stay one step ahead of cyber threats - check point

38
Stay One Step Ahead of Cyber Threats

Upload: marcotechnologies

Post on 20-Mar-2017

152 views

Category:

Technology


0 download

TRANSCRIPT

PowerPoint Presentation

Stay One Step Ahead of Cyber Threats

Mobile is overtaking desktop, social is beating search, messaging apps are challenging email, and everything around us is becoming connected.THE ERA OF DIGITAL TRANSFORMATION

Change2

CIOProvide up to the second information to everyone , everywhere

President How can I create value to my customer and partners?

LEADERS MAKE MAJOR BUSINESS DECISIONS DAILYEVERY MAJOR DECISION EVOKES SECURITY RISKSCMONew automated campaign and demand generation will make a difference!

CEOHow can Technology transform my business

CFODo I comply with regulation?

2016 Check Point Software Technologies Ltd. #Increase RevenueReduce CostsMitigate RisksMeet Compliance Requirements3

HOW TO MAKE BUSINESS DECISIONSWITHOUT COMPROMISING SECURITY

2016 Check Point Software Technologies Ltd. #People FACE - Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision. 4

THERE ARE MILLIONS AND MILLIONS OF NEW CONNECTIONS CREATED EVERY SECOND

THERE ARE MORE AND MORE THINGS WE DONT CONTROL

2016 Check Point Software Technologies Ltd. #Because there are more and more areas we dont control, IT environment is more and more shared and open and less and less controlledWith IoT, Cloud, Mobile, Software defined.

5

CHANGES CREATE NEW OPPORTUNITIES

BUT NOT EVERYONE HAS GOOD INTENTIONS

2016 Check Point Software Technologies Ltd. #

6

THERE ARE MORE AND MORE THINGS WE DONT KNOWZERO DAY, VirusCVEsBad URLsAPTS, UNKNOWN MALWARE

SignaturesExploitsTrojansBotnets

THE GROWTH OF THE UNKNOWN MALWARE

2016 Check Point Software Technologies Ltd. #Because there are more and more threats and hackers we dont know

Threat landscape is evolving so fast with new threats, new techniques, new actors and new targets.

Impossible to predict with certainty what the next waves of malware will look like. 7

BC

In an environment where there are more and more things THE RIGHT DECISION TO RUN THE BUSINESS?HOW DO YOU KNOW YOU ARE MAKINGyou DONT CONTROL and more things you DONT KNOW

2016 Check Point Software Technologies Ltd. #Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision. 8

HOW DO YOUINNOVATE, INSPIRE AND COMPETEWHILE REMAININGSECURED?

80% of board members say that cybersecurity is discussed at nearly every board meeting*.

But still 66% of board members are NOT CONFIDENT[Restricted] ONLY for designated groups and individuals$86B 2016 projected global enterprise IT security spending (8.8% yearly increase) and will grow to $101B by 2018*In 2015 38% more security incidents were detected than in 2014 *

2016 Check Point Software Technologies Ltd. #http://www.csoonline.com/article/2927395/data-protection/cybersecurity-on-the-agenda-for-80-percent-of-corporate-boards.html

Alternative statIn 2015 almost half of boards participate in the overall security strategy of the company**PWC The Global State of Information Security Survey 2016

10

Everybodys talking about being secureAnd yetBreachBREACHBREACHHHHHHMost security companies focus on Detection after the breach

Security Industry says they cant stop the Breach[Restricted] ONLY for designated groups and individuals

2016 Check Point Software Technologies Ltd. #Situation: The world wants to tell that breaches are inevitable 11

So, should you just detect the breach and try to clean up after?Its true breaches are happening everywhere

[Restricted] ONLY for designated groups and individuals

2016 Check Point Software Technologies Ltd. #Situation: breaches keep happening, thats true, so should you just wait until its your turn?

Industry says The only way to catch advanced malware like ransomware or an advanced persistent threat is to investigate after it has breached your business 12

WHY THE DISCONNECT ?

Lack of an end-end security strategy1400 security vendors in the market today its complicatedCybercrime is different than conventional warfare

2016 Check Point Software Technologies Ltd. #Board down to Admins What should we do?13

THE CYBER THREAT LANDSCAPE IS EVOLVING WITH RAPID PACE more sophisticated and more advanced

Most security technologies arePATCHWORK OF POINT SOLUTIONSCOMPLEX SOLUTIONS WITH UNCERTAIN SECURITY COVERAGELooking for yesterdays signaturesDetection instead of prevention ONE STEP BEHIND

Security technologies are embattled in constantly chasing after these threats to close the gaps.An overabundance of security solutions makes it more complicated and challenging for IT managers to keep up. Organizations need to constantly gain new knowledge and hire talented people to continuously understand what is going on their network.

