check point capsule - licencias online€¦ · 2source: kindsight security labs malware report 2013...
TRANSCRIPT
©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals
Revolutionizing the Mobile Security market
Francisco Robayo | SE Manager LATAM
CHECK POINT CAPSULE
©2015 Check Point Software Technologies Ltd. 2[Restricted] ONLY for designated groups and individuals
Mobile Market
K E E P G R O W I N G
©2015 Check Point Software Technologies Ltd. 3
Rapidly Expanding Mobile Threats
11.6 million mobile devices infected2
MOBILE THREATS are ESCALATINGin frequency and sophistication EVERY YEAR
©2014 Check Point Software Technologies Ltd. 3[Restricted] ONLY for designated groups and individuals
• 1st malware for Android and iOS
• Root exploits
• Banking malware
• SMS Trojans
• CABIR worm,Infecting Symbian OSvia Bluetooth connection 1Source: Symantec, “A Brief History of Mobile Malware” February 2014
2Source: Kindsight Security Labs Malware Report 2013
2014
201220102005
2004
First mobile virus1
2007First iPhone
2008First Android
• Spyware
• Ransomware
©2015 Check Point Software Technologies Ltd. 4[Restricted] ONLY for designated groups and individuals
Has your mobile device been used …
71% of adults over
18 have a Facebook
account2
Facebook?
[Restricted] ONLY for designated groups and individuals
Over 30% of parents
let their kids
use their corporate
devices1
To access Dropbox?
1 in 5 employees
use consumer cloud
storage for work
documents3
By your kids?
12013 Norton Report, Oct 2013, by Symantec
22013 Pew Research Center Internet Project Tracking Survey
3Nasuni Survey of 1300 business users as reported by GigaOm
©2015 Check Point Software Technologies Ltd. 5©2014 Check Point Software Technologies Ltd. 5
Infection or Loss … Easy as 1, 2, 3
SURF THE INTERNETUPLOAD FILES
TO THE CLOUDFORGET DEVICE
©2015 Check Point Software Technologies Ltd. 6
So maybe you only did one of these
By the number of
Employees=Now
©2014 Check Point Software Technologies Ltd. 6[Restricted] ONLY for designated groups and individuals
C O N S E R V A T I V E number of potentialB R E A C H E S on your network
©2015 Check Point Software Technologies Ltd. 7©2014 Check Point Software Technologies Ltd. 7
Protect Own Network
Protect Devices on
Other Networks
Protect Documents
Everywhere
Protecting Across ALL Networks
Expanding Network for the CIO
©2015 Check Point Software Technologies Ltd. 8
Today’s Solutions Leave Security Gaps
©2014 Check Point Software Technologies Ltd. 8[Restricted] ONLY for designated groups and individuals
How do you protect devices from T H R E A T S ?
How do you protect D A T A wherever it goes?
• Device management focused
• No protection for data onceit leaves the device
• No capability to secure devices from threats
• Complex management requiring multiple consoles
©2015 Check Point Software Technologies Ltd. 9©2015 Check Point Software Technologies Ltd. 9
Customers are still looking for a solution
70%
of enterprises see mobile
support to employees
as critical priority
50%
of firms see implementing
a BYOD policy as
critical priority
75%
of large enterprises will have
deployed technologies to
secure access to enterprise
resources by 2016
Forrester
Gartner
[Restricted] ONLY for designated groups and individuals
©2015 Check Point Software Technologies Ltd. 10
Mobile Devices Are Becoming Key In New Attacks
[Restricted] ONLY for designated groups and individuals
HAVE OUR BUSINESS DATA
SHARE OUR BUSINESS DATA
BECOME THE BACKDOOR
TO OUR ENTERPRISE NETWORK
©2015 Check Point Software Technologies Ltd. 11
Limited Mobile Security
[Restricted] ONLY for designated groups and individuals
Devices Are
Not ProtectedData is
Exposed
Loss of
Devices
E x i s t i n g s o l u t i o n DO NOT
a d d r e s s t h e s e c u r i t y p r o b l e m
©2015 Check Point Software Technologies Ltd. 12[Restricted] ONLY for designated groups and individuals
Ensurestrong security
Increase productivity
Creating the Balance
WHY IS THE MOBILE SECURITY
PROBLEM SO UNIQUE?
©2015 Check Point Software Technologies Ltd. 13©2014 Check Point Software Technologies Ltd. 13[Restricted] ONLY for designated groups and individuals
So What is Needed From a Full Security Solution for Mobile ?
