Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center.

Similar presentations


Presentation on theme: "©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center."— Presentation transcript:

1 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center Americas June, 2012

2 2 2©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point / Market Overview IT Security in Emerging Countries 2 2 Impact and Q&A 3 3

3 3 3©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point At A Glance  Founded 1993, HQ in Tel Aviv  Consistent, Visionary Leadership  100% Security  Innovation, IP, Thought Leadership  2012 Revenue: $1.25 Billion  17% CAGR 2006-2011 Who do organizations trust to secure their business?

4 4 4©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Outstanding Financial Performance Market Cap $11.4B Revenue Growth 17% CAGR ‘06-11 Market Cap $11.4B Revenue Growth 17% CAGR ‘06-11

5 5 5©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Innovative Technologies Stateful Inspection I patent 5,606,668 TrueVector Engine I patent 5,987,611 TrueVector Engine II patent 6,850,943 Cooperative Enforcement patent 6,873,988 SecureXL patent 6,496,935 Stateful Inspection II patent 5,835,726 Significant R&D investment More than 1,500 security experts Application Intelligence Application Intelligence Accelerated Data Path (ADP) Accelerated Data Path (ADP) CoreXL PacketXL

6 6 6©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Award Winning Security Products 100% of Fortune 100 Use Check Point Products

7 7 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Hospital record update Online bank balance check Social network update Supermarket checkout PDA email check Credit card payment ATM withdrawal Remote data backup ERP supplier catalog update Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot Securing Business Everywhere 7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

8 8 8 Check Point and World Bank  Business relations back to 2002  Presence in Brazil and Singapore  Strong relationship with IMF  Strong team members in DC area –mbarkett@checkpoint.com

9 9 9©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Two Sources of Vulnerability Human Technology

10 10 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Threat Landscape

11 11 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point’s Solution: 3D Security Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF

12 12 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point / Market Overview IT Security in Emerging Countries 2 2 Impact and Q&A 3 3

13 13 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Check Point Successes  Many throughout the world; some public case studies:  QTSC: Vietnam Government  Quala: Colombia Manufacturing  Liverpool: Mexico Retail

14 14 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Security 101 CONFIDENTIALITY AVAILABILITY INTEGRITY

15 15 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Emerging IT Security: The Bad

16 16 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Emerging IT Security: The Bad Source: snapvoip.blogspot.com

17 17 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Emerging IT Security: The Good  Essential for participation in global digital economy  IT Governance  National assets >= Corporate assets  Foster growth of information economy jobs

18 18 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability –CoCom

19 19 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability

20 20 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability

21 21 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability –Importability

22 22 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability –Importability

23 23 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability –Importability  Malware, Piracy –Not just software

24 24 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success

25 25 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success

26 26 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Barriers & Path to Success  Prerequisites –Trade restrictions –Education  Encryption –Exportability –Importability  Malware, Piracy –Not just software  Bootstrap – Authentic security as a solution to counterfeit security problems

27 27 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Agenda 1 1 Check Point / Market Overview IT Security in Emerging Countries 2 2 Impact and Q&A 3 3

28 28 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Global HR Impact >2,000 employees 0 RIF’s in 2 decades Staff in 40 countries Dallas Tel Aviv Tokyo Ottawa Stockholm

29 29 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | Questions?

30 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Thank You


Download ppt "©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center."

Similar presentations


Ads by Google