейнер и VPN software blade Вариант 2 После миграции дополнительные блейды всего за $6/год!

21 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | ЧаВо Использование Discovery обязывает мигрировать на SW Blades ? Нет, но такая миграция рекомендуется, поскольку обеспечивает более высокую безопасность по более низкой цене. Какие лицензии допустимы для Discovery? CPSB-EP-VPN – Endpoint Security VPN software blade CPVP-VSC - Check Point SecureClient CPVP-VSI - Check Point Integrity SecureClient CPEP-SA - Endpoint Security SecureAccess CPVP-VSIEP - Check Point Integrity SecureClient Suite

22 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | План 1234 Представляем Discovery Сравнение продуктов Как это работает 5 Лицензирование и цены Требования к внедрению

23 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Требования к внедрению Security gateway patch: HFA для R65. Security Management patch: не требуется Client Upgrade: перезагрузка и привилегии администратора не требуются Существующая политика SecureClient desktop policy может использоваться “Discovery” и SecureClient могут быть установлены совместно

24 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | Итоги Desktop Firewall для безопасности Управляется с Check Point SmartCenter/Provider-1 Лучший VPN клиент Endpoint Discovery

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Антон Разумов Консультант по безопасности Check Point Software Technologies