check point ©2000 check point software technologies ltd. -- proprietary & confidential robert...
Post on 17-Dec-2015
239 Views
Preview:
TRANSCRIPT
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Robert ŻelazoCheck Point Software Technologies Ltd.
Check Point in the Finance SectorCase Studies
Robert ŻelazoCheck Point Software Technologies Ltd.
Check Point in the Finance SectorCase Studies
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Enterprise ManagementEnterprise Management
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Meeting the Business Needs …Meeting the Business Needs …
No physical boundaries in Corporate networks
Business requires authorized access anytime - anywhere - (24x7x365)
Expectations are for higher levels of speed and transparency
Requires enterprise wide security policies / services to effectively manage risks.
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Firewall Services / Electronic TransactionsFirewall Services / Electronic Transactions
WEB Browsing - HTTP (Hypertext Transfer Protocol) – Electronic Transactions: Instantly Generate Auto Loan
Payments, Generate Multi-Term Payment Quotes, and Generate Car Lease Quotes
Secured WEB Browsing - HTTPS (Hypertext Transfer Protocol Secured) – Electronic Transactions: Apply for a car loan
application, car lease, and inquiries in a secured manner for mortgage banking rates
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Firewall Services / Electronic Transactions Cont.Firewall Services / Electronic Transactions Cont.
Mail - SMTP(Simple Mail Transfer Protocol)
– Electronic Transactions: Send and receive mailto your customers
Electronic File Distribution - FTP(File Transfer Protocol)
– Electronic Transactions: Transfer bank payroll for customer accounts, and transfer lettersto your customers
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
To Meet the Demands ...To Meet the Demands ...
Deployed 8 Internet DMZs in strategic geographic locations
Deployed 6 Extranet DMZs in strategic geographic locations
Deployed 4 development labs in strategic geographic locations
Deployed 1 Staging DMZ for quality assurance
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Dresdner Bank Corporate VPNsDresdner Bank Corporate VPNs
Dresdner Bank
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Challenges of VPNsChallenges of VPNs
Access
Controls
Isolation
Policy
Privacy
Identity
Administration
Availability and Quality of ServiceSecurity
Costs
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Strategy of Dresdner Bank GroupStrategy of Dresdner Bank Group
Global and Local Corporate VPNs
Rio de Janeiro
M exico City
M iam i
Toronto
BostonChicago
Los Angeles
M ontevideoM elbourne
Beijing
St. Petersburg
M oscow
Sydney
M um bai
Sao Paulo
New York
FrankfurtLondon
Paris
Shanghai
Hongkong
Tokyo
Bangkok
Singapore
San Francisco
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
New YorkC heck Point
VPN -1
SingaporeC heck Point
VPN -1
LondonC heck Point
FW -1
W orldw ide Dresdner GroupCorporate Netw ork
Internal Classified LAN
Public W W W , FTP,M ail and
Proxy Server
Private External Segment
External Routeror RSM to the Public
CN
CentralFirewall
Public External Segment
Public DM Z
Private W W W , FTP,M ail and
Proxy Server
Internal Clients andServers
Private DM Z
External Routeror RSM to the internal VPN
Internal VPN (168 Bit 3DES)via Corporate Netw ork
Frankfurt HeadQuarter
C heck P o in tFW -1
Case 1 - Corporate Intranet VPNCase 1 - Corporate Intranet VPN
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Wrapping UpWrapping Up
Why Corporate VPNs? We can’t control external
Networks and Systems Many Threads from Hackers,
Crackers, Cyberjunkies and Active Content
Data may be modified during Transmit
Unauthorized Access to classified Data
What kind of VPNs? Intranet VPNs Extranet VPNs Remote Access VPNs Combinations
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Closing WordsClosing Words
Just use VPNs!
Otherwise, your business will soon be...
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Dow Jones
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Corporate FactsCorporate Facts Founded in 1882 by Charles H. Dow, Edward T. Jones and
Charles Bergstresser Headquarters:
– 200 Liberty Street, New York, New York
Preliminary 2000 Revenue:
– $ 2.32 Billion Preliminary 2000 Net Income:
– $ 294.6 Million Worldwide Employees:
– 8,100 Listed NYSE, DJ
Dow Jones
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Our ChallengeOur Challenge
Build a new corporate infrastructure Major objectives
– Internet Access
– Access to Parent Company Resources
– 24x7x365 Availability
– Secure Remote Access over the Internet
– Protect Parent Company
Dow Jones
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
High Level SolutionHigh Level Solution
Security Requirement:– Firewall of choice must meet ICSA, and DOD
criteria for a firewall.
– Check Point VPN-1 meets that requirement.
Ease of Manageability:– Must have a user friendly graphical interface.
– Check Point VPN-1 meets that requirement.
Must be capable of generating log files:– Check Point VPN-1 meets that requirement.
Dow Jones
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
High Level SolutionHigh Level Solution
Firewall must support a VPN:– Check Point VPN-1 meets that requirement
with SecuRemote.
Firewall must support hardware based encryption:– NOKIA IP-650 meets that requirement.
Firewall hardware must be easy to configure and maintain:– NOKIA IP-650 meets that requirement.
Dow Jones
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
Benefits GainedBenefits Gained
Fast, reliable Internet access. Secured access to parent companies
resources (Expense System, HR and AP system). This provides the new company a significant cost savings.
Remote access allows the sales force secured access to all corporate resources.
Dow Jones
Check Point
©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential
eBankaeBankaCustomer needs met
– Connect remote branch offices
– Allow eBanka customers to securely access information via the Internet
Check Point products implemented– VPN-1 Pro
– VPN-1 SecureClient
– SmartCenter
top related