©2015 check point software technologies ltd. 1 dallas data connectors 2015 hank johnson, area...

Download ©2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS

If you can't read please download the document

Upload: evangeline-cummings

Post on 23-Dec-2015

218 views

Category:

Documents


1 download

TRANSCRIPT

  • Slide 1
  • 2015 Check Point Software Technologies Ltd. 1 Dallas Data Connectors 2015 Hank Johnson, Area Manager Check Point Software Technologies SECURITY OBSERVATIONS & IDEAS FROM THE FIELD
  • Slide 2
  • 2015 Check Point Software Technologies Ltd. 2 Whats driving Security Spending ? Upgrade of existing, aged equipment Consolidation of multiple point products Consolidation + New Security Features Compliance Executive Support & Demand for ITSec Security Readiness Where are you ?
  • Slide 3
  • 2015 Check Point Software Technologies Ltd. 3 Security is now Mainstream IT Redefinition of the Enterprise: Remote Locations ( Mfg / Branches/ IP devices) Mobile Devices ( where is the Edge ? ) A Good Offense is the Best Defense: Advanced Threat Protection = Known & Unknown Reporting & Forensics = SOC & Trending Data +Context + Visibility = Actionable Intelligence
  • Slide 4
  • 2015 Check Point Software Technologies Ltd. 4 Security Trends ** Redefine the Enterprise: Remote sites & Mobile **Client Execs involved at a new level ** Security Readiness Data : Dashboard, Detail & Forensics Product Enterprise Security Strategies Monitor / ReactProactive / Trend User Involvement
  • Slide 5
  • 2015 Check Point Software Technologies Ltd. 5 Security has been underfunded By other valid IT & Business Priorities including: IP Telephony / Unified Communications Storage & Server Virtualization; Converged Computing SAP, Oracle, other applications SF.com & other CRM systems Cloud & Hybrid Data Center Initiatives Impact to Security: Most are in Catch Up Mode Security is MainStream Key issues: Personnel / Organizational Structure Policy ( Social media, Document Retention, Breach planning ) Strategy ( Current State to Future State )
  • Slide 6
  • 2015 Check Point Software Technologies Ltd. 6 [Restricted] ONLY for designated groups and individuals
  • Slide 7
  • 2015 Check Point Software Technologies Ltd. 7 [Restricted] ONLY for designated groups and individuals Self Assessment Start Here
  • Slide 8
  • 2015 Check Point Software Technologies Ltd. 8 Client Assessments: Work to be Done 1 st Key Question : Where am I today? Follow up questions: Desired Future State First Priority Whats possible today Where do I start
  • Slide 9
  • 2015 Check Point Software Technologies Ltd. 9 Minimize Risk & Shorten the Curve Have a Current State Future State roadmap Anticipate Future Requirements ( Leads to proper sizing ). Consider a Good Better Best architectural review Invest in Training.
  • Slide 10
  • 2015 Check Point Software Technologies Ltd. 10 High Level Security Planning Framework - 4 things Infrastructure Threat Mobility Management & Visibility
  • Slide 11
  • 2015 Check Point Software Technologies Ltd. 11 [Restricted] ONLY for designated groups and individuals Fewer Suppliers & Maintenance contracts More control & reporting Fewer Suppliers & Maintenance contracts More control & reporting DLP Software Blade Application Control Software Blade IPS Software Blade Firewall and VPN Software Blades URL Filtering Software Blade Antivirus & Anti-Malware Software Blade Identity Awareness Software Blade Anti-Bot Software Blade Infrastructure Consolidation is real but you own Architecture
  • Slide 12
  • 2015 Check Point Software Technologies Ltd. 12 Granular Control of All Security Layers Granular Visibility Identity Awareness DLP Mobile Access SmartEvent IPS Anti-Bot Antivirus Application Control URLF
  • Slide 13
  • 2015 Check Point Software Technologies Ltd. 13 Check Point Research Industry Feeds Sensors & Sites Priority: Keep System Software Current
  • Slide 14
  • 2015 Check Point Software Technologies Ltd. 14
  • Slide 15
  • 2015 Check Point Software Technologies Ltd. 15 One of the most dynamic areas of Security Threat Prevention
  • Slide 16
  • 2015 Check Point Software Technologies Ltd. 16 Known ( IPS / IDS / URL / App ) Unknown ( SandBox / Zero Day / APT ) Email & Mobile Reporting / Context / Forensics / Trending
  • Slide 17
  • 2015 Check Point Software Technologies Ltd. 17 Polymorphic Malware APTs Mobility We Spend Time and Budget On.. While Positioning for Future Challenges TODAYS INFRASTRUCTURE FUTURE ATTACK VECTORS Firewall VPN IPS Anti-Spam URL Filtering Anti-Virus DDoS Have the Platform Built 1 st !!
  • Slide 18
  • 2015 Check Point Software Technologies Ltd. 18 Multi-Layer Threat Prevention Known and Unknown Malware Known Unknown X XXXXXX XX Known Industry Feeds Global Sensor Data Check Point Research ThreatCloud Emulation Service
  • Slide 19
  • 2015 Check Point Software Technologies Ltd. 19 [Protected] Non-confidential content INSPECT EMULATE PREVENT SHARE Threat requires a holistic view ** New CPU level solution Stop before threats get to the OS level. Managing Unknowns Sandbox Quarantine Emulation
  • Slide 20
  • 2015 Check Point Software Technologies Ltd. 20 HIGHEST CATCH RATE Check Point Threat Emulation CPU-Level Threat Prevention + INTEGRATED WITH CHECK POINT THREAT EMULATION UNIQUE AND INNOVATIVE DETECTION
  • Slide 21
  • 2015 Check Point Software Technologies Ltd. 21 [Restricted] ONLY for designated groups and individuals You cant manage what you cant measure Optics & Reporting
  • Slide 22
  • 2015 Check Point Software Technologies Ltd. 22 What happens when things go wrong ? Event Management Log Management Security Management Management Integrated / Correlated Built-In Compliance Engin e Simplicity & Power in One Plate of Glass
  • Slide 23
  • 2015 Check Point Software Technologies Ltd. 23 SPOG Management & Visibility
  • Slide 24
  • 2015 Check Point Software Technologies Ltd. 24 360 o Visibility of Network Security Time shows topline security events Map shows origin of attacks and threats Rate and frequency of potential attacks Important security events highlighted
  • Slide 25
  • 2015 Check Point Software Technologies Ltd. 25 [Restricted] ONLY for designated groups and individuals Mobility
  • Slide 26
  • 2015 Check Point Software Technologies Ltd. 26 Todays Mobile Solutions have Security Gaps [Restricted] ONLY for designated groups and individuals How do you protect devices from THREATS? How do you protect DATA wherever it goes? MDM = Management NOT Security Mobile Security Same policies as On Net APT protection Document Security Mgt & Reporting
  • Slide 27
  • 2015 Check Point Software Technologies Ltd. 27 Customers are still looking for a solution 70 % of enterprises see mobile support to employees as critical priority 50 % of firms see implementing a BYOD policy as critical priority 75 % of large enterprises will have deployed technologies to secure access to enterprise resources by 2016 Forrester Gartner [Restricted] ONLY for designated groups and individuals
  • Slide 28
  • 2015 Check Point Software Technologies Ltd. 28 [Restricted] ONLY for designated groups and individuals Has your mobile device been used 71% of adults over 18 have a Facebook account 2 Facebook? [Restricted] ONLY for designated groups and individuals Over 30% of parents let their kids use their corporate devices 1 To access Dropbox? 1 in 5 employees use consumer cloud storage for work documents 3 By your kids? 1 2013 Norton Report, Oct 2013, by Symantec 2 2013 Pew Research Center Internet Project Tracking Survey 3 Nasuni Survey of 1300 business users as reported by GigaOm
  • Slide 29
  • 2015 Check Point Software Technologies Ltd. 29 2014 Check Point Software Technologies Ltd. 29 Infection or Loss Easy as 1, 2, 3 SURF THE INTERNET UPLOAD FILES TO THE CLOUD FORGET DEVICE
  • Slide 30
  • 2015 Check Point Software Technologies Ltd. 30 Vision: Enterprise = 100% of the Enterprise 2014 Check Point Software Technologies Ltd. 30 [Restricted] ONLY for designated groups and individuals Mobile Security must be part of the Strategy Mobile Security Single solution End to end protection APT protection Reporting & Forensics Intuitive UI
  • Slide 31
  • 2015 Check Point Software Technologies Ltd. 31 The Internet So many points of entry!
  • Slide 32
  • 2015 Check Point Software Technologies Ltd. 32 The Issues are Real The Solutions are Many Assess Plan Execute For the entire Enterprise Hold the industry accountable Network& Idea share ! Dont overthink it: get after it! Final Thoughts
  • Slide 33
  • 2015 Check Point Software Technologies Ltd. 33 Everyone has a plan till they get punched in the mouth Mike Tyson