Building Your Security Strategy with 3D Security March 2012 ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Security Focus and Leadership ► $1.25 Billion (Revenue) 2011 revenue, 17% CAGR 2006-2011 Software Blades strategy fueling growth ► 100% (Security) Pure focus on security All of Fortune 500 are Check Point customers ► #1 (Threat Coverage) Best coverage for Microsoft and Adobe vulnerabilities Largest Web 2.0 application control library Who should you trust to secure your business? ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 2 2 Securing Business Everywhere Online bank balance check Hospital record update Social network update Supermarket checkout PDA email check Credit card payment ATM withdrawal ERP supplier catalog update Remote data backup Opening of a new branch Setup a mobile office at a client Check today’s sales orders Update this year’s bonuses Log into a WiFi hotspot ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 3 3 The 3 Steps of Modern Attacks Social engineering Identify target Gather information Launch attack Malware injection Attack arrives User clicks Exploit executes ©2012 Check Point Software Technologies Ltd. Remote control Malware installed Computer controlled Waits for instruction | [Confidential] For Check Point users and approved third parties | 4 4 Two Sources of Vulnerability Human ©2012 Check Point Software Technologies Ltd. Technology | [Confidential] For Check Point users and approved third parties | 5 5 People do not read policies ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 6 6 We use millions and millions of lines of code Complexity leads to vulnerability ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 7 7 Everything needs to be patched again and again ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 8 8 INTRODUCING… Policies People Enforcement More than technology… …A security process ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 9 9 Business Terminology for Policy? Using different IP addresses Using different devices Using different locations Using different applications 200,000 SECURITY LOGS ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 10 10 Business Relevant Policy Clear and Meaningful Policy ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 11 11 Today’s Typical User ‘Involvement’ NO EXPLANATION NO RESOLUTION ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 12 12 Users Taking Part in Security EXPLANATION RESOLUTION ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 13 13 Policies People Enforcement 3D SECURITY: GAIN CONTROL ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 14 14 Software Blades Coordinated Layers of Security MOBILITY DATA MALWARE ACCESS CONTROL VPN FIREWALL AUTHORIZATION DISK ENCRYPTION ANTIBOT DEVICE SECURITY DLP WEB/APP CONTROL VPN REMOVABLE MEDIA IPS ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 15 15 Consolidate Security—Better Security ALL LAYERS OF SECURITY ACT TOGETHER Software Blade Architecture from Check Point ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 16 16 Granular Control of All Security Layers IPS Anti-Bot Antivirus Granular Visibility Mobile Access DLP Application Control URLF SmartEvent Identity Awareness ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 17 17 Consolidated Visibility: SmartEvent Unified event analysis with 360° visibility across Software Blades High-level view with drill down to policy ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 18 18 More Security, Additional Power Firewall and VPN Software Blades IPS Software Blade Application Control Software Blade Identity Awareness Software Blade Antivirus & Anti-Malware Software Blade URL Filtering Software Blade DLP Software Blade Anti-Bot Software Blade The Security You Want The Performance You Need ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 19 19 Check Point Security Appliance Line 61000 System and 21400 Appliance SECURITY FOR ENTIRE RANGE 12000 Appliances 4000 Appliances Ultra High-End 2200 Appliance Datacenter Grade Small Office / Desktop Enterprise Grade ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 20 20 Check Point Security Solutions All Deployments All Platforms IAS and Open server 2012 Appliances All Protections ©2012 Check Point Software Technologies Ltd. Software Blades | [Confidential] For Check Point users and approved third parties | 21 21 Summary 3D Security: Blueprint for a 2012 Security Strategy Multi-Layer Threat Prevention with Software Blades More Security, More Powerful Platforms Check Point: Your Trusted Security Partner ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties | 22 22 Thank You ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties