Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.

Similar presentations


Presentation on theme: "©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION."— Presentation transcript:

1 ©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION

2 ©2015 Check Point Software Technologies Ltd. 2 TRUE STORY Electronics manufacturer with high volumes of IP Employees want to connect mobile devices to corporate apps to be more productive CISO: Not confident devices are secure

3 ©2015 Check Point Software Technologies Ltd. 3 [Restricted] ONLY for designated groups and individuals The organization has 4-5% mobile infection and CISO now mandates all devices have mobile threat prevention. What threats did they find? What types of employees? How could they impact their business? ARE THEY SECURE? CISO turns to Check Point. The problem is more serious than they thought:

4 ©2015 Check Point Software Technologies Ltd. 4 [Restricted] ONLY for designated groups and individuals EXECUTIVE HAS MAN-IN-THE-MIDDLE ATTACK WHILE AT CAFÉ. What could a cyber attacker do? Intercept VDI sessions Capture corporate emails

5 ©2015 Check Point Software Technologies Ltd. 5 [Restricted] ONLY for designated groups and individuals Steal username and password of VPN Extract data typed in corporate applications RESEARCHER HAS A CREDENTIAL STEALER ON HER DEVICE. What could a cyber attacker do?

6 ©2015 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals BUSINESS MANAGER HAS A MALICIOUS APPLICATION. What could a cyber attacker do? Extract emails, contacts, calendar Turn on microphone during strategic partner meeting

7 ©2015 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 7 MOBILE THREATS are ESCALATING in frequency and sophistication 1 Source: Kindsight Security Labs Malware Report 2014 2 Source: Kaspersky IT Threat Evolution Q1 2015 Report 3 Source: Check Point Targeted Attacks on Enterprise Mobile In the Enterprise: 50% chance you having 6 or more mobile targeted attacks 3 Sophistication of mobile threats on the rise: Ransomware, Masque Attack, Wirelurker. Pangu, Heartbleed, xSSer mRAT, and more 3.3x new malicious mobile programs were detected in Q1 2015 than it did over the previous quarter. 15 million mobile devices infected with Malware 1

8 ©2015 Check Point Software Technologies Ltd. 8 WHAT WE DON’T CONTROL? How to protect against

9 ©2015 Check Point Software Technologies Ltd. 9 Mix of personal and business data Can’t control individuals’ behavior No protection from zero day or advanced threats MOBILE DEVICES Are difficult to control

10 ©2015 Check Point Software Technologies Ltd. 10  Focused on device management  Provide only protection for known threats or app reputation  Limited protection from secure wrappers and containers Today’s solutions leave SECURITY GAPS.

11 ©2015 Check Point Software Technologies Ltd. 11 Solving the Mobile Security Gap ADVANCED THREAT DETECTION AND MITIGATION Check Point Mobile Threat Prevention HIGHEST LEVEL OF SECURITY FOR IOS AND ANDROID FULL VISIBILITY BEST MOBILE THREAT CATCH RATE THREAT ANALYTICS REAL-TIME REMEDIATION OF THREATS SIMPLE DEPLOYMENT TRANSPARENT USER EXPERIENCE

12 ©2015 Check Point Software Technologies Ltd. 12 [Restricted] ONLY for designated groups and individuals Highest Level of Mobile Security for the Enterprise The only solution providing advanced mobile threat detection across: Device (OS) Detecting attacks, vulnerabilities, configuration changes Applications Detecting malicious apps Network Detecting Man-in-the-Middle attacks

13 ©2015 Check Point Software Technologies Ltd. 13 [Restricted] ONLY for designated groups and individuals HOW IT WORKS CLOUD-BASED RISK ASSESSMENT, THREAT DETECTION AND MITIGATION Agent runs in the background on device, sending risk data to Check Point Mobile Threat Prevention MTP analyzes device, apps and networks to detect attacks 3 MTP assigns a real-time risk score, identifying the threat level. 4 On Device Remediation Immediately Sent to User Risk-based Network Protection Real-time Intelligence & Control; MDM and SIEM integration 2 … DEVICE UNPROTECTED Threat Found Click to remove 1

14 ©2015 Check Point Software Technologies Ltd. 14 Innovation Drives Industry’s Highest Mobile Threat Catch Rate [Restricted] ONLY for designated groups and individuals Advanced App Analysis Sandboxing (Emulation) Advanced Static Code Analysis Uncovers new malware and targeted exploits Network Wi-Fi Man-in-the-Middle (MitM) attacks Host Threat Analysis Malicious Configurations Exploits and file system manipulation Threat Framework Multi-dimensional Risk/Trust assessments Accurate risk classifications to effectively mitigate risk

15 ©2015 Check Point Software Technologies Ltd. 15 Real time detection reporting and analysis with greater cross-platform mobile threat visibility and control SIMPLE DEPLOYMENT SIMPLE Easy to use and deploy SaaS platform SCALABLE Highly scalable with strong operational efficiencies INTELLIGENT Integration with MDM, SmartEvent, Incident response and more

16 ©2015 Check Point Software Technologies Ltd. 16 USER EXPERIENCE Preserves user device experience, battery life, privacy Easily push lightweight agent to users through your MDM Amnon: Graphics is not consistent TRANSPARENT

17 ©2015 Check Point Software Technologies Ltd. 17 Taking Mobile Security Beyond Mobile Threat Prevention [Restricted] ONLY for designated groups and individuals ​ Mobile Threat Prevention Threat Prevention for mobile devices Capsule Cloud Protect laptops when off the business network Capsule Workspace & Docs Protect business data on mobile devices Target solutions for mobile use-cases

18 ©2015 Check Point Software Technologies Ltd. 18 ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Summary HIGHEST LEVEL OF SECURITY FULL MOBILE THREAT VISIBILITY AND INTELLIGENCE SIMPLE DEPLOYMENT CHECK POINT MOBILE THREATPREVENTION

19 ©2015 Check Point Software Technologies Ltd. 19 ©2015 Check Point Software Technologies Ltd. THANK YOU [Restricted] ONLY for designated groups and individuals

20 ©2015 Check Point Software Technologies Ltd. 20 [Restricted] ONLY for designated groups and individuals Pricing Per device license Package Per Device License (device / month) Mobile Threat Prevention$4 Package Per User License (user/ month) Mobile Threat Prevention$8 Per user license (3 devices)

21 ©2015 Check Point Software Technologies Ltd. 21 Insertion PointMalware Network & Exploits Network Application based Threats ✓ Partial Network & OS based Threats ✓✓✓ Vulnerability Management ✓ Multi-Platform ✓✓✓ Partial Adaptive Mitigation ✓ Partial - Confidential and Proprietary - Competitive Analysis


Download ppt "©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION."

Similar presentations


Ads by Google