Building Your Security Strategy with 3D Security - V-ict-or

Download Report

Transcript Building Your Security Strategy with 3D Security - V-ict-or

Building Your Security
Strategy with 3D
Security
March 2012
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
Security Focus and Leadership
►
$1.25 Billion (Revenue)
2011 revenue, 17% CAGR 2006-2011
Software Blades strategy fueling growth
► 100%
(Security)
Pure focus on security
All of Fortune 500 are Check Point customers
►
#1 (Threat Coverage)
Best coverage for Microsoft and Adobe vulnerabilities
Largest Web 2.0 application control library
Who should you trust to secure your business?
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
|
2
2
Securing Business Everywhere
Online bank
balance
check
Hospital
record
update
Social
network
update
Supermarket
checkout
PDA email
check
Credit card
payment
ATM
withdrawal
ERP supplier
catalog
update
Remote data
backup
Opening of a
new branch
Setup a
mobile office
at a client
Check
today’s
sales orders
Update this
year’s
bonuses
Log into a
WiFi hotspot
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
|
3
3
The 3 Steps of Modern Attacks
Social
engineering
 Identify target
 Gather information
 Launch attack
Malware
injection
 Attack arrives
 User clicks
 Exploit executes
©2012 Check Point Software Technologies Ltd.
Remote
control
 Malware installed
 Computer controlled
 Waits for instruction
|
[Confidential] For Check Point users and approved third parties
|
4
4
Two Sources of Vulnerability
Human
©2012 Check Point Software Technologies Ltd.
Technology
|
[Confidential] For Check Point users and approved third parties
|
5
5
People do not read policies
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
|
6
6
We use millions and millions of
lines of code
Complexity leads to vulnerability
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
|
7
7
Everything needs to be patched
again and again
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
|
8
8
INTRODUCING…
Policies
People
Enforcement
More than technology…
…A security process
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
|
9
9
Business Terminology for Policy?
Using different IP addresses
Using different devices
Using different locations
Using different applications
200,000
SECURITY
LOGS
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 10
10
Business Relevant Policy
Clear and Meaningful Policy
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 11
11
Today’s Typical User ‘Involvement’
NO
EXPLANATION
NO
RESOLUTION
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 12
12
Users Taking Part in Security
EXPLANATION
RESOLUTION
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 13
13
Policies
People
Enforcement
3D SECURITY:
GAIN CONTROL
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 14
14
Software Blades
Coordinated Layers of Security
MOBILITY
DATA
MALWARE
ACCESS CONTROL
VPN
FIREWALL
AUTHORIZATION
DISK ENCRYPTION
ANTIBOT
DEVICE SECURITY
DLP
WEB/APP CONTROL
VPN
REMOVABLE MEDIA
IPS
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 15
15
Consolidate Security—Better Security
ALL LAYERS OF SECURITY ACT TOGETHER
Software Blade Architecture from Check Point
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 16
16
Granular Control of All Security Layers
IPS
Anti-Bot
Antivirus
Granular Visibility
Mobile
Access
DLP
Application
Control
URLF
SmartEvent
Identity
Awareness
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 17
17
Consolidated Visibility: SmartEvent
 Unified event analysis with 360° visibility across Software Blades
 High-level view with drill down to policy
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 18
18
More Security, Additional Power
Firewall and VPN
Software Blades
IPS
Software Blade
Application
Control
Software Blade
Identity
Awareness
Software Blade
Antivirus &
Anti-Malware
Software Blade
URL Filtering
Software Blade
DLP
Software Blade
Anti-Bot
Software Blade
The Security You Want
The Performance You Need
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 19
19
Check Point Security Appliance Line
61000 System and
21400 Appliance
SECURITY FOR
ENTIRE RANGE
12000 Appliances
4000 Appliances
Ultra High-End
2200 Appliance
Datacenter Grade
Small Office /
Desktop
Enterprise Grade
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 20
20
Check Point Security Solutions
All
Deployments
All
Platforms
IAS and
Open server
2012 Appliances
All
Protections
©2012 Check Point Software Technologies Ltd.
Software Blades
|
[Confidential] For Check Point users and approved third parties
| 21
21
Summary
3D Security: Blueprint for a 2012 Security Strategy
Multi-Layer Threat Prevention with Software Blades
More Security, More Powerful Platforms
Check Point: Your Trusted Security Partner
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties
| 22
22
Thank You
©2012 Check Point Software Technologies Ltd.
|
[Confidential] For Check Point users and approved third parties