stay one step ahead of cyber threats - check point
TRANSCRIPT
PowerPoint Presentation
Stay One Step Ahead of Cyber Threats
Mobile is overtaking desktop, social is beating search, messaging apps are challenging email, and everything around us is becoming connected.THE ERA OF DIGITAL TRANSFORMATION
Change2
CIOProvide up to the second information to everyone , everywhere
President How can I create value to my customer and partners?
LEADERS MAKE MAJOR BUSINESS DECISIONS DAILYEVERY MAJOR DECISION EVOKES SECURITY RISKSCMONew automated campaign and demand generation will make a difference!
CEOHow can Technology transform my business
CFODo I comply with regulation?
2016 Check Point Software Technologies Ltd. #Increase RevenueReduce CostsMitigate RisksMeet Compliance Requirements3
HOW TO MAKE BUSINESS DECISIONSWITHOUT COMPROMISING SECURITY
2016 Check Point Software Technologies Ltd. #People FACE - Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision. 4
THERE ARE MILLIONS AND MILLIONS OF NEW CONNECTIONS CREATED EVERY SECOND
THERE ARE MORE AND MORE THINGS WE DONT CONTROL
2016 Check Point Software Technologies Ltd. #Because there are more and more areas we dont control, IT environment is more and more shared and open and less and less controlledWith IoT, Cloud, Mobile, Software defined.
5
CHANGES CREATE NEW OPPORTUNITIES
BUT NOT EVERYONE HAS GOOD INTENTIONS
2016 Check Point Software Technologies Ltd. #
6
THERE ARE MORE AND MORE THINGS WE DONT KNOWZERO DAY, VirusCVEsBad URLsAPTS, UNKNOWN MALWARE
SignaturesExploitsTrojansBotnets
THE GROWTH OF THE UNKNOWN MALWARE
2016 Check Point Software Technologies Ltd. #Because there are more and more threats and hackers we dont know
Threat landscape is evolving so fast with new threats, new techniques, new actors and new targets.
Impossible to predict with certainty what the next waves of malware will look like. 7
BC
In an environment where there are more and more things THE RIGHT DECISION TO RUN THE BUSINESS?HOW DO YOU KNOW YOU ARE MAKINGyou DONT CONTROL and more things you DONT KNOW
2016 Check Point Software Technologies Ltd. #Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision. 8
HOW DO YOUINNOVATE, INSPIRE AND COMPETEWHILE REMAININGSECURED?
80% of board members say that cybersecurity is discussed at nearly every board meeting*.
But still 66% of board members are NOT CONFIDENT[Restricted] ONLY for designated groups and individuals$86B 2016 projected global enterprise IT security spending (8.8% yearly increase) and will grow to $101B by 2018*In 2015 38% more security incidents were detected than in 2014 *
2016 Check Point Software Technologies Ltd. #http://www.csoonline.com/article/2927395/data-protection/cybersecurity-on-the-agenda-for-80-percent-of-corporate-boards.html
Alternative statIn 2015 almost half of boards participate in the overall security strategy of the company**PWC The Global State of Information Security Survey 2016
10
Everybodys talking about being secureAnd yetBreachBREACHBREACHHHHHHMost security companies focus on Detection after the breach
Security Industry says they cant stop the Breach[Restricted] ONLY for designated groups and individuals
2016 Check Point Software Technologies Ltd. #Situation: The world wants to tell that breaches are inevitable 11
So, should you just detect the breach and try to clean up after?Its true breaches are happening everywhere
[Restricted] ONLY for designated groups and individuals
2016 Check Point Software Technologies Ltd. #Situation: breaches keep happening, thats true, so should you just wait until its your turn?
Industry says The only way to catch advanced malware like ransomware or an advanced persistent threat is to investigate after it has breached your business 12
WHY THE DISCONNECT ?
Lack of an end-end security strategy1400 security vendors in the market today its complicatedCybercrime is different than conventional warfare
2016 Check Point Software Technologies Ltd. #Board down to Admins What should we do?13
THE CYBER THREAT LANDSCAPE IS EVOLVING WITH RAPID PACE more sophisticated and more advanced
Most security technologies arePATCHWORK OF POINT SOLUTIONSCOMPLEX SOLUTIONS WITH UNCERTAIN SECURITY COVERAGELooking for yesterdays signaturesDetection instead of prevention ONE STEP BEHIND
Security technologies are embattled in constantly chasing after these threats to close the gaps.An overabundance of security solutions makes it more complicated and challenging for IT managers to keep up. Organizations need to constantly gain new knowledge and hire talented people to continuously understand what is going on their network.
15
THE Almost, Sort of GREAT DEBATE ?DETECTPREVENT
Not really16
Focus onPREVENTION
SoONE STEP AHEAD
2015 Check Point Software Technologies Ltd. #
BLOCK attacks before they happen!DEFEND with advanced tools that stop today, tomorrows threatsPROTECT every frontier from mobile to cloudONE STEP AHEAD. THE PRINCIPLES[Restricted] ONLY for designated groups and individuals
One SIMPLE system CONSOLIDATING all security solutions
2016 Check Point Software Technologies Ltd. #
USE SECURITY THAT PREVENTS BOTH THEKNOWN UNKNOWN THREATS
Reconnaissance
DeliveryExploitation Control
ONE STEP AHEAD MEANSBLOCK/PREVENT THE ATTACK AT EVERY STAGE
2015 Check Point Software Technologies Ltd. #One step ahead means a number of things:
Prevention, Not Detection or remediation
Prevention on each part of the kill Chain21
PREVENTING THE KILL CHAINRECONNAISSANCEPrevent suspiciousnetwork activity
DELIVERYPrevent maliciousdownloadsEXPLOITATIONPrevent exploitationof vulnerabilities CONTROLPrevent command & control activity
2015 Check Point Software Technologies Ltd. #One step ahead means a number of things:
Prevention, Not Detection or remediation
Prevention on each part of the kill Chain22
PREVENT ATTACKS AT THE PRE-INFECTION STAGE
PREVENTING THE KILL CHAIN
2015 Check Point Software Technologies Ltd. #Known GOOD instead of Known BAD23
ONE STEP AHEAD MEANSBLOCKING ATTACKS EVERYWHERE
2015 Check Point Software Technologies Ltd. #
PREVENTIONACROSSALLBUSINESS PLATFORMS
ONE STEP AHEAD MEANSPREVENTING ATTACKS EVERYWHERE
2015 Check Point Software Technologies Ltd. #
BUILDARCHITECTURE
Instead of lots of Point solutions
Protect your assets, data and your brand - and to do that in a way that allows the business the freedom to make the choices they need to make to run their business - without compromising security.26
Integrated Threat ManagementEfficient, Automated OperationsUnified Policy ManagementA SINGLE MANAGEMENTPLATFORM TO CONSOLIDATE ALL YOURSECURITY
Our next generation policies provide a radically different way of approaching policy management. Weve taken a long hard look at how daily tasks are performed and consolidated and streamlined features to make it as efficient as possible for the security admin to do his work. With R80s automation capabilities, we are paving the way for automated security provisioning and controls. And when it comes to security visibility - weve fully integrated threat management into the main console so security teams can pivot quickly from policy to incidence response and have a holistic view of their security posture in one single place.27
20% REDUCTION in consolidating on single architecture SECURITY SPEND 50% REDUCTION inHUMAN CAPITALWith single management platform
Stops exploits ofknown vulnerabilities
IPS
Prevents bot damagefrom infected devices
Anti-Bot
Blocks download ofknown malware infested files
Antivirus
Stops unknown zero-day malware in files
Threat Emulation
Multi Layer Detection and Threat Prevention
KNOWNUNKNOWN
Remove Zero Day malware in Zero Seconds
Threat Extraction
29
Successful Defense Components[Restricted] ONLY for designated groups and individualsReconnaissanceWeaponizationDeliveryExploitationInstallationCommand & ControlAct on ObjectivesPre-CompromiseCompromisePost-CompromiseDLPThreat IntelligenceFirewallAnti-VirusAnti-BotAnti-Bot IPSFirewallDLPDocument SecurityAnti-SpamURL FilteringThreat Emulation Threat ExtractionMobile Threat PreventionIPSThreat EmulationEndpoint SecurityEndpoint SecurityForensicsMobile Threat PreventionDocument SecurityFirewallIPSExtensive researchCollaboration with industry leading servicesSharing across users communityMulti-layer architectureEvasion-resistant detection Best catch rate
Proactive practical preventionEffective containmentClear visibility and insight
INTELLIGENCE
DETECTION
PREVENTION
30
YOU AREEXPOSED!MOBILE?
ATTACKS3 VECTORS OF
Network Attacks
OS Exploits
Infected Apps
USERS32
TURN ON THE MICROPHONE
TURN ON THE CAMERA
TRACK DEVICE LOCATION
CAPTURE EMAILS
EXTRACT DATA
STEAL USERNAME & PASSWORD
MOBILE SECURITY BUILDING BLOCKS
Mobile Device ManagementPolicy Enforcement
Secure ContainersData Leakage Prevention
Anti-Virus, App ReputationKnown ThreatsMobile Threat Prevention Unknown Threats and Zero Day
AirWatch34
TODAY
201620202014
ONEARCHITECTURE
SINGLEMANAGEMENT
CLOUD
DATACENTER
ENDPOINT
MOBILE
NETWORK
IoT
https://www.infopackets.com/news/9449/cyber-attacks-businesses-doubled-2014-report
36
Generations in cyber security [Protected] Non-confidential contentCyber
Network & EndpointVECTORSNetwork, EndpointMobile, Datacenter & CloudReactive & Silod focused on detectionSTRATEGYProactive & Holistic focused on preventionPoint solutions, multiple consolesARCHITECTUREOne consolidated system, single management Conventional Organized & targetedBOUNDARIESAmateur & random attacks To Summarize