15

THE Almost, Sort of GREAT DEBATE ?DETECTPREVENT

Not really16

Focus onPREVENTION

SoONE STEP AHEAD

2015 Check Point Software Technologies Ltd. #

BLOCK attacks before they happen!DEFEND with advanced tools that stop today, tomorrows threatsPROTECT every frontier from mobile to cloudONE STEP AHEAD. THE PRINCIPLES[Restricted] ONLY for designated groups and individuals

One SIMPLE system CONSOLIDATING all security solutions

2016 Check Point Software Technologies Ltd. #

USE SECURITY THAT PREVENTS BOTH THEKNOWN UNKNOWN THREATS

Reconnaissance

DeliveryExploitation Control

ONE STEP AHEAD MEANSBLOCK/PREVENT THE ATTACK AT EVERY STAGE

2015 Check Point Software Technologies Ltd. #One step ahead means a number of things:

Prevention, Not Detection or remediation

Prevention on each part of the kill Chain21

PREVENTING THE KILL CHAINRECONNAISSANCEPrevent suspiciousnetwork activity

DELIVERYPrevent maliciousdownloadsEXPLOITATIONPrevent exploitationof vulnerabilities CONTROLPrevent command & control activity

2015 Check Point Software Technologies Ltd. #One step ahead means a number of things:

Prevention, Not Detection or remediation

Prevention on each part of the kill Chain22

PREVENT ATTACKS AT THE PRE-INFECTION STAGE

PREVENTING THE KILL CHAIN

2015 Check Point Software Technologies Ltd. #Known GOOD instead of Known BAD23

ONE STEP AHEAD MEANSBLOCKING ATTACKS EVERYWHERE

2015 Check Point Software Technologies Ltd. #

PREVENTIONACROSSALLBUSINESS PLATFORMS

ONE STEP AHEAD MEANSPREVENTING ATTACKS EVERYWHERE

2015 Check Point Software Technologies Ltd. #

BUILDARCHITECTURE

Instead of lots of Point solutions

Protect your assets, data and your brand - and to do that in a way that allows the business the freedom to make the choices they need to make to run their business - without compromising security.26

Integrated Threat ManagementEfficient, Automated OperationsUnified Policy ManagementA SINGLE MANAGEMENTPLATFORM TO CONSOLIDATE ALL YOURSECURITY

Our next generation policies provide a radically different way of approaching policy management. Weve taken a long hard look at how daily tasks are performed and consolidated and streamlined features to make it as efficient as possible for the security admin to do his work. With R80s automation capabilities, we are paving the way for automated security provisioning and controls. And when it comes to security visibility - weve fully integrated threat management into the main console so security teams can pivot quickly from policy to incidence response and have a holistic view of their security posture in one single place.27

20% REDUCTION in consolidating on single architecture SECURITY SPEND 50% REDUCTION inHUMAN CAPITALWith single management platform

Stops exploits ofknown vulnerabilities

IPS

Prevents bot damagefrom infected devices

Anti-Bot

Blocks download ofknown malware infested files

Antivirus

Stops unknown zero-day malware in files

Threat Emulation

Multi Layer Detection and Threat Prevention

KNOWNUNKNOWN

Remove Zero Day malware in Zero Seconds

Threat Extraction

29

Successful Defense Components[Restricted] ONLY for designated groups and individualsReconnaissanceWeaponizationDeliveryExploitationInstallationCommand & ControlAct on ObjectivesPre-CompromiseCompromisePost-CompromiseDLPThreat IntelligenceFirewallAnti-VirusAnti-BotAnti-Bot IPSFirewallDLPDocument SecurityAnti-SpamURL FilteringThreat Emulation Threat ExtractionMobile Threat PreventionIPSThreat EmulationEndpoint SecurityEndpoint SecurityForensicsMobile Threat PreventionDocument SecurityFirewallIPSExtensive researchCollaboration with industry leading servicesSharing across users communityMulti-layer architectureEvasion-resistant detection Best catch rate

Proactive practical preventionEffective containmentClear visibility and insight

INTELLIGENCE

DETECTION

PREVENTION

30

YOU AREEXPOSED!MOBILE?

ATTACKS3 VECTORS OF

Network Attacks

OS Exploits

Infected Apps

USERS32

TURN ON THE MICROPHONE

TURN ON THE CAMERA

TRACK DEVICE LOCATION

CAPTURE EMAILS

EXTRACT DATA

STEAL USERNAME & PASSWORD

MOBILE SECURITY BUILDING BLOCKS

Mobile Device ManagementPolicy Enforcement

Secure ContainersData Leakage Prevention

Anti-Virus, App ReputationKnown ThreatsMobile Threat Prevention Unknown Threats and Zero Day

AirWatch34

TODAY

201620202014

ONEARCHITECTURE

SINGLEMANAGEMENT

CLOUD

DATACENTER

ENDPOINT

MOBILE

NETWORK

IoT

https://www.infopackets.com/news/9449/cyber-attacks-businesses-doubled-2014-report

36

Generations in cyber security [Protected] Non-confidential contentCyber

Network & EndpointVECTORSNetwork, EndpointMobile, Datacenter & CloudReactive & Silod focused on detectionSTRATEGYProactive & Holistic focused on preventionPoint solutions, multiple consolesARCHITECTUREOne consolidated system, single management Conventional Organized & targetedBOUNDARIESAmateur & random attacks To Summarize