Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013.

Similar presentations


Presentation on theme: "©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013."— Presentation transcript:

1 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013 Elif Günaydın

2 2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point in 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3

3 3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Financial Performance Market Value 10.36 Billion $ Market Value 10.36 Billion $

4 4 4©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | The New Face of Next Generation Firewall

5 5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point’s Next Generation Firewall Discover and block threats in real time Secure use of Web 2.0 tools and data Comprehensive understanding of security events Look beyond IP—define security by user identity

6 6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Context-based Security Consolidated on the Security Gateway DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Check Point’s Next Generation Firewall

7 7 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 114 SPU 114 SPU 374 SPU 623 SPU 738 SPU 1046 SPU 1861 SPU 2900 SPU 22004200440048001220012400126002140021600 3300 SPU 3x performance3x performance Security Accelerator ModuleSecurity Accelerator Module New high-end platformNew high-end platform Single OS: GAiASingle OS: GAiA Security Appliances 14,600 SPU 2012 61000

8 8 8©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3551 SPU 114 SPU 114 SPU 374 SPU 623 SPU 738 SPU 1046 SPU 1861 SPU 2900 SPU 22004200440048001220012400126002140021600 3300 SPU Security Appliances 14,600 SPU 61000 2012 Expand real-world performanceExpand real-world performance Raise the bar at super high endRaise the bar at super high end 21700

9 9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security Appliances Full range of Security small / branch appliances to high end enterprise 61000 2200420044004800 214002170021600 122001240012600 1100

10 10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

11 11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Multiple sources of data SensorNet 3D Reports Threat Cloud

12 12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A comprehensive survey 888companies 1,494gateways 120,000Monitoring hours 112,000,000security events

13 13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A comprehensive survey % of companies Americas EMEA APAC Industrial Finance Government Telco Consulting Other By geographyBy sector

14 14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | The majority of companies are infected 63% 100% = 888 companies of the organizations in the research were infected with bots

15 15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Once in … always on Communicating with command & control every 21 minutes

16 16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Downloading malware all the time 53% of organizations saw malware downloads

17 17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Most attacks originate in the US Top malware locations, % US 71% Canada 8% Czech Rep 2% Slovakia 2% France 2% UK 2% Germany 2% Israel 3% Turkey 3% China 3%

18 18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Anonymizers inside the corporation 43%43% of organizations had users of Anonymizers (80% were not aware that their employees use Anonymizers) 100% = 888 companies

19 19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | P2P inside the corporation 61% of organizations had a P2P file sharing app in use 100% = 888 companies

20 20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | How common is it? 54% of organizations experienced data loss

21 21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Many types of data leaked 24% Source Code 7% Email marked as confidential 14% Password protected file 29% Credit card information 13% Salary compensation information 7% Bank accounts numbers 6% Business data record 21% Other

22 22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | PCI compliance can be improved36% Of financial organizations sent credit card data outside the organization

23 23 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

24 24 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 2012 Awards

25 25 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3

26 26 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | NSS Labs – Tested Appliances  CheckPoint 12600  Dell SonicWALL SuperMassive E10800  Fortinet FortiGate 3600C  Juniper SRX 3600  Palo Alto PA-5020  Sourcefire 8250  Sourcefire 8290  Stonesoft 3202  WatchGuard XTM 2050

27 27 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Top Scores with Triple Recommend NGFW 98.5% Management and Security Effectiveness 2013 NGFW Group Test Firewall 100% Management and Security Effectiveness 2013 Firewall Group Test IPS 99.0% Overall Protection Product Analysis Report

28 28 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Top Score for NGFW with NSS Labs 98.5% Highest overall score 99.2% Blocked server application attacks 97.7% Blocked client applications attacks “Recommend” 2013 NGFW Group Test 98.5% NGFW Enterprise Management and Security Effectiveness CHECK POINT CONTINUES NGFW LEADERSHIP WITH RECOMMEND RATING

29 29 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | NSS Labs 2013 NGFW Security Value Map (SVM) Security Value Map NSS Labs 2013 NGFW Group Test Check Point is the NGFW Leader with the Highest “Enterprise management and security Effectiveness”

30 30 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3 years TCO

31 31 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | A Perfect Score in Firewall Tests 100% Score in All Firewall Test Areas Outstanding performance while maintaining low TCO ($11.72 per protected Mbps) “Recommend” 2013 Firewall Group Test 100% Enterprise Management and Security Effectiveness LONG STANDING RECORD OF EXCELLENCE AFFIRMED BY FIREWALL TEST RESULTS

32 32 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Best IPS Overall Protection 99.0% Overall protection score 100% Resistance to Evasion Excellent Stability and Reliability Management comes through again, powerful and easy-to-use “Recommend” rating 99.0% Overall Protection Check Point 61000 IPS SETTING THE STANDARD IN OVERALL PROTECTION FOR IPS

33 33 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Highest Security Effectiveness The security effectiveness of the IPS component of the NGFW can be seen in the following table as we factor in evasions and leakage to the exploit block rate. Check Point is the leader NGFW with 100% immunity to Evasions and Leakage

34 34 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Summary [Protected] Non-confidential content TRIPLE RECOMMEND RATINGS WITH TOP SCORES IN LATEST NSS LABS TESTS 98.5% NGFW Management and Security Effectiveness 2013 NGFW Group Test 100% Firewall Management and Security Effectiveness 2013 Firewall Group Test 99.0% IPS Overall Protection Product Analysis Report

35 35 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Ajanda 1 1 Check Point 2012 NSS Labs 2 2 Gartner Magic Quadrants 3 3

36 36 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Competitors – Firewall  ASA Serisi  SRX Serisi  FortiGate  PA

37 37 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Magic Quadrant for Enterprise Network Firewalls, 2013. LEADER

38 38 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Competitors - UTM  UTM (Astaro) Serisi  XTM Serisi  FortiGate  NSA

39 39 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Magic Quadrant for Unified Threat Management (UTM), 2012 LEADER

40 40 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | What’s new in 2013? Smartlog SmartEvent Compliance DDoS Protector 1100

41 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank you


Download ppt "©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Check Point & Security Market June 2013."

Similar presentations


Ads by Google