Endpoint Security - DUO New Zealand Ltd

advertisement
Endpoint Security
Current portfolio and
looking forward
October 2010
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
Agenda
1
Background: Current Endpoint Portfolio
2
Looking Forward: Endpoint Security R80
3
Conclusion
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
2
2
Agenda
1
Background: Current Endpoint Portfolio
2
Looking Forward: Endpoint Security R80
3
Conclusion
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
3
3
Endpoint Security today

Our current portfolio
R73 (HFA1)
Abra
Mobile clients
(VPN, Encryption)
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
4
4
R73 Evolution
R73 / HFA1
Unified Client Project
R71 / R72
R70
ZoneLabs
Acquisition
2004
Pointsec
Acquisition
2007
2008
2009
©2010 Check Point Software Technologies Ltd.
2010
|
[Unrestricted] For everyone
|
5
5
Endpoint Security R73

Unified Endpoint Protection

Best of breed Components
► Data
Security
► Network Security
► Remote Access components


Provides full security coverage
Flexible & Modular


Deploy what you need now, add what you need in
the future
Multiple component and suite deployment options
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
6
6
R73 – Data Security

Full Disk Encryption protects data at rest


Combines full hard drive encryption and pre-boot
authentication
Media Encryption protects your removable
medias

Combines Media Encryption and Port
Protection
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
7
7
R73 HFA1 – Network Protection


Not just a firewall
Innovative Network Protection Technologies


Program Advisor, WebCheck
Complementary Anti-Malware

Award-winning, high-performance
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
8
8
R73 HFA1 - Remote Access

Choice of two VPN clients:

Endpoint Connect
► Smart
connection, whatever the network or connectivity
challenges
► Transparent “in the office” user experience
► Embedded hot-spot handling
► 32- and 64-bit client support

Legacy SecureClient
► Ensuring
topology and deployment compatibility
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
9
9
Endpoint Security R73 – New features



Support of Windows 7
New Anti Malware engine
ME new features




FDE


Serial ID device filtering
Nero v9+ support for CD/DVD encryption
Local File & Folder Encryption
Support of IRRT enabled laptops (Dell E-Series)
Improved client-side performance
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 10
10
Fast User Experience
100 -
160 -
40 10 -
System Boot Time
145 130 -
McAfee
70 -
Check
Point
Megabytes
175 -
Symantec
130 -
McAfee
Seconds
Lowest CPU and Memory Utilization
Check
Point
Symantec
115 Memory footprint
Endpoint and Data Security
on Windows XP SP3
Source: Check Point Labs
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 11
11
Fast User Experience
1200 -
1200 -
Check
Point
0-
Anti-malware
INITIAL scan time
400 0-
Check
Point
Symantec
400 -
800 McAfee
800 -
Seconds
1600 -
Symantec
1600 -
McAfee
Seconds
Fastest Anti-malware Scan Time
Anti-malware
RECURRING scan time
Anti-malware tests on Windows 7
Source: Check Point Labs
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 12
12
Endpoint Security R73 HFA1 – What's
new


Support of Windows Server 2003 and 2008 32bit
FDE new features



ME new features




Encrypted client-side logs & profiles
Temp folder drive/location definition
Remote Help for non-AD users
WebRH



Supports latest intel chipset
Supports hibernation on 64bits OS
AD integration
Support of SQL Server 2008
SA new features


Server Support for Anti-malware
Check Point R71 management support
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 13
13
Abra R70

Turn any PC into a corporate desktop




Keep mobile data secure



USB-based form factor with HW/SW encryption
Requires no admin, host OS, or reboot
On- and off-line working modes supported
Secure Workspace isolates/protects data from host
Central SW policy controls applications & features
Maintain secure connectivity


Provide flexible, secure access to corporate
resources, info repositories, and applications
Leverage existing CP gateway protections/features
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 14
14
Mobile Clients

VPN client is available on the following
platforms:




Windows Mobile
Symbian
And now iPhone (SecureConnect)
Encryption is available on the following:


Windows Mobile
Symbian
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 15
15
Agenda
1
Background: Current Endpoint Portfolio
2
Looking Forward: Endpoint Security R80
3
Conclusion
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 16
16
R80 Evolution
2,5 years of development
R80
Unified Management Project
R73 / HFA1
Unified Client Project
R71 / R72
R70
ZoneLabs
Acquisition
2004
Pointsec
Acquisition
2007
2008
2009
©2010 Check Point Software Technologies Ltd.
2010
|
[Unrestricted] For everyone
| 17
17
A new era in Endpoint Security!
Central Management
Simple, Flexible
©2010 Check Point Software Technologies Ltd.
Enhanced
Monitoring
|
[Unrestricted] For everyone
| 18
18
R80: Unique Core Values







Truly Unified Management
Organization-centric Management
Simple, efficient policy definition
Flexible client deployment
Enhanced Monitoring
Leveraging CP Infrastructure
Comprehensive & Innovative
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 19
19
R80: Truly Unified Management
►All
endpoint blades and
policies managed from the
same place
►Consistent
►No
look and feel
nested admin console
►One
component to install
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 20
20
R80: Organization-Centric Management
►Assignment
Policy Model based
on organization
►Policies
can be assigned based
on connectivity state and/or
compliance level
►Leverage
current AD architecture
to manage & monitor endpoints
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 21
21
R80: Simple, Efficient Policy Definition
►Best
practice out of the box
policies protect endpoints quickly
►Advanced
configuration options
always available for added
granularity
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 22
22
R80: Flexible Client Deployment
►Ability
to create MSI
package for deployment
►Device Agent
only or
featured package
►Full
handling of client
deployment based on policy
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 23
23
R80: Enhanced Monitoring
►Full
view on current
endpoint status and events
►Customizable
& Exportable
►Adaptable
Drill-down
reporting based on
organization level
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 24
24
R80: Leveraging CP Infrastructure
►Combined
Network & Endpoint
Log Management provides total
security view – useful for
compliance
►Sharing
of Network Objects and
Administration provides stronger,
simpler security
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 25
25
R80: Comprehensive and Innovative
►Comprehensive
features: Media
Encryption, Integrated FW,
Integrated VPN, and Data Security
►Unique
Innovations: Anti-Malware
with Program Control/Program
Advisor, WebCheck secure
browsing
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 26
26
Agenda
1
Background: Current Endpoint Portfolio
2
Looking Forward: Endpoint Security R80
3
Conclusion
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 27
27
Conclusion

Check Point continues to improve its
portfolio with innovative and
performant solutions

R73, Abra, SecureConnect for iPhone

Later this year, R80 will bring us to a new
way of managing Endpoint Security

After being the first one to release a
(really) unified client to the market, no
doubt that we will be the first one to
release a (really) unified management
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 28
28
Questions?
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
Thank you!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
Download