check point endpoint security secure . fast . simple

33
[Unrestricted]—For everyone Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple

Upload: iona

Post on 21-Jan-2016

103 views

Category:

Documents


0 download

DESCRIPTION

Check Point Endpoint Security Secure . Fast . Simple. Agenda. Endpoint Security Challenges Today The Check Point Solution Comprehensive endpoint security Secure, fast and simple to use Market leading data security Optimized Total Security Summary. 1994 1 solution. 2009 ~9 solutions. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Check Point Endpoint Security Secure .  Fast .  Simple

[Unrestricted]—For everyone©2009 Check Point Software Technologies Ltd. All rights reserved.

Check Point Endpoint SecuritySecure. Fast. Simple

Page 2: Check Point Endpoint Security Secure .  Fast .  Simple

2[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Endpoint Security Challenges Today The Check Point Solution

– Comprehensive endpoint security– Secure, fast and simple to use– Market leading data security– Optimized Total Security

Summary

AgendaAgenda

Page 3: Check Point Endpoint Security Secure .  Fast .  Simple

3[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

2009~9 solutions

19941 solution

The Evolution of Endpoint SecurityThe Evolution of Endpoint Security

Antivirus

Remoteaccess/

VPN

Data leakage

Firewall

Antivirus

Anti-spam

Full DiskEncryption

MediaEncryptionAnti-

malwareNAC

More threatsMore threats

More technologiesMore technologies

More complexityMore complexity

Page 4: Check Point Endpoint Security Secure .  Fast .  Simple

4[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Too Much End User ComplexityToo Much End User Complexity

Security updates and patching

Repeated security logons

Multiple security applications

Reconnecting to VPN

Multiple passwords

Trying to reconfigure VPN

Page 5: Check Point Endpoint Security Secure .  Fast .  Simple

5[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Fast-Growing Web ThreatsFast-Growing Web Threats

VC's automated Twitter feed spreads malware

BusinessWeek site hacked, serving drive-by exploits

Drive-By Download Poisons

Google Search ResultsMay, 2009

September, 2008

June, 2009

Malware now spreads through the web not email

Forrester June, 2008

Page 6: Check Point Endpoint Security Secure .  Fast .  Simple

6[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

The Headache of Data SecurityThe Headache of Data Security

53%

65%

12,000

61%

of professionals have confidential data on their laptop

don’t protect them

stolen laptops in U.S. airports/week

of data breaches due to lack of policy enforcement

Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008

Page 7: Check Point Endpoint Security Secure .  Fast .  Simple

7[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

More Regulations, More ComplianceMore Regulations, More Compliance

PIPEDA

PCIHIPAA SOX Gramm-Leach-Bliley Act

95/46/EC European Union Directive

DPA Data Protection ActIndian IT Act of 2000

Privacy Act 1988

Japanese Law Personal Information Protection Law

Page 8: Check Point Endpoint Security Secure .  Fast .  Simple

8[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Endpoint Security NeedsEndpoint Security Needs

Highest level of endpoint protection

Simplified user experience

Corporate data loss prevention

Reduced complexity

Page 9: Check Point Endpoint Security Secure .  Fast .  Simple

9[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Endpoint Security Challenges Today The Check Point Solution

– Comprehensive endpoint security– Secure, fast and simple to use– Market leading data security– Optimized Total Security

Summary

AgendaAgenda

Page 10: Check Point Endpoint Security Secure .  Fast .  Simple

10[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Check Point Endpoint SecurityCheck Point Endpoint Security

2008 The First and Only Single Agent

for Endpoint Security

2009 Introducing Endpoint Security R73

Page 11: Check Point Endpoint Security Secure .  Fast .  Simple

11[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Check Point Endpoint SecurityCheck Point Endpoint Security

Market-Leading Data Security

Transparent and Simple to Use

Comprehensive Endpoint Protection

Optimized Total Security

Page 12: Check Point Endpoint Security Secure .  Fast .  Simple

12[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

ComprehensiveEndpoint Protection

Page 13: Check Point Endpoint Security Secure .  Fast .  Simple

13[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Complete Endpoint SecurityComplete Endpoint Security

Most comprehensiveendpoint solution in asingle agent Integrated VPN Integrated data security

Innovative levelsof protection WebCheck Secure

Browsing Program Control

Page 14: Check Point Endpoint Security Secure .  Fast .  Simple

14[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Most Secure Endpoint SecurityCheck Point WebCheckMost Secure Endpoint SecurityCheck Point WebCheck

http://www.mywebsite.comhttp://www.cheap-software.com

Dual browser mode

Segregates corporate data from the Internet

Isolates potential threats in the virtual browser sandbox

Protects against drive-by downloads and phishing attacks

Trusted siteUntrusted siteWebCheck enabled

Stops Web threats at the browser

Page 15: Check Point Endpoint Security Secure .  Fast .  Simple

15[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Check Point WebCheckCheck Point WebCheck

Threat DescriptionTraditional

Endpoint Security

Drive-by downloads

Stealth download of malware via browser vulnerability Secure virtual

browsing Signature update (if available)

Drive-by downloads via external plug-in

Stealth download of malware via plug-in process launched outside the browser Secure virtual

browsing Signature update (if available)

Drive-by download via toolbar plug-in

Stealth download of malware via vulnerable toolbar plug-in Secure virtual

browsing Signature update (if available)

Highest level of protection

Page 16: Check Point Endpoint Security Secure .  Fast .  Simple

16[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Authorized Applications

Check Point Program ControlCheck Point Program Control

Protect from malware by controlling endpoint applications

Lock down endpoint to reduce support costs and complexity

Easy to maintain with Program Advisor service automating application policy decisions

Page 17: Check Point Endpoint Security Secure .  Fast .  Simple

17[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Transparent and Simple to Use

Page 18: Check Point Endpoint Security Secure .  Fast .  Simple

18[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Transparent User ExperienceTransparent User Experience

InterfaceSingle

AgentSingle

UpdateSingle

ScanSingle

LogonSingle

Page 19: Check Point Endpoint Security Secure .  Fast .  Simple

19[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Data security

Endpoint

Windows

VPN

Check Point OneCheck Single LogonCheck Point OneCheck Single Logon

OneCheck

Reduce complexity of

multiple authentications

Transparentand simple

to use

Page 20: Check Point Endpoint Security Secure .  Fast .  Simple

20[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Stay connected on the move

Connect securely from hotspots

Configure new connections automatically

VPN Auto ConnectVPN Auto Connect

Automatically reconnect when moving between

networks (LAN, WiFi, GPRS)

Automatically open hotspot registration page immediately upon connection

Determine the correct

configuration and connect

automatically

Transparentand simple

to use

Page 21: Check Point Endpoint Security Secure .  Fast .  Simple

21[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Transparent and FastTransparent and Fast

Smallest disk footprint after install

Smallest memory footprint (before, during and after scan)

Fastest scan in the industry(62% faster than closest competitor)

Fastest Web page download with WebCheck enabled

Page 22: Check Point Endpoint Security Secure .  Fast .  Simple

22[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Market Leading Data Security

Page 23: Check Point Endpoint Security Secure .  Fast .  Simple

23[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Check Point Data SecurityCheck Point Data Security

Full Disk Encryption

Complete data security with 256-bit

encryption

File /folder encryption

Pre-boot authentication

Enforce password policies with more than 100 different smartcard models

Media Encryption

Control all activities and access on ports Transparently encrypt all removable media

Control data loss on all endpoints

Page 24: Check Point Endpoint Security Secure .  Fast .  Simple

24[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Secure data on all platforms

Highest level of certification

Recognized across the industry

Data Security Market LeaderData Security Market Leader

Mac

Linux Smartphones

Windows 7

Best MobileDevice Solution

Product ExcellenceEncryption

Solution

Leader in Magic Quadrant9 Years in a Row

Gold Medal 2009 Reader’s Choice Awards

Page 25: Check Point Endpoint Security Secure .  Fast .  Simple

25[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Rapid Large-Scale DeploymentRapid Large-Scale Deployment

EW modeEliminate management

scalabilityserverless management

Flexible agentDeploy only what

you need

Open architectureCo-exist with

3rd-party products

Windows-integratedlogon

Data security with no user disruption

Endpoint distribution utility

Use existinginstallation tools

Meet compliance objectives and secure corporate data now!

150,000 endpoints encrypted, .00066 failure rate

Telecommunications Company

50,000 endpoints secured in 30 daysGovernment Agency

Page 26: Check Point Endpoint Security Secure .  Fast .  Simple

26[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Optimized Total Security

Page 27: Check Point Endpoint Security Secure .  Fast .  Simple

27[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Total Security Challenge TodayTotal Security Challenge Today

Lack of policy orchestration

Weak threatcoverage

Infrastructure duplication

Separation of endpoint and network

security

Page 28: Check Point Endpoint Security Secure .  Fast .  Simple

28[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Cooperative EnforcementCooperative Enforcement

Built-in Network Access Control Control endpoint access

to corporate network Coordinate network and

endpoint security policies

Enforce endpoint compliance Quarantine non-compliant

systems

QUARANTINED

Page 29: Check Point Endpoint Security Secure .  Fast .  Simple

29[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Security Infrastructure OptimizationSecurity Infrastructure Optimization

Network Security Endpoint Security

Server consolidation

Simplemanagement

Simpledeployment

Page 30: Check Point Endpoint Security Secure .  Fast .  Simple

30[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Worldwide coordinated network and endpoint threat research

Unified Threat ResearchUnified Threat Research

Update Protection against Microsoft Office Web Components Multiple ActiveX Controls Remote Code Execution Vulnerability (MS09-043)

Endpoint Security R72

Security Gateway R70

VPN-1 NGX R65

IPS-1

Protection Provided by:

CVE-2009-0562

CVE-2009-1136

Industry Reference

MSFT Security BulletinSource:

CriticalSeverity:

15-Jul-09Date Published:

CPAI-2009-1029Check Point Reference:

Overview Details ProtectionSubscribe

Check PointProtection Update

Unified notifications for new threats

Multi-layered protection across endpoint and network security

Common threat definitions across endpoint and network

Page 31: Check Point Endpoint Security Secure .  Fast .  Simple

31[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Endpoint Security ManagementEndpoint Security Management

Easy Deployment, Easy Management with Single Console

ComingSoon

Page 32: Check Point Endpoint Security Secure .  Fast .  Simple

32[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

Corporate data loss prevention

Your Opportunity with Check PointYour Opportunity with Check Point

User transparency and ease of use

Best endpoint security

Reduced complexity

Page 33: Check Point Endpoint Security Secure .  Fast .  Simple

33[Unrestricted]—For everyone

©2009 Check Point Software Technologies Ltd. All rights reserved.

SummarySummary

Market-Leading Data Security

Transparent and Simple to Use

Comprehensive Endpoint Protection

Optimized Total Security