Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security.

Similar presentations


Presentation on theme: "©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security."— Presentation transcript:

1 ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security Engineer fsuijten@checkpoint.com

2 2©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Bring Your Own Device Remote Desktop Business Apps

3 3©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | IT Manager 3,000 users in the company… …3,000 corporate endpoints… …and almost 6,000 devices connected to the network!

4 4©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Today’s Workforce Source: The impact of mobile devices on information security January 2012. Check Point Software Technologies. N=768The impact of mobile devices on information security65% Allow personal devices Allow mobile devices in the organization89% Organizations Enable Mobile Devices

5 5©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Data Protection Challenges in Endpoint and Mobile Environments ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 6

6 6©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Communication Eavesdropping

7 7©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Physical Access to Lost/Stolen Device

8 8©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Allow Apps to Access Business Data

9 9©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Store Data on Unmanaged Devices Save Work from home on a personal device via Outlook Web Access

10 10©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Infected Devices May Leak Data Exploit vulnerabilities Rogue Applications Social Targeted Rooted device

11 11©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Data Security Challenges – Summary Secure Unmanaged & BYOD Secure the Documents Secure the Data Secure the Communication

12 12©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Securing Data in Endpoint and Mobile Environments ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 13

13 13©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point Protects Business Data Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication

14 14©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Communication Privacy Remote Access Solutions for Any Device

15 15©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point Mobile Introducing: VPN Apps for iOS & Android Portal for Web-Apps Single Sign On Online access Portal for Web-Apps Single Sign On Online access VPN tunnel for any App Automatic connect IPsec or SSL VPN VPN tunnel for any App Automatic connect IPsec or SSL VPN Check Point Mobile VPN Android v4 support Q2.2012

16 16©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Simple to set up Install “Check Point Mobile VPN” via the App Store Set up your profile: Click a link OR Scan a QR Code Done! VPN secures your Communication

17 17©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Strong Authentication Certificate and username/password Pair device with its owner for a safer connection Two-factor authentication for safe connectivity

18 18©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | User and Device Access Control Personalized portal, based on identity Set up device security features Control data access by user and device settings Remote-wipe device upon loss

19 19©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data

20 20©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Full Disk and Media Encryption Protect Business Data from Unauthorized Access when Laptops and Storage Devices are Lost or Stolen 11 Years of Leadership in the Gartner’s Mobile Data Protection Magic-Quadrant

21 21©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | User Engagement and Education CONFUSING EXPLAINING Personal removable storage device (1TB) E80.40 – Q3 2012

22 22©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80 “The value of E80 is most clearly the central policy and the rich reports. The client interface is easy and transparent for most users.” —Government Agency, Total Security, 1500 seats, E80.20 UNIFIED Management for all Endpoint Security Software Blades Control and view the security for USERS, not just for machines

23 23©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80.40 E80.40 – Q3 2012 Express a Simple and Understandable Organizational Endpoint Security Policy

24 24©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Endpoint Security Management E80.40 Know that the organization follows the required security policy

25 25©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data

26 26©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protecting Data with Document Security Document Security H2.2012 The Security follows the document Simple access to documents from PC, Mac, Smartphones and tablets Share documents securely with co-workers and external partner

27 27©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | CEO Document Security – User Experience Document Security H2.2012 Dana (co-worker) Full Access Dana (co-worker) Full Access Suzan (not in the project) No Access Suzan (not in the project) No Access John (Purchasing partner) Read and Print John (Purchasing partner) Read and Print Tammy creates a document Assigns a security policy to the document

28 28©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Simple to Access Protected Documents Document Security App for iPhone, iPad and Android Web Portal for other devices Transparent access with the Document Security Agent

29 29©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Protect Unmanaged and BYOD Protect Documents Protect Data Stored on Mobile Devices Protect Communication Check Point Protects Business Data

30 30©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Check Point GO – Turn Any PC to Your Business Environment  Work with corporate data from any PC  Virtual workspace  Plug-and-play  Portable apps  Secure USB mode  Work with corporate data from any PC  Virtual workspace  Plug-and-play  Portable apps  Secure USB mode

31 31©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | GO Portable Application Store Available in the Cloud One Click Application Download and Install Growing Application Portfolio

32 32©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | GO Folder Mode GO launches virtual desktop Unmanaged Computer GO allows native accesss mode Trusted Computer Direct access to files from trusted computers

33 33©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Let’s review the challenges again…

34 34©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Secure Unmanaged & BYOD Secure the Documents Secure the Data Secure the Communication Data Security Challenges – Summary Check Point GO turns any device into a secure business environment Document Security enables secure sharing with co-workers and business partners Endpoint Security Suite protects data stored on mobile devices Remote Access Clients and VPN Portal protect the communication to the business

35 35©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | Summary  Secures COMMUNICATION  Protects DISKS and STORAGE DEVICES  Proactively Secures DOCUMENTS  Protects the UNMANAGED DEVICES  UNIFIED management and control Check Point Protects Business Data on Endpoints and Mobile Devices

36 ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Thank You


Download ppt "©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Securing Your Data in Endpoint and Mobile Environments Frank Suijten Security."

Similar presentations


Ads by Google