Upload
noah-greer
View
216
Download
0
Tags:
Embed Size (px)
Citation preview
1[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Check Point – View From The Endpoint.
Partner Webcast 5th March, 2009
Ross BakerSales ManagerData Security
2[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
A Global Security LeaderA Global Security Leader
* Frost & Sullivan
• Global leader in firewall/VPN* and mobile data encryption
• More than 100,000 protected businesses• More than 60 million consumers• 100% of Fortune 100 customers
100% security
• 100% focus on information security• >1,000 dedicated security experts • Protecting networks and enterprise data
Global
• ~1,900 employees• 71 offices, 28 countries• 3,000 partners, 88 countries• HQ in Israel and U.S.
Leader
3[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Check Point, not just Network SecurityCheck Point, not just Network Security
4[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Time lineTime line
Dec 2008Sales at 30% growth
April 2008Data Security function evolves in “endpoint”
1999 - 2006Pointsec & Reflex Magnetics
evangelise data security idea
Dec 2007Strong Data Security Sales
Estimate 50%+ growth in 2008
April 2007Check Point & Pointsec
teams integrate
Jan 2007Check Point acquires Pointsec for $620m
5[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
6[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Mobile Device Hierarchy Mobile Device Hierarchy
Enables: Faster processing
(Remote work on large files)
More wireless network connection options(Access to company data)
Increased storage capacity(Sensitive data at risk)
Employee & Client Information and
Intellectual Property(R&D, HR)
Access Information(Passwords)
Data(Push E-Mails)
Contacts,Calendar
Laptops
USBCD
DVD
PDAs
SmartPhones
CellPhones
Content Sensitivity & Threat Potential
Climbing Up Mobile Device Complexity
7[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Mobile Device Hierarchy Mobile Device Hierarchy
Enables: Faster processing
(Remote work on large files)
More wireless network connection options(Access to company data)
Increased storage capacity(Sensitive data at risk)
Employee & Client Information and
Intellectual Property(R&D, HR)
Access Information(Passwords)
Data(Push E-Mails)
Contacts,Calendar
Laptops
USBCD
DVD
PDAs
SmartPhones
CellPhones
Content Sensitivity & Threat Potential
Climbing Up Mobile Device Complexity
8[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
The risks for the mobile executive The risks for the mobile executive
Lost device – laptop, PDA, phone and USB media
Unauthorised access using hotel, airport or
serviced office hotspots
Theft or malicious attack
Stupidity
Remote working practice not subject to corporate scrutiny
78% of companies that had their computers stolen did not encrypt hard discsBERR 2008 Information Security Breaches Survey
[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
10[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Product CombinationsProduct Combinations
Check Point Endpoint Security Suite
Full Disk Encryption
Personal FirewallHost-IPS / 802.1x
NACVPN Client Media EncryptionPort protection
AntivirusAnti-spyware
Endpoint Security Client R70
11[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Endpoint Security PricingEndpoint Security Pricing
12[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Check Point Endpoint SecurityCheck Point Endpoint Security
13[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
TCO is important right now…TCO is important right now…
Check PointCheck Pointcan helpcan help
14[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
We have a security
hole!
Enterprises stock upNiche solutionsDifferent vendors
Enterprise stock more productsEnterprise stock more products
15[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Never enough security
Increased administration time and costs
Multiple test cycles – every time an agent in updated
Endpoint Security ChallengesEndpoint Security Challenges
Too many security agents to manage
Multiple admin consoles – a console for each agent
Software compatibility issues between separate agents
Resulting in…
16[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
The Suppliers - 2006The Suppliers - 2006
17[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
The Suppliers - TodayThe Suppliers - Today
18[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
About the marketAbout the market
- Supply out-weighs demand
- The opportunity is clear
- Is Endpoint already a commodity?
- Public Sector particularly lucrative
- Fine balance between functionality and cost
- Channel role is vital (relationship selling)
- Resellers deciding which vendor to back
- Market is encouraging reseller competition
- More than 50% of Companies in the UK have NO solution
- IT staff at end user sites lack technical expertise in this space
- First to the customer sets the expectation
19[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
What we see in RFP’sWhat we see in RFP’sProtect organisation's information & reputation
Commitments to installation and performance
Provide a highly available, scalable & reliable Infrastructure
Lower the operational cost
Increase effectiveness of doing business
Technological superiority of the solution
Vendor financial stability
20[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Be aware of all cost componentsBe aware of all cost components
*** Some may apply
21[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Back to basicsBack to basics
Anyone lost a laptop lately?