Screen for
Malware
EncryptBusiness
Documents
Safe Workspace
[Restricted] ONLY for designated groups and individuals
P r o t e c t i n g t h e M o b i l e F r o n t i e r
©2015 Check Point Software Technologies Ltd. 14[Restricted] ONLY for designated groups and individuals
CHECK POINT CAPSULE
C u s t o m e r s a r e still looking
f o r t h e r i g h t s o l u t i o n
©2015 Check Point Software Technologies Ltd. 15
SINGLE SOLUTION for MOBILE SECURITY
C L O U D
D O C S
W O R K S P A C E
DOCS
Encrypt business documents
WORKSPACE
Secure business environment
CLOUD
Protect devices from threats
[Restricted] ONLY for designated groups and individuals
©2015 Check Point Software Technologies Ltd. 16
S E A M L E S Sd o c u m e n t
e n c r yp t i o n
-- CONFIDENTIAL --
C O M P L E T E protection for your M O B I L E W O R K F O R C E
S E PA R AT Eb u s i n e s s e n v i r o n m e n t
Secure Cloud
P R O T E C T yo u
f r o m m a lw a r e
[Restricted] ONLY for designated groups and individuals
©2015 Check Point Software Technologies Ltd. 17
2 SCENARIOS
[Restricted] ONLY for designated groups and individuals
©2015 Check Point Software Technologies Ltd. 18[Restricted] ONLY for designated groups and individuals
BYOD Challenges
“Our managers use personal devices to access sensitive data”
- Energy company
Requirements:
• Secure access to mail
• Business documents only allowed
to authorized users
• Remote wipe of business data
• Simple solution
©2015 Check Point Software Technologies Ltd. 19[Restricted] ONLY for designated groups and individuals
- Energy company
TODAY
Protecting confidential
documents with password
Existing Solutions
Using native email
Does this really protect your data?
©2015 Check Point Software Technologies Ltd. 20[Restricted] ONLY for designated groups and individuals
Using native email
Mixing business and personal data
Loss control on business information
Why Native Email is NOT Secure?
From: [email protected]
©2015 Check Point Software Technologies Ltd. 21[Restricted] ONLY for designated groups and individuals
Using the same password over and over
Send password in email body
Protecting confidential
documents with password
Why Password Protection is Not Enough?
Password: 12345
©2015 Check Point Software Technologies Ltd. 22©2014 Check Point Software Technologies Ltd. 22[Restricted] ONLY for designated groups and individuals
Capsule – the right solution for mobile security
Screen for
Malware
EncryptBusiness
Documents
Safe Workspace
[Restricted] ONLY for designated groups and individuals
P r o t e c t i n g t h e M o b i l e F r o n t i e r
©2015 Check Point Software Technologies Ltd. 23
Experience Capsule
[Restricted] ONLY for designated groups and individuals
• No additional hardware required
• No upgrade or downtimes
• Quick and easy
Available now:
capsule.checkpoint.com
©2015 Check Point Software Technologies Ltd. 24[Restricted] ONLY for designated groups and individuals
Customers use point solutions to share files
So your business data is now secure
ON mobile devices
But how would you share it with other people?
Share files with colleagues &
executives
Share files with business partners
©2015 Check Point Software Technologies Ltd. 25[Restricted] ONLY for designated groups and individuals
“We provide our talent scouts with tablets that often get infected with viruses”
- Major League Baseball Team
Remote Workforce Challenges
Requirements:
• Enforce the same Threat
Prevention and URL-Filtering as
we have in our company network
©2015 Check Point Software Technologies Ltd. 26[Restricted] ONLY for designated groups and individuals
TODAY
Existing Solutions
- Major League Baseball Team
MDM restrict specific
applications
Does this really protect you
from threats?
©2015 Check Point Software Technologies Ltd. 27
So, what is MDM?
[Restricted] ONLY for designated groups and individuals
Managesmobile devices
Configuresmobile devices
Monitorsmobile devices
MDM restrict specific
applications
Mobile Device Management
©2015 Check Point Software Technologies Ltd. 28[Restricted] ONLY for designated groups and individuals
MDM Does Not Provide Security
Block download of malware
Protect from bad URLs & Applications
MDM does not:
“MDM Vendors Sell Enablement, Not Security”Gartner
Detect and prevent bot damage
©2015 Check Point Software Technologies Ltd. 29©2014 Check Point Software Technologies Ltd. 29[Restricted] ONLY for designated groups and individuals
Capsule – the right solution for mobile security
Screen for
Malware
EncryptBusiness
Documents
Safe Workspace
[Restricted] ONLY for designated groups and individuals
P r o t e c t i n g t h e M o b i l e F r o n t i e r
Capsule offers complete solution with Best Security
IPS Application
Control
URL
Filtering
Anti-Bot Anti-Virus Threat
Emulation
©2015 Check Point Software Technologies Ltd. 30
Internet
How Does it Work?
VPN
Roaming devices
GW in the cloud
[Restricted] ONLY for designated groups and individuals
Route all traffic to the internetvia a Gateway in the Cloud A
All communication is inspectedwith Check Point’s Software BladesB
©2015 Check Point Software Technologies Ltd. 31
Secure Cloud
DOCUMENTS
UNIFIED Security, UNIFIED Management
On Premise Gateway
©2015 Check Point Software Technologies Ltd. 32[Restricted] ONLY for designated groups and individuals
Need to Lock Down the Enterprise Back Door
SECURITY EVERYWHERE YOU GO
©2015 Check Point Software Technologies Ltd. 33
SINGLE SOLUTION for MOBILE SECURITY
C L O U D
D O C S
W O R K S P A C E
DOCS
Encrypt business documents
WORKSPACE
Secure business environment
CLOUD
Protect devices from threats
[Restricted] ONLY for designated groups and individuals
©2015 Check Point Software Technologies Ltd. 34©2014 Check Point Software Technologies Ltd.
THANK YOU!
[Restricted] ONLY for designated groups and individuals