Download presentation
Presentation is loading. Please wait.
Published byMorgan McKinney Modified over 8 years ago
1
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security Engineer fsuijten@checkpoint.com
2
2©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Bring Your Own Device Remote Desktop Business Apps
3
3©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | IT Manager 3,000 users in the company… …3,000 corporate endpoints… …and almost 6,000 devices connected to the network!
4
4©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Today’s Workforce Source: The impact of mobile devices on information security January 2012. Check Point Software Technologies. N=768The impact of mobile devices on information security65% Allow personal devices Allow mobile devices in the organization89% Organizations Enable Mobile Devices
5
5©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Data Protection Challenges in Endpoint and Mobile Environments ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 6
6
6©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Communication Eavesdropping
7
7©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Physical Access to Lost/Stolen Device
8
8©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Allow Apps to Access Business Data
9
9©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Store Data on Unmanaged Devices Save Work from home on a personal device via Outlook Web Access
10
10©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Infected Devices May Leak Data Exploit vulnerabilities Rogue Applications Social Targeted Rooted device
11
11©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Data Security Challenges – Summary Secure Unmanaged & BYOD Secure the Documents Secure the Data Secure the Communication
12
12©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Securing Data in Endpoint and Mobile Environments ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 13
13
13©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point Protects Business Data Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication
14
14©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Communication Privacy Remote Access Solutions for Any Device
15
15©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point Mobile Introducing: VPN Apps for iOS & Android Portal for Web-Apps Single Sign On Online access Portal for Web-Apps Single Sign On Online access VPN tunnel for any App Automatic connect IPsec or SSL VPN VPN tunnel for any App Automatic connect IPsec or SSL VPN Check Point Mobile VPN Android v4 support Q2.2012
16
16©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Simple to set up Install “Check Point Mobile VPN” via the App Store Set up your profile: Click a link OR Scan a QR Code Done! VPN secures your Communication
17
17©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Strong Authentication Certificate and username/password Pair device with its owner for a safer connection Two-factor authentication for safe connectivity
18
18©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | User and Device Access Control Personalized portal, based on identity Set up device security features Control data access by user and device settings Remote-wipe device upon loss
19
19©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data
20
20©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Full Disk and Media Encryption Protect Business Data from Unauthorized Access when Laptops and Storage Devices are Lost or Stolen 11 Years of Leadership in the Gartner’s Mobile Data Protection Magic-Quadrant
21
21©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | User Engagement and Education CONFUSING EXPLAINING Personal removable storage device (1TB) E80.40 – Q3 2012
22
22©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80 “The value of E80 is most clearly the central policy and the rich reports. The client interface is easy and transparent for most users.” —Government Agency, Total Security, 1500 seats, E80.20 UNIFIED Management for all Endpoint Security Software Blades Control and view the security for USERS, not just for machines
23
23©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80.40 E80.40 – Q3 2012 Express a Simple and Understandable Organizational Endpoint Security Policy
24
24©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80.40 Know that the organization follows the required security policy
25
25©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data
26
26©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protecting Data with Document Security Document Security H2.2012 The Security follows the document Simple access to documents from PC, Mac, Smartphones and tablets Share documents securely with co-workers and external partner
27
27©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | CEO Document Security – User Experience Document Security H2.2012 Dana (co-worker) Full Access Dana (co-worker) Full Access Suzan (not in the project) No Access Suzan (not in the project) No Access John (Purchasing partner) Read and Print John (Purchasing partner) Read and Print Tammy creates a document Assigns a security policy to the document
28
28©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Simple to Access Protected Documents Document Security App for iPhone, iPad and Android Web Portal for other devices Transparent access with the Document Security Agent
29
29©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data
30
30©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point GO – Turn Any PC to Your Business Environment Work with corporate data from any PC Virtual workspace Plug-and-play Portable apps Secure USB mode Work with corporate data from any PC Virtual workspace Plug-and-play Portable apps Secure USB mode
31
31©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | GO Portable Application Store Available in the Cloud One Click Application Download and Install Growing Application Portfolio
32
32©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | GO Folder Mode GO launches virtual desktop Unmanaged Computer GO allows native accesss mode Trusted Computer Direct access to files from trusted computers
33
33©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Let’s review the challenges again…
34
34©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Secure Unmanaged & BYOD Secure the Documents Secure the Data Secure the Communication Data Security Challenges – Summary Check Point GO turns any device into a secure business environment Document Security enables secure sharing with co-workers and business partners Endpoint Security Suite protects data stored on mobile devices Remote Access Clients and VPN Portal protect the communication to the business
35
35©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Summary Secures COMMUNICATION Protects DISKS and STORAGE DEVICES Proactively Secures DOCUMENTS Protects the UNMANAGED DEVICES UNIFIED management and control Check Point Protects Business Data on Endpoints and Mobile Devices
36
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Thank You
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.