Visibility & Control – Identity, Application & Content Awareness ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Boundaries are disappearing Users Have Different Use Work Use Different Share from Internet Anywhere Data Devices Tools Needs Boundaries are disappearing ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2 New environment, new challenges To secure this new environment, IT needs to do more ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3 More Security…. …with Less: Less Resources Less Time ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4 CHECK POINT TAKES SECURITY TO THE NEXT DIMENSION ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5 Introducing… Policy People Enforcement 3D SECURITY ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6 Security as a Business Process Policy that supports business needs Policy Security that involves people People Easily enforce security policies Enforcement ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7 Check Point Introduces 3D Security Combine Policy, People and Enforcement for Better Security Check Point Policy R75 People Enforcement Define the right policies Support user needs Easily enforce security ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8 Policy Definition Legacy: Now: ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9 Security is about People, not Numbers Security Is about People, not Numbers ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10 IP Based Policy Challenges Access from Anywhere… Users no longer belong to specific networks! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11 IP Based Policy Challenges 54.23.22.10 212.32.11.12 Several devices per person… 10.10.11.12 67.54.23.213 Too many IP addresses and networks to manage! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12 Granular security per user, user-group and machine Security following the user ! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13 Check Point Identity Awareness Accurate Security Intuitive Management Full Integration ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14 People are an integral part of security ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15 Check Point UserCheck Technology Educate and Engage end-users Application Usage Alert You are trying to access YouTube. http://www.youtube.com Educates users on risk and usage policies Corporate application use policy limits YouTube access to business use only in order to save bandwidth. Please select and confirm your use-case: Makes control more practical Personal , Business , or Cancel ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16 Granular Control of all Security layers Mobile Access Granular Visibility DLP Application Control IPS SmartEvent Identity Awareness ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17 17 Industry-Leading IPS Check Point Sets a New Standard in Latest NSS Group IPS Test The Check Point IPS Software Blade outperformed nearly every vendor in overall accuracy and blocking: 97.3% Security Effectiveness Multi-Gigabit rated throughput of 2.4Gbps 100% anti-evasion coverage ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18 Application Detection and Usage Controls Identify, allow, block or limit usage of applications at user or group level ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19 19 Check Point AppWiki World’s largest Application Classification Library Over 4,500 applications Over 100,000 social-network widgets Grouped in over 80 categories (including Web 2.0, IM, P2P, Voice & Video, File Share) appwiki.checkpoint.com ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20 Check Point Data Loss Prevention Check Point Combines Technology and Processes to Make DLP Work John.Stevens@yahoo.com Corporate Strategy Green World Strategy Plan 2010 John, Prevent Move from detection to prevention Data Loss Prevention Alert An email that you have just sent has been quarantined. Let’s review the corporate strategy in our morning meeting. Reason: attached document contains confidential internal data The message is being held until further action. Send , Discard , or Review Issue Educate Users on corporate data policies Enforce Data loss business processes ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21 Mobile Access Software Blade Easy Access to Email and Applications ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22 Simple for end-user Tap “Check Point Mobile” Gain secure access to your data! Enter your password ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23 There’s no Control without Visibility ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24 360º Visibility into All Security Events ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25 Check Point Introduces 3D Security R75 Combines Policy, People and Enforcement for Better Security 4 New Software Blades Centralized Management ©2010 Check Point Software Technologies Ltd. Flexible Deployment | [Unrestricted] For everyone | 26 26 Competitive Landscape Check Point Identity Awareness Application Control DLP Mobile Access Cisco Juniper Check Point Does it Better! Seamless, agentless Check Point Active DoesDirectory it Better! Fortinet Palo Alto integration Largest applications Check Point None coverage in the industry Does it Better! Practical Checkpolicies Point– UserCheck for educating Does it Better! and engaging end-users Simple and easy end-user experience ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27 Check Point R75 New Packaging and Pricing ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28 Introduction… Check Point is updating its Appliances’ packages and pre-defined Security Systems with the new R75 blades! Pre-defined Software Systems Check Point Appliances ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29 29 Application Control Software Blade Granular user awareness across the Security Gateway Available in R75 as a new annual service blade! Available in 2 3 sizes Application Control ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 30 30 Application Control Software Blade Application Control blade - blade sizes: Small Medium Large S M L Low-end appliances & software packages Mid-size appliances & software packages High-end appliances & software packages $1,500 $3,000 ©2010 Check Point Software Technologies Ltd. $4,500 | [Unrestricted] For everyone | 31 31 Identity Awareness Blade Granular user awareness across the Security Gateway Identity Awareness Available in R75 as a new Software Blade! Promotionally free until end of 2011 Free license available in UserCenter No additional support costs! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 32 32 Update R75 Packages… All* Appliances Packages and Pre-defined Systems will now be updated with the new R75 blades… For example: UTM-1 572 UTM-1 574 * For specific products, please refer to the Check Point Pricelist ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 33 33 Update R75 Packages… All* Appliances Packages and Pre-defined Systems will now be updated with the new Application Control & Identity Awareness blades … * For specific products, please refer to the Check Point Pricelist ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 34 34 Updated R75 Packages… Exciting new value at a great price! Old New UTM-1 572: $8,500 AppCl blade: $1,500 + Identity blade: $0 UTM-1 574: $9,000 AppCl blade: included + Identity blade: included $10,000 $9,000 $1,000 Saved! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 35 35 Updated R75 Packages… Exciting new value at a great price! Old New Power-1 5075: $39,000 AppCl blade: $4,500 + Identity blade: $0 Power-1 5077: $41,900 AppCl blade: included + Identity blade: included $43,500 $41,900 $1,600 Saved! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 36 36 Commercial Guidelines Available for sale as of end of Jan 2011 ! We must encourage customers to purchase the new packages! Better security at a very attractive price ! Old products will be available for sales until May 2011 Check Point will follow-up with partners on POs for “old” packages… We’ll encourage upsell to the “new” packages ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 37 37 High End Pre-defined Systems Check Point Introduces 12 Cores Licenses for Open Servers SG1201 For highest level of performance SG1207 Unrivaled security for demanding environment ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 38 38 Summary Combine Policy, People and Enforcement for Better Security Updated Appliances packages and Pre-defined Systems will be available for sale starting end of Jan 2011 Migrate now to the Software blades architecture! Benefit from the new R75 capabilities Starting R75.1, software will require usage of Software blades licenses R65 End of Support by Mar/2011 For more information, please refer to PartnerMap ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 39 39 Sales Tools and PartnerMap Sales Tools are available on the PartnerMap – – – – Customer presentations Competitive briefs At-a-glance guides And more… For additional information please contact: – Partner Alliance (cpp@checkpoint.com) ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 40 40 Thank You! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone