Endpoint Security Current portfolio and looking forward October 2010 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2 Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3 Endpoint Security today Our current portfolio R73 (HFA1) Abra Mobile clients (VPN, Encryption) ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4 R73 Evolution R73 / HFA1 Unified Client Project R71 / R72 R70 ZoneLabs Acquisition 2004 Pointsec Acquisition 2007 2008 2009 ©2010 Check Point Software Technologies Ltd. 2010 | [Unrestricted] For everyone | 5 5 Endpoint Security R73 Unified Endpoint Protection Best of breed Components ► Data Security ► Network Security ► Remote Access components Provides full security coverage Flexible & Modular Deploy what you need now, add what you need in the future Multiple component and suite deployment options ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6 R73 – Data Security Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot authentication Media Encryption protects your removable medias Combines Media Encryption and Port Protection ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7 R73 HFA1 – Network Protection Not just a firewall Innovative Network Protection Technologies Program Advisor, WebCheck Complementary Anti-Malware Award-winning, high-performance ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8 R73 HFA1 - Remote Access Choice of two VPN clients: Endpoint Connect ► Smart connection, whatever the network or connectivity challenges ► Transparent “in the office” user experience ► Embedded hot-spot handling ► 32- and 64-bit client support Legacy SecureClient ► Ensuring topology and deployment compatibility ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9 Endpoint Security R73 – New features Support of Windows 7 New Anti Malware engine ME new features FDE Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption Support of IRRT enabled laptops (Dell E-Series) Improved client-side performance ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10 Fast User Experience 100 - 160 - 40 10 - System Boot Time 145 130 - McAfee 70 - Check Point Megabytes 175 - Symantec 130 - McAfee Seconds Lowest CPU and Memory Utilization Check Point Symantec 115 Memory footprint Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11 Fast User Experience 1200 - 1200 - Check Point 0- Anti-malware INITIAL scan time 400 0- Check Point Symantec 400 - 800 McAfee 800 - Seconds 1600 - Symantec 1600 - McAfee Seconds Fastest Anti-malware Scan Time Anti-malware RECURRING scan time Anti-malware tests on Windows 7 Source: Check Point Labs ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12 Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and 2008 32bit FDE new features ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users WebRH Supports latest intel chipset Supports hibernation on 64bits OS AD integration Support of SQL Server 2008 SA new features Server Support for Anti-malware Check Point R71 management support ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13 Abra R70 Turn any PC into a corporate desktop Keep mobile data secure USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported Secure Workspace isolates/protects data from host Central SW policy controls applications & features Maintain secure connectivity Provide flexible, secure access to corporate resources, info repositories, and applications Leverage existing CP gateway protections/features ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14 Mobile Clients VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect) Encryption is available on the following: Windows Mobile Symbian ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15 Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16 R80 Evolution 2,5 years of development R80 Unified Management Project R73 / HFA1 Unified Client Project R71 / R72 R70 ZoneLabs Acquisition 2004 Pointsec Acquisition 2007 2008 2009 ©2010 Check Point Software Technologies Ltd. 2010 | [Unrestricted] For everyone | 17 17 A new era in Endpoint Security! Central Management Simple, Flexible ©2010 Check Point Software Technologies Ltd. Enhanced Monitoring | [Unrestricted] For everyone | 18 18 R80: Unique Core Values Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19 19 R80: Truly Unified Management ►All endpoint blades and policies managed from the same place ►Consistent ►No look and feel nested admin console ►One component to install ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20 R80: Organization-Centric Management ►Assignment Policy Model based on organization ►Policies can be assigned based on connectivity state and/or compliance level ►Leverage current AD architecture to manage & monitor endpoints ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21 R80: Simple, Efficient Policy Definition ►Best practice out of the box policies protect endpoints quickly ►Advanced configuration options always available for added granularity ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22 R80: Flexible Client Deployment ►Ability to create MSI package for deployment ►Device Agent only or featured package ►Full handling of client deployment based on policy ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23 R80: Enhanced Monitoring ►Full view on current endpoint status and events ►Customizable & Exportable ►Adaptable Drill-down reporting based on organization level ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24 R80: Leveraging CP Infrastructure ►Combined Network & Endpoint Log Management provides total security view – useful for compliance ►Sharing of Network Objects and Administration provides stronger, simpler security ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25 R80: Comprehensive and Innovative ►Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security ►Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26 26 Agenda 1 Background: Current Endpoint Portfolio 2 Looking Forward: Endpoint Security R80 3 Conclusion ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27 Conclusion Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone Later this year, R80 will bring us to a new way of managing Endpoint Security After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28 Questions? ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Thank you! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone