check point go customer presentation
DESCRIPTION
Check Point Global Office: Customer PresentationTRANSCRIPT
©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
Check Point GO
Put Your Office in Your Pocket
Secure Virtual Workspace
Jordi Medina Torregrosa
2 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Agenda
1 Introducing Check Point GO
2 New Workforce Challenges
3 The Check Point GO Solution
3 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Agenda
1 Introducing Check Point GO
2 New Workforce Challenges
3 The Check Point GO Solution
4 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Forever Change the Way You Work
Check Point GO
►Securely access
and work with
corporate data
from any PC
►Virtual Windows
workspace
►Plug-and-play with
no software install
or system reboot
required
5 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Introducing Check Point GO
Check Point GO Put your office in your pocket
Virtual workspace that keeps mobile data secure
Ideal for mobile workers, contractors and disaster recovery
Instantly turn any PC into your own corporate desktop
6 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Why Check Point GO?
Who Needs
Check Point
GO?
Why?
Unauthorized applications
Every user
Mobile. Remote. Home.
Contractors
Unmanaged PCs
Disaster recovery
Sustain productivity
Unsecured connections
Data loss
Compliance for unmanaged PCs
7 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Agenda
1 Introducing Check Point GO
2 New Workforce Challenges
3 The Check Point GO Solution
8 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Remote Workforce Challenges
Working—and Accessing Files—from Home
Examples
► Isolate and protect your
corporate data while using
your family PC
► Avoid unintentional data loss
during home PC usage by
family members by
segregating corporate data “42% of US employers allowed
staff to work remotely this
year—up from 30%.”
—World at Work 2009
(Survey of 2,288 U.S. employers)
9 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Business Continuity Challenges
The Case of the Icelandic Volcano
Examples
► Maintain productivity even
when large numbers of your
workforce are stranded due to
a volcanic eruption or other
natural disaster
► Sustain business continuity
when a snow-day forces the
closure of your office
“Companies prepared for
business interruptions… are
the ones most likely to be keep
themselves operating.”
—AP Report, Iceland Volcano 2010
10 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
3rd-Party Workforce Challenges
Partners, Contractors and Shared Environments
Examples
► Prevent contractors from
exposing your sensitive
information to 3rd parties
► Maximize assets usage in
shared environments - such
as call centers - while
providing personal workspace
to all employees
“Over 44% of all cases in this
year’s data-breach study
involved third-party mistakes.”
—Ponemon Institute 2009
11 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Agenda
1 Introducing Check Point GO
2 New Workforce Challenges
3 The Check Point GO Solution
12 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Plug-and-Play Solution to Fit Any PC
Work On-Line
Seamless and secure
connectivity to the
corporate network
Work Off-Line
Access working files and
data from the
virtual workspace
13 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Standard Windows Environment
Access to Intranet and
approved websites
Launch approved
applications
Toggle
between
secure
workspace
and host PC
Access
encrypted
files on
USB drive
14 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Secure Virtual Workspace
Keeping Mobile Data Secure
Hardware
and Software
Encryption
►Always-on
AES 256-bit
encryption
►Tamper-proof
device
Segregate
Workspace
from Host PC
► Isolates all
user files
►Prevents
data leaking
to host PC
Block and
Control
Applications
►Control
outgoing
traffic to stop
data loss
►Block
unauthorized
applications
15 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Security Through Segregation
Check Point GO files and folders
have always-on hardware
and software encryption
No residue is left
on the RAM
Printing is blocked
Encrypted and
segregated clipboard
Switching environments
between Check Point GO and PC
Check Point GO folders are not
accessible from the PC
PC folders are not
accessible from Check Point GO
16 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Low Cost for Unrivaled Savings
Low TCO Solution for Mobile Users
$1200 $140
17 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Three Solutions in One
Check Point GO
Secure virtualization
Secured connection solutions
Portable, plug-and-play solutions
18 ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Check Point GO Put your office in your pocket
Turn Any PC into Your Own
Keep Mobile Data Secure
Ideal for Mobile Workers
©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
Thank You!