Check Point Introduces 3D Security

advertisement
Visibility & Control –
Identity, Application
& Content Awareness
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
Boundaries are disappearing
Users Have Different
Use
Work
Use
Different
Share
from
Internet
Anywhere
Data
Devices
Tools
Needs
Boundaries
are disappearing
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
2
2
New environment, new challenges
To secure this new environment,
IT needs to do more
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
3
3
More Security….
…with Less:
Less Resources
Less Time
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
4
4
CHECK POINT
TAKES SECURITY TO THE
NEXT DIMENSION
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
5
5
Introducing…
Policy
People
Enforcement
3D SECURITY
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
6
6
Security as a Business Process
Policy that supports business needs
Policy
Security that involves people
People
Easily enforce security policies
Enforcement
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
7
7
Check Point Introduces 3D Security
Combine Policy, People and Enforcement
for Better Security
Check Point
Policy
R75
People
Enforcement
Define the
right policies
Support user
needs
Easily enforce
security
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
8
8
Policy Definition
Legacy:
Now:
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
|
9
9
Security is about People, not Numbers
Security Is about People, not Numbers
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 10
10
IP Based Policy Challenges
Access from Anywhere…
Users no longer belong to specific networks!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 11
11
IP Based Policy Challenges
54.23.22.10
212.32.11.12
Several devices per person…
10.10.11.12
67.54.23.213
Too many IP addresses and networks to manage!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 12
12
Granular security
per user, user-group and machine
Security following the user !
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 13
13
Check Point Identity Awareness
Accurate
Security
Intuitive
Management
Full
Integration
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 14
14
People
are an integral part of security
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 15
15
Check Point UserCheck Technology
Educate and Engage end-users
Application Usage Alert
You are trying to access YouTube.
http://www.youtube.com
Educates users
on risk and
usage policies
Corporate application use policy limits YouTube
access to business use only in order to save
bandwidth.
Please select and confirm your use-case:
Makes control
more practical
Personal , Business , or Cancel
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 16
16
Granular Control of all Security layers
Mobile
Access
Granular Visibility
DLP
Application
Control
IPS
SmartEvent
Identity
Awareness
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 17
17
Industry-Leading IPS
Check Point Sets a New
Standard in Latest
NSS Group IPS Test
The Check Point IPS
Software Blade
outperformed nearly every
vendor in overall accuracy
and blocking:



97.3% Security
Effectiveness
Multi-Gigabit rated
throughput of 2.4Gbps
100% anti-evasion
coverage
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 18
18
Application Detection and
Usage Controls
Identify, allow, block or limit usage
of applications at user or group level
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 19
19
Check Point AppWiki
World’s largest
Application Classification Library
Over 4,500 applications
Over 100,000 social-network
widgets
Grouped in over 80 categories
(including Web 2.0, IM, P2P,
Voice & Video, File Share)
appwiki.checkpoint.com
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 20
20
Check Point
Data Loss Prevention
Check Point Combines Technology and
Processes to Make DLP Work
John.Stevens@yahoo.com
Corporate Strategy
Green World Strategy Plan 2010
John,
Prevent
Move from detection
to prevention
Data Loss Prevention Alert
An email that you have just sent has been
quarantined.
Let’s review the corporate strategy in
our morning
meeting.
Reason: attached document contains
confidential internal data
The message is being held until further
action.
Send , Discard , or Review Issue
Educate
Users on corporate
data policies
Enforce
Data loss
business processes
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 21
21
Mobile Access Software Blade
Easy Access to Email and Applications
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 22
22
Simple for end-user
Tap “Check
Point Mobile”
Gain secure
access to
your data!
Enter your
password
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 23
23
There’s no Control without Visibility
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 24
24
360º Visibility into All Security Events
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 25
25
Check Point Introduces 3D Security
R75 Combines Policy, People and
Enforcement for Better Security
4 New Software
Blades
Centralized
Management
©2010 Check Point Software Technologies Ltd.
Flexible
Deployment
|
[Unrestricted] For everyone
| 26
26
Competitive Landscape
Check Point
Identity
Awareness
Application
Control
DLP
Mobile Access
Cisco
Juniper
Check Point
Does it Better!
Seamless,
agentless
Check Point
Active
DoesDirectory
it Better!
Fortinet
Palo Alto
integration
Largest applications
Check
Point
None
coverage
in the industry
Does
it Better!
Practical
Checkpolicies
Point–
UserCheck
for educating
Does it Better!
and engaging end-users
Simple and easy
end-user experience
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 27
27
Check Point
R75
New Packaging and Pricing
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 28
28
Introduction…
Check Point is updating its Appliances’ packages and
pre-defined Security Systems with the new R75 blades!
Pre-defined Software Systems
Check Point Appliances
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 29
29
Application Control Software Blade
Granular user
awareness across the
Security Gateway

Available in R75 as a new
annual service blade!

Available in 2 3 sizes
Application Control
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 30
30
Application Control Software Blade

Application Control blade - blade sizes:
Small
Medium
Large
S
M
L
Low-end appliances
& software packages
Mid-size appliances
& software packages
High-end appliances
& software packages
$1,500
$3,000
©2010 Check Point Software Technologies Ltd.
$4,500
|
[Unrestricted] For everyone
| 31
31
Identity Awareness Blade
Granular user
awareness across the
Security Gateway
Identity Awareness

Available in R75 as a new
Software Blade!

Promotionally free until end of
2011


Free license available in
UserCenter
No additional support costs!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 32
32
Update R75 Packages…

All* Appliances Packages and Pre-defined Systems will now be
updated with the new R75 blades…
For example:
UTM-1 572
UTM-1
574
* For specific products, please refer to the Check Point Pricelist
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 33
33
Update R75 Packages…
All* Appliances Packages and Pre-defined
Systems will now be updated with the new
Application Control & Identity Awareness blades
…
* For specific products, please refer to the Check Point Pricelist
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 34
34
Updated R75 Packages…
Exciting new value at a great price!
Old
New
UTM-1 572:
$8,500
AppCl blade: $1,500
+
Identity blade: $0
UTM-1 574:
$9,000
AppCl blade: included
+
Identity blade: included
$10,000
$9,000
$1,000
Saved!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 35
35
Updated R75 Packages…
Exciting new value at a great price!
Old
New
Power-1 5075: $39,000
AppCl blade:
$4,500
+
Identity blade: $0
Power-1 5077: $41,900
AppCl blade:
included
+
Identity blade:
included
$43,500
$41,900
$1,600
Saved!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 36
36
Commercial Guidelines
Available for sale as of end of Jan 2011 !
We must encourage customers to purchase the
new packages!


Better security at a very attractive price !
Old products will be available for sales until May
2011
Check Point will follow-up with partners on POs
for “old” packages…

We’ll encourage upsell to the “new” packages
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 37
37
High End Pre-defined Systems
Check Point Introduces
12 Cores Licenses for Open Servers
SG1201
For highest level of performance
SG1207
Unrivaled security for demanding environment
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 38
38
Summary
Combine Policy, People and Enforcement
for Better Security


Updated Appliances packages and Pre-defined
Systems will be available for sale starting end of
Jan 2011
Migrate now to the Software blades
architecture!




Benefit from the new R75 capabilities
Starting R75.1, software will require usage of Software
blades licenses
R65 End of Support by Mar/2011
For more information, please refer to PartnerMap
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 39
39
Sales Tools and PartnerMap
 Sales Tools are available on the PartnerMap
–
–
–
–
Customer presentations
Competitive briefs
At-a-glance guides
And more…
 For additional information please contact:
– Partner Alliance (cpp@checkpoint.com)
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
| 40
40
Thank You!
©2010 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
Download