Transcript Slide 1

Mobility – the Security Challenge
Nov 12th 2008
Peter Lönnqvist
Business Manager
EndPoint security
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
puresecurity
The mobile office – Available for everyone
 New situation
– Mobile equipment
– Uncontrolled networks
– Communcation in new ways
» New risk exposure
» New costs
http://www.tech-404.com/rss/data_loss.aspx
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
2
Business Requirements – A Challange
Laws, EuroSOX
PCI, PUL,
Competition ....$$$$
Policys, Cobit, PCI,
ISO 27000, ITIL, Audits,
Consolidation, budget
Executive
Level
Antivirus...
$
Management level
Administration...$
Operational level
Encrytion...$
Mobility...$
FW...$
puresecurity
VPN...$
WEB...$
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
3
How do you treat your end users?
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
5
Check Point – End Point security
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
6
Check Point End Point Security
Unified Management
FDE
Secure Access
Malware
Protection
Firewall/NAC
Secure
Remote
Access
• 15 years leadership in firewalls
• Based on award-winning ZoneAlarm
• 12 years leadership in remote access VPN
Full Disk
Encryption
ME
Media
Encryption
Market-leading Pointsec®
technology
 Mitigates the broadest range of endpoint risks
 Unifies all essential components
 Only solution that includes both data security and remote access
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
7
EndPoint - ”Secure Access”
Personal Firewall
VPN
NAC
AV/AS
Program control/ Advisory
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
8
How Program Advisor Works
Program
Unknown program
attempts access
Client
Permissions applied
Program Database
Server
returns
policy
Program Advisor returns best
practices policy
Database contains
information on over
500,000 programs
Client asks
server
about
program
Check Point
Policy Server
Server asks Program Advisor
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
9
EndPoint - ”Data security”
Full Disk Encryption
Port Control
Loss of Data
Removable media Protection
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
10
Endpoint – One part of the infrastructure
Coorporate
Enforcement
https://portal.sslvpn.checkpoint.com/ICS/scanPage
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
11
Unified Management
Secure Access
Malware
Protection
Enforce
Policy
Compliance
Secure
Remote
Access
FDE
ME
Full Disk
Encryption
Media
Encryption
Unified
Management
Dashboard
Antivirus &
Anti-spyware Policy
Enforcement Settings
Antivirus Reports
Compliance Reports
Connectivity Reports
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
12
Check Points advantage –complete platform
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
13
Check Points advantage – Network security
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
14
Check Points advantage –Controlling security
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
15
Endpoint – One part of the infrastructure
PCI
Requirements
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
16
Why Check Point End Point
 Lowered TCO
–
–
–
–
One client to manage (install, configure, update)
One vendor ( function, error detection, intop-less complexity)
One administrion consol (Education,Competence, Function)
Less impact on the enduser – increased uptime
 Technology
– Known technology that scales (Zone Alarm, Pointsec etc)
– Consolidation is important – Network and ”End Point”
– Good total solution – we are quite alone
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
17
“Endpoint” Security Bundles
Check Point Endpoint Security Bundles
Secure
Access
Desktop Firewall
Program Control
NAC
Remote Access
VPN
Antivirus/Antispyware
F ull Disk
Encryption
Port
Protection





Full Disk
Encryption
Port Protection
Media Encryption
puresecurity
1
Total
Security
Windows
Mac
Linux



















Operating Systems
1







©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
18
Summary
puresecurity
ENDPOINT
MANAGEMENT
One single
security client
One single
console
GATEWAY
One unified
product line
totalsecurity from Check Point
puresecurity
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential.
19