22[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Encrypted textEncrypted text
“.›Ï”óùžF>?cßÕ¹\6žš)+ú·ê8æþÝEÑ‚ßÈž‹ã]nŠ7@ãaë×mJGöÓ5sì!k!,eŽ‡–r?QrÙm¨®$åÝè•¥,#8PHé‘›•êè£&ÁWVð’¡‚x[¶t¼”ÅÍ•HÌpbdåÔ{Âß<h•ØÓ,Kì>HêG®8ššaò°<˜);ò@G¯ç`ü'nü£™Ÿï]«OÅ„ö‚‚7¹ÊçÓªVzm-� �Í©8Øþ[F¿ô•ïõ7ýŠ)ÜjrHèðÐ全î{õ¨‰N²Î;|LH”6ª÷ÐTý‚†¦>Òëç8ü‰·Ü6U&æUmë„dk1A+žpðrɌݣ� � � � � �±÷Pš¹™Ð_²Æ‰·ó†Óò8V×o-!<Šµß=u:t¡sò¶¡§LÍ6¿ ßï¹=¹÷& VK9«f¯N»u9“>±ÕŸ}„‘ÒU�¥ö»Å½"ž8ÚC~å¤kz]ŸšBeŠ8ÒÃDÍfLYð8FÝ®ÙõrOÊo^Ïðxžó–� � �P_î. Övlx"ÏŽÅ·¥nbÓ†²�ÌPy¥.ÿ&±×QÉ\ ¸Ô’k@eÀbÇ”Â]·ßÀ‰Öˆj! ‰ë8y˜öc‰kÜä‚ï¤$ ‹rÞØ~?(IêUiJNÓWÒP‹ÿ:ØïãüV$ÚYä\i%ñZRW¬©þ ̀„…•â.ÑX� � �õ†ƒ;ÄQ§ŽENRåncƒ8n’ž.Ï‹B+¨P`Fb¤r¦:Ô Á",«=Mø#§†PªW ±B›•ÜÒ|üWùÐüÑüc.&ï¶'mE|^´søÔúW™VOµ›]œ†±Â3 ?ÙÂgL±›¤°H’†µ+Z<γ³vmE ‡‰3¯ƒµ·ŸfGô¯¾g*@<Ų^OñÒ%oÕ¾!©æÒ7=Ī¼*d%©ç� ¼¥Ÿ(z2f‹AÿDû–í±1ÌÐc€‰(?ÉûÇN�œkI×3É]±6 u‚ß+z»>t\Op K7céÒ¤qWèë@fŽ^8b¢ëº Tq÷9ìNôQÂG÷×A±<+–S/ztÍ*e´ô"è� �â–è+6dÚ2'H]Йˆ?Ü̲»ÏÜTɆî]3Rtvç§è«üªYÜr5äq¨¢ÝÙ»Êè´Wyýl^€)Ÿ·JϹÂä2îp1³ F׶„À� � � �ÂÂKÀÃ$nÏÅÖLå×DLÉ4”jµ\Âz|àS¹pA €1°™íwhÍs¿‚ ¨a¢mžëFÁU;àïÏéq„Õ"szv¬t$«ï2� � �SÑ·×È¡4 ÝmœÜ=ûÝWžÒßQ+g®fUi–t’¢Ë‹ü" zøÅP+9%ù¤Ùë�d±Ij«øjWdóÌ^z0'NÇZË@Zœ"ß.7Û¨¶ Õ‘HzÕ?(I<9•w;ö\¨ ;ÃÄ£ª•Ð¸çø¸1K ¼¸©1|Üaa_ʼЄ!Úô©FÕñ¿J%ŽxòÓIjx»9’&è⺩ŽfÛjeÓ·#}–bÖ]qõHß3¶c³:2‰µ/Þ÷� � � � �ë,ÒŒj-ÎX¢ª§ã72Š‚ý£ñt„R�™¦ó?ªØÏ,ŠAœ{Ð ̄ GzÇ—O¹ÒOÿ¼â`‡3ï[bï£æ<Oæá°"óÐè6¡I‡ò6…é¥ô~´¿œ’|ã¾(‚;(¦Ê<FZßÖ,v_-ÊçZÆGtúy0âû§Ç󃂕w?tnèÿa+€í5¯@ó w°ÞîXë'`AW’;OgzíöàüT ³|¹OÝ3àìy¨`±éw!ÞÙÎä>ù� � � �_m#Q„2à À‹‰6xPÙ|I}f4ŽØ¸Š2–PJjÚ€¡Ã ¦K—u&¡ ðŽb¾º v¶(eU¼¥@öxªÇ7ELnÏÅ"{¼#Äü—zÌñ ›{ÿK\¥pæ½Í”ï¬8®õOYßíl4Ëèá®y/„”‚ñ6¤$zÙQ¡¦²� g“•`ê©‚Ð9ô3ïÌ5(;ÈÖc™87ºäÁðóÚ+«ú~I¾� � � �`JŸ/1%â>² ¿%ÐaAŒ�c"kHÐ
23[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
MasterBoot
Record
MandatoryAccessControl
ModifiedPartition
Boot Record
OperatingSystem
System Files(PW Swap etc.)
Full Disk EncryptionCheck Point
Data
User Data
Unprotected
Highly Sensitive FilesBoot Records
MBR PBR DataOperatingSystem
System Files(PW Swap etc.)
File Encryption
MBR PBR DataOperatingSystem
System Files(PW Swap etc.)
Check Point End Point Full Disk EncryptionCheck Point End Point Full Disk Encryption
Secured Information
Open Information
The Check Point solution provides the most complete
& comprehensive protection for all data!
24[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
The Insider ThreatThe Insider Threat
Companies are fully aware that employees pose a growing risk to data security. Recent press articles highlight two types of insider threats:
• Malicious attack by employee (Intentional)• Unintