Presentation is loading. Please wait.

Presentation is loading. Please wait.

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.

Similar presentations


Presentation on theme: "©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights."— Presentation transcript:

1 ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights

2 2 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties What organizations want totalsecurity flexiblesecurity simplesecurity Total security across all enforcement points The right protection at the right investment Ease of deployment Ease of management

3 3 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Introducing Check Point R70 with New Software Blade Architecture

4 4 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties What is a software blade? A software blade is a security building block  Independent  Modular  Centrally managed

5 5 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties How does it work? Select a containerSelect the bladesConfigure the system

6 6 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Two options to construct your solution Option 1: A La Carte Option 2: Pre-Defined Systems* SG103 1 core 3 blades SG407 4 cores 7 blades SG805 8 cores 5 blades *Examples

7 7 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Total Security Complete Security & Management Portfolio Security Gateway Blades Security Management Blades

8 8 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Customer Benefits  Total security across all enforcement points  Custom configuration for the right security at the right investment  Simple planning, fast deployment  Ease of consolidation –Add/activate blades easily into existing infrastructure –Segregation of duties in a single system –Dedicate system resources per software blade  Simple migration and scaling TOTAL TOTAL FLEXIBLE FLEXIBLE SIMPLE SIMPLE SECURITY SECURITY MIGRATION MIGRATION CONSOLIDATION CONSOLIDATION LOWER TCO LOWER TCO

9 9 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point R70 Debut of Check Point Software Blade Architecture NEW Check Point Security Gateway R70 IPS Blade: IPS Redefined

10 10 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point Security Gateway R70 The Evolution Continues  Main-train release featuring Software Blade architecture New IPS Software Blade Improved Core Firewall Performance New Provisioning Software Blade

11 11 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point IPS Blade Debut of Check Point Software Blade Architecture NEW Check Point Security Gateway R70 IPS Software Blade: Next Generation Integrated Intrusion Prevention

12 12 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point IPS Blade Check Point IPS Blade: Complete intrusion prevention integrated with firewall Enterprise-class performance Comprehensive and dynamic management

13 13 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties IPS Increases Threat Control

14 14 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties New Threat Control Engine Utilizing multiple methods of detection and analysis for accurate and confident security Pre-emptive and accurate detection via NEW! multi- method signature & behavioral prevention engine. Wide protection coverage for both server and client vulnerabilities. Protection profiles with attack severity, confidence, and performance settings to automatically set protections to Detect or Prevent. Open language for writing protections and protocol decoders. Application Identification for application policy enforcement.

15 15 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Complete Intrusion Protection Protection against server vulnerabilities Protection against client & OS vulnerabilities Protection against malware and worm infections Block stealthy P2P and IM applications Prevent buffer overflow attacks Protection against network reconnaissance gathering Only gateway with IPS across product line

16 16 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Smoothing The Transition Performance

17 17 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties R70 Performance Enhancements CoreXL IPS Engine Firewall  Deeper multi-core integration  Multi-tier IPS filtering engine –quickly filters ~90% of traffic  Filter attacks only on the relevant sections of the traffic –reduce overhead –Reduce false positives  Performance Improvements in Secure Platform OS Network Secure Platform Network IPS Engine Firewall …

18 18 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Ensure Total System Performance Ensure firewall performance with load threshold safety-valve Automatically activate protections based on your criteria: Estimated performance impact Severity level Confidence level

19 19 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties New Threat Management Requirements  Manage High Volume of IPS Events  Manage in Real Time  Manage across multiple Security functions  Adapt to Constantly Evolving Threat Environment

20 20 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties IPS Software Blade Timeline View Easily isolate important information Quickly go from high-level business view to detailed forensics

21 21 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties IPS Protection Browser Easily Browse, Search, Set Protections Easy navigation through protection list Detailed protection description Review attributes: Severity, Attack Confidence, Performance Impact, Release Data, Industry Reference View and adjust protection settings – Prevent, Detect, Inactive Keyword search: easily find Attack, Protection, Category, CVE…

22 22 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties ‘Sandbox’ New Protections Gain confidence in protections: Automatically ‘sandbox’ new protections in ‘Detect Only’ mode until you are ready to put them in Prevent mode.

23 23 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Extensive Graphs and Reports Meet Compliance and Management Information Needs

24 24 ©2009 Check Point Software Technologies Ltd. All rights reserved. [Confidential]—For Check Point users and approved third parties Check Point R70 Summary Debut of Check Point Software Blade Architecture NEW Check Point Security Gateway R70 IPS Blade: Next Generation Intrusion Prevention

25 ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Thank You!


Download ppt "©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights."

Similar presentations


Ads by Google