Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.

Similar presentations


Presentation on theme: "©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D."— Presentation transcript:

1 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D Security March 2012

2 2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security Focus and Leadership ► $ 1.25 Billion (Revenue) 2011 revenue, 17% CAGR 2006-2011 Software Blades strategy fueling growth ► 100% (Security) Pure focus on security All of Fortune 500 are Check Point customers ► # 1 (Threat Coverage) Best coverage for Microsoft and Adobe vulnerabilities Largest Web 2.0 application control library Who should you trust to secure your business?

3 3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Hospital record update Online bank balance check Social network update Supermarket checkout PDA email check Credit card payment ATM withdrawal Remote data backup ERP supplier catalog update Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot Securing Business Everywhere 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

4 4 4 The 3 Steps of Modern Attacks Social engineering  Identify target  Gather information  Launch attack  Identify target  Gather information  Launch attack Malware injection  Attack arrives  User clicks  Exploit executes  Attack arrives  User clicks  Exploit executes  Malware installed  Computer controlled  Waits for instruction  Malware installed  Computer controlled  Waits for instruction Remote control

5 5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Two Sources of Vulnerability Human Technology

6 6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | People do not read policies 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

7 7 7 We use millions and millions of lines of code Complexity leads to vulnerability 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

8 8 8 Everything needs to be patched again and again

9 9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More than technology… …A security process More than technology… …A security process Enforcement Policies People INTRODUCING…

10 10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Business Terminology for Policy? Using different IP addresses Using different devices Using different locations Using different applications 200,000 SECURITY LOGS 10©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

11 11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Business Relevant Policy Clear and Meaningful Policy 11©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

12 12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Today’s Typical User ‘Involvement’ NO EXPLANATION NO EXPLANATION NO RESOLUTION

13 13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Users Taking Part in Security EXPLANATION RESOLUTION

14 14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3D SECURITY: GAIN CONTROL Enforcement Policies People

15 15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Software Blades MOBILITYDATAMALWARE AUTHORIZATION DEVICE SECURITY VPN DISK ENCRYPTION DLP REMOVABLE MEDIA FIREWALL ANTIBOT WEB/APP CONTROL IPS ACCESS CONTROL Coordinated Layers of Security

16 16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Consolidate Security—Better Security ALL LAYERS OF SECURITY ACT TOGETHER Software Blade Architecture from Check Point

17 17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF

18 18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Consolidated Visibility: SmartEvent  Unified event analysis with 360° visibility across Software Blades  High-level view with drill down to policy  Unified event analysis with 360° visibility across Software Blades  High-level view with drill down to policy

19 19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More Security, Additional Power The Security You Want The Performance You Need DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade

20 20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Security Appliance Line Ultra High-End Datacenter Grade Enterprise Grade Small Office / Desktop SECURITY FOR ENTIRE RANGE 12000 Appliances 4000 Appliances 2200 Appliance 61000 System and 21400 Appliance

21 21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Security Solutions IAS and Open server 2012 Appliances All Deployments All Platforms All Protections Software Blades

22 22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | More Security, More Powerful Platforms Summary Multi-Layer Threat Prevention with Software Blades 3D Security: Blueprint for a 2012 Security Strategy Check Point: Your Trusted Security Partner

23 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank You


Download ppt "©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D."

Similar presentations


Ads by Google