Transcript Slide 1
Mobility – the Security Challenge Nov 12th 2008 Peter Lönnqvist Business Manager EndPoint security ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. puresecurity The mobile office – Available for everyone New situation – Mobile equipment – Uncontrolled networks – Communcation in new ways » New risk exposure » New costs http://www.tech-404.com/rss/data_loss.aspx puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 2 Business Requirements – A Challange Laws, EuroSOX PCI, PUL, Competition ....$$$$ Policys, Cobit, PCI, ISO 27000, ITIL, Audits, Consolidation, budget Executive Level Antivirus... $ Management level Administration...$ Operational level Encrytion...$ Mobility...$ FW...$ puresecurity VPN...$ WEB...$ ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 3 How do you treat your end users? puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 5 Check Point – End Point security puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 6 Check Point End Point Security Unified Management FDE Secure Access Malware Protection Firewall/NAC Secure Remote Access • 15 years leadership in firewalls • Based on award-winning ZoneAlarm • 12 years leadership in remote access VPN Full Disk Encryption ME Media Encryption Market-leading Pointsec® technology Mitigates the broadest range of endpoint risks Unifies all essential components Only solution that includes both data security and remote access puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 7 EndPoint - ”Secure Access” Personal Firewall VPN NAC AV/AS Program control/ Advisory puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 8 How Program Advisor Works Program Unknown program attempts access Client Permissions applied Program Database Server returns policy Program Advisor returns best practices policy Database contains information on over 500,000 programs Client asks server about program Check Point Policy Server Server asks Program Advisor puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 9 EndPoint - ”Data security” Full Disk Encryption Port Control Loss of Data Removable media Protection puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 10 Endpoint – One part of the infrastructure Coorporate Enforcement https://portal.sslvpn.checkpoint.com/ICS/scanPage puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 11 Unified Management Secure Access Malware Protection Enforce Policy Compliance Secure Remote Access FDE ME Full Disk Encryption Media Encryption Unified Management Dashboard Antivirus & Anti-spyware Policy Enforcement Settings Antivirus Reports Compliance Reports Connectivity Reports puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 12 Check Points advantage –complete platform puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 13 Check Points advantage – Network security puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 14 Check Points advantage –Controlling security puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 15 Endpoint – One part of the infrastructure PCI Requirements puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 16 Why Check Point End Point Lowered TCO – – – – One client to manage (install, configure, update) One vendor ( function, error detection, intop-less complexity) One administrion consol (Education,Competence, Function) Less impact on the enduser – increased uptime Technology – Known technology that scales (Zone Alarm, Pointsec etc) – Consolidation is important – Network and ”End Point” – Good total solution – we are quite alone puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 17 “Endpoint” Security Bundles Check Point Endpoint Security Bundles Secure Access Desktop Firewall Program Control NAC Remote Access VPN Antivirus/Antispyware F ull Disk Encryption Port Protection Full Disk Encryption Port Protection Media Encryption puresecurity 1 Total Security Windows Mac Linux Operating Systems 1 ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 18 Summary puresecurity ENDPOINT MANAGEMENT One single security client One single console GATEWAY One unified product line totalsecurity from Check Point puresecurity ©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. 19