check point capsule - licencias online€¦ · 2source: kindsight security labs malware report 2013...

34
©2015 Check Point Software Technologies Ltd. 1 ©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals Revolutionizing the Mobile Security market Francisco Robayo | SE Manager LATAM CHECK POINT CAPSULE

Upload: others

Post on 31-May-2020

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals

Revolutionizing the Mobile Security market

Francisco Robayo | SE Manager LATAM

CHECK POINT CAPSULE

Page 2: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 2[Restricted] ONLY for designated groups and individuals

Mobile Market

K E E P G R O W I N G

Page 3: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 3

Rapidly Expanding Mobile Threats

11.6 million mobile devices infected2

MOBILE THREATS are ESCALATINGin frequency and sophistication EVERY YEAR

©2014 Check Point Software Technologies Ltd. 3[Restricted] ONLY for designated groups and individuals

• 1st malware for Android and iOS

• Root exploits

• Banking malware

• SMS Trojans

• CABIR worm,Infecting Symbian OSvia Bluetooth connection 1Source: Symantec, “A Brief History of Mobile Malware” February 2014

2Source: Kindsight Security Labs Malware Report 2013

2014

201220102005

2004

First mobile virus1

2007First iPhone

2008First Android

• Spyware

• Ransomware

Page 4: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 4[Restricted] ONLY for designated groups and individuals

Has your mobile device been used …

71% of adults over

18 have a Facebook

account2

Facebook?

[Restricted] ONLY for designated groups and individuals

Over 30% of parents

let their kids

use their corporate

devices1

To access Dropbox?

1 in 5 employees

use consumer cloud

storage for work

documents3

By your kids?

12013 Norton Report, Oct 2013, by Symantec

22013 Pew Research Center Internet Project Tracking Survey

3Nasuni Survey of 1300 business users as reported by GigaOm

Page 5: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 5©2014 Check Point Software Technologies Ltd. 5

Infection or Loss … Easy as 1, 2, 3

SURF THE INTERNETUPLOAD FILES

TO THE CLOUDFORGET DEVICE

Page 6: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 6

So maybe you only did one of these

By the number of

Employees=Now

©2014 Check Point Software Technologies Ltd. 6[Restricted] ONLY for designated groups and individuals

C O N S E R V A T I V E number of potentialB R E A C H E S on your network

Page 7: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 7©2014 Check Point Software Technologies Ltd. 7

Protect Own Network

Protect Devices on

Other Networks

Protect Documents

Everywhere

Protecting Across ALL Networks

Expanding Network for the CIO

Page 8: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 8

Today’s Solutions Leave Security Gaps

©2014 Check Point Software Technologies Ltd. 8[Restricted] ONLY for designated groups and individuals

How do you protect devices from T H R E A T S ?

How do you protect D A T A wherever it goes?

• Device management focused

• No protection for data onceit leaves the device

• No capability to secure devices from threats

• Complex management requiring multiple consoles

Page 9: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 9©2015 Check Point Software Technologies Ltd. 9

Customers are still looking for a solution

70%

of enterprises see mobile

support to employees

as critical priority

50%

of firms see implementing

a BYOD policy as

critical priority

75%

of large enterprises will have

deployed technologies to

secure access to enterprise

resources by 2016

Forrester

Gartner

[Restricted] ONLY for designated groups and individuals

Page 10: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 10

Mobile Devices Are Becoming Key In New Attacks

[Restricted] ONLY for designated groups and individuals

HAVE OUR BUSINESS DATA

SHARE OUR BUSINESS DATA

BECOME THE BACKDOOR

TO OUR ENTERPRISE NETWORK

Page 11: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 11

Limited Mobile Security

[Restricted] ONLY for designated groups and individuals

Devices Are

Not ProtectedData is

Exposed

Loss of

Devices

E x i s t i n g s o l u t i o n DO NOT

a d d r e s s t h e s e c u r i t y p r o b l e m

Page 12: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 12[Restricted] ONLY for designated groups and individuals

Ensurestrong security

Increase productivity

Creating the Balance

WHY IS THE MOBILE SECURITY

PROBLEM SO UNIQUE?

Page 13: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 13©2014 Check Point Software Technologies Ltd. 13[Restricted] ONLY for designated groups and individuals

So What is Needed From a Full Security Solution for Mobile ?

Screen for

Malware

EncryptBusiness

Documents

Safe Workspace

[Restricted] ONLY for designated groups and individuals

P r o t e c t i n g t h e M o b i l e F r o n t i e r

Page 14: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 14[Restricted] ONLY for designated groups and individuals

CHECK POINT CAPSULE

C u s t o m e r s a r e still looking

f o r t h e r i g h t s o l u t i o n

Page 15: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 15

SINGLE SOLUTION for MOBILE SECURITY

C L O U D

D O C S

W O R K S P A C E

DOCS

Encrypt business documents

WORKSPACE

Secure business environment

CLOUD

Protect devices from threats

[Restricted] ONLY for designated groups and individuals

Page 16: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 16

S E A M L E S Sd o c u m e n t

e n c r yp t i o n

-- CONFIDENTIAL --

C O M P L E T E protection for your M O B I L E W O R K F O R C E

S E PA R AT Eb u s i n e s s e n v i r o n m e n t

Secure Cloud

P R O T E C T yo u

f r o m m a lw a r e

[Restricted] ONLY for designated groups and individuals

Page 17: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 17

2 SCENARIOS

[Restricted] ONLY for designated groups and individuals

Page 18: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 18[Restricted] ONLY for designated groups and individuals

BYOD Challenges

“Our managers use personal devices to access sensitive data”

- Energy company

Requirements:

• Secure access to mail

• Business documents only allowed

to authorized users

• Remote wipe of business data

• Simple solution

Page 19: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 19[Restricted] ONLY for designated groups and individuals

- Energy company

TODAY

Protecting confidential

documents with password

Existing Solutions

Using native email

Does this really protect your data?

Page 20: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 20[Restricted] ONLY for designated groups and individuals

Using native email

Mixing business and personal data

Loss control on business information

Why Native Email is NOT Secure?

From: [email protected]

Page 21: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 21[Restricted] ONLY for designated groups and individuals

Using the same password over and over

Send password in email body

Protecting confidential

documents with password

Why Password Protection is Not Enough?

Password: 12345

Page 22: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 22©2014 Check Point Software Technologies Ltd. 22[Restricted] ONLY for designated groups and individuals

Capsule – the right solution for mobile security

Screen for

Malware

EncryptBusiness

Documents

Safe Workspace

[Restricted] ONLY for designated groups and individuals

P r o t e c t i n g t h e M o b i l e F r o n t i e r

Page 23: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 23

Experience Capsule

[Restricted] ONLY for designated groups and individuals

• No additional hardware required

• No upgrade or downtimes

• Quick and easy

Available now:

capsule.checkpoint.com

Page 24: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 24[Restricted] ONLY for designated groups and individuals

Customers use point solutions to share files

So your business data is now secure

ON mobile devices

But how would you share it with other people?

Share files with colleagues &

executives

Share files with business partners

Page 25: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 25[Restricted] ONLY for designated groups and individuals

“We provide our talent scouts with tablets that often get infected with viruses”

- Major League Baseball Team

Remote Workforce Challenges

Requirements:

• Enforce the same Threat

Prevention and URL-Filtering as

we have in our company network

Page 26: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 26[Restricted] ONLY for designated groups and individuals

TODAY

Existing Solutions

- Major League Baseball Team

MDM restrict specific

applications

Does this really protect you

from threats?

Page 27: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 27

So, what is MDM?

[Restricted] ONLY for designated groups and individuals

Managesmobile devices

Configuresmobile devices

Monitorsmobile devices

MDM restrict specific

applications

Mobile Device Management

Page 28: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 28[Restricted] ONLY for designated groups and individuals

MDM Does Not Provide Security

Block download of malware

Protect from bad URLs & Applications

MDM does not:

“MDM Vendors Sell Enablement, Not Security”Gartner

Detect and prevent bot damage

Page 29: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 29©2014 Check Point Software Technologies Ltd. 29[Restricted] ONLY for designated groups and individuals

Capsule – the right solution for mobile security

Screen for

Malware

EncryptBusiness

Documents

Safe Workspace

[Restricted] ONLY for designated groups and individuals

P r o t e c t i n g t h e M o b i l e F r o n t i e r

Capsule offers complete solution with Best Security

IPS Application

Control

URL

Filtering

Anti-Bot Anti-Virus Threat

Emulation

Page 30: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 30

Internet

How Does it Work?

VPN

Roaming devices

GW in the cloud

[Restricted] ONLY for designated groups and individuals

Route all traffic to the internetvia a Gateway in the Cloud A

All communication is inspectedwith Check Point’s Software BladesB

Page 31: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 31

Secure Cloud

DOCUMENTS

UNIFIED Security, UNIFIED Management

On Premise Gateway

Page 32: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 32[Restricted] ONLY for designated groups and individuals

Need to Lock Down the Enterprise Back Door

SECURITY EVERYWHERE YOU GO

Page 33: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 33

SINGLE SOLUTION for MOBILE SECURITY

C L O U D

D O C S

W O R K S P A C E

DOCS

Encrypt business documents

WORKSPACE

Secure business environment

CLOUD

Protect devices from threats

[Restricted] ONLY for designated groups and individuals

Page 34: CHECK POINT CAPSULE - Licencias OnLine€¦ · 2Source: Kindsight Security Labs Malware Report 2013 2014 2010 2012 2005 2004 First mobile virus1 2007 First iPhone 2008 First Android

©2015 Check Point Software Technologies Ltd. 34©2014 Check Point Software Technologies Ltd.

THANK YOU!

[Restricted] ONLY for designated groups and individuals