Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS.

Similar presentations


Presentation on theme: "©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS."— Presentation transcript:

1 ©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS & IDEAS FROM THE FIELD

2 ©2015 Check Point Software Technologies Ltd. 2 What’s driving Security Spending ? Upgrade of existing, aged equipment Consolidation of multiple point products Consolidation + New Security Features Compliance Executive Support & Demand for ITSec Security Readiness – Where are you ?

3 ©2015 Check Point Software Technologies Ltd. 3 Security is now Mainstream IT Redefinition of the Enterprise:  Remote Locations ( Mfg / Branches/ IP devices)  Mobile Devices ( where is the “Edge” ? ) A Good Offense is the Best Defense:  Advanced Threat Protection = Known & Unknown  Reporting & Forensics = SOC & Trending Data +Context + Visibility = Actionable Intelligence

4 ©2015 Check Point Software Technologies Ltd. 4 Security Trends ** Redefine the Enterprise: Remote sites & Mobile **Client Execs involved at a new level ** Security Readiness Data : Dashboard, Detail & Forensics Product Enterprise Security Strategies Monitor / ReactProactive / Trend User Involvement

5 ©2015 Check Point Software Technologies Ltd. 5 Security has been underfunded… By other valid IT & Business Priorities including:  IP Telephony / Unified Communications  Storage & Server Virtualization; Converged Computing  SAP, Oracle, other applications  SF.com & other CRM systems  Cloud & Hybrid Data Center Initiatives  Impact to Security:  Most are in Catch Up Mode  Security is “MainStream”  Key issues:  Personnel / Organizational Structure  Policy ( Social media, Document Retention, Breach planning )  Strategy ( Current State to Future State )

6 ©2015 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals

7 ©2015 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Self Assessment Start Here

8 ©2015 Check Point Software Technologies Ltd. 8 Client Assessments: Work to be Done 1 st Key Question : “Where am I today?” Follow up questions: Desired Future State First Priority What’s possible today Where do I start

9 ©2015 Check Point Software Technologies Ltd. 9 Minimize Risk & Shorten the Curve Have a Current State – Future State roadmap Anticipate Future Requirements ( Leads to proper sizing ). Consider a “Good – Better – Best “ architectural review Invest in Training.

10 ©2015 Check Point Software Technologies Ltd. 10 High Level Security Planning Framework - 4 things Infrastructure Threat Mobility Management & Visibility

11 ©2015 Check Point Software Technologies Ltd. 11 [Restricted] ONLY for designated groups and individuals Fewer Suppliers & Maintenance contracts More control & reporting Fewer Suppliers & Maintenance contracts More control & reporting DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Infrastructure Consolidation is real but you own Architecture

12 ©2015 Check Point Software Technologies Ltd. 12 Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF

13 ©2015 Check Point Software Technologies Ltd. 13 Check Point Research Industry Feeds Sensors & Sites Priority: Keep System Software Current

14 ©2015 Check Point Software Technologies Ltd. 14

15 ©2015 Check Point Software Technologies Ltd. 15 One of the most dynamic areas of Security Threat Prevention

16 ©2015 Check Point Software Technologies Ltd. 16 Known ( IPS / IDS / URL / App ) Unknown ( SandBox / Zero Day / APT ) Email & Mobile Reporting / Context / Forensics / Trending

17 ©2015 Check Point Software Technologies Ltd. 17 Polymorphic Malware APTs Mobility We Spend Time and Budget On.. While Positioning for Future Challenges TODAY’S INFRASTRUCTURE FUTURE ATTACK VECTORS Firewall VPN IPS Anti-Spam URL Filtering Anti-Virus DDoS Have the Platform Built 1 st !!

18 ©2015 Check Point Software Technologies Ltd. 18 Multi-Layer Threat Prevention Known and Unknown Malware Known Unknown X XXXXXX XX Known Industry Feeds Global Sensor Data Check Point Research ThreatCloud Emulation Service

19 ©2015 Check Point Software Technologies Ltd. 19 [Protected] Non-confidential content INSPECT EMULATE PREVENT SHARE “Threat” requires a holistic view ** New CPU level solution – Stop before threats get to the OS level. Managing Unknowns Sandbox Quarantine Emulation

20 ©2015 Check Point Software Technologies Ltd. 20 HIGHEST CATCH RATE Check Point Threat Emulation CPU-Level Threat Prevention + INTEGRATED WITH CHECK POINT THREAT EMULATION UNIQUE AND INNOVATIVE DETECTION

21 ©2015 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals You can’t manage what you can’t measure Optics & Reporting

22 ©2015 Check Point Software Technologies Ltd. 22 What happens when things go wrong ? Event Management Log Management Security Management Management Integrated / Correlated Built-In Compliance Engin e Simplicity & Power in One Plate of Glass

23 ©2015 Check Point Software Technologies Ltd. 23 SPOG Management & Visibility

24 ©2015 Check Point Software Technologies Ltd. 24 360 o Visibility of Network Security Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted

25 ©2015 Check Point Software Technologies Ltd. 25 [Restricted] ONLY for designated groups and individuals Mobility

26 ©2015 Check Point Software Technologies Ltd. 26 Today’s Mobile Solutions have Security Gaps [Restricted] ONLY for designated groups and individuals How do you protect devices from THREATS? How do you protect DATA wherever it goes? MDM = Management NOT Security Mobile Security Same policies as On Net APT protection Document Security Mgt & Reporting

27 ©2015 Check Point Software Technologies Ltd. 27 Customers are still looking for a solution 70 % of enterprises see mobile support to employees as critical priority 50 % of firms see implementing a BYOD policy as critical priority 75 % of large enterprises will have deployed technologies to secure access to enterprise resources by 2016 Forrester Gartner [Restricted] ONLY for designated groups and individuals

28 ©2015 Check Point Software Technologies Ltd. 28 [Restricted] ONLY for designated groups and individuals Has your mobile device been used … 71% of adults over 18 have a Facebook account 2 Facebook? [Restricted] ONLY for designated groups and individuals Over 30% of parents let their kids use their corporate devices 1 To access Dropbox? 1 in 5 employees use consumer cloud storage for work documents 3 By your kids? 1 2013 Norton Report, Oct 2013, by Symantec 2 2013 Pew Research Center Internet Project Tracking Survey 3 Nasuni Survey of 1300 business users as reported by GigaOm

29 ©2015 Check Point Software Technologies Ltd. 29 ©2014 Check Point Software Technologies Ltd. 29 Infection or Loss … Easy as 1, 2, 3 SURF THE INTERNET UPLOAD FILES TO THE CLOUD FORGET DEVICE

30 ©2015 Check Point Software Technologies Ltd. 30 Vision: Enterprise = 100% of the Enterprise ©2014 Check Point Software Technologies Ltd. 30 [Restricted] ONLY for designated groups and individuals Mobile Security must be part of the Strategy Mobile Security Single solution End to end protection APT protection Reporting & Forensics Intuitive UI

31 ©2015 Check Point Software Technologies Ltd. 31 The Internet So many points of entry!

32 ©2015 Check Point Software Technologies Ltd. 32 The Issues are Real The Solutions are Many Assess – Plan – Execute For the entire Enterprise Hold the industry accountable Network& Idea share ! Don’t overthink it: get after it! Final Thoughts

33 ©2015 Check Point Software Technologies Ltd. 33 Everyone has a plan ‘till they get punched in the mouth Mike Tyson


Download ppt "©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS."

Similar presentations


Ads by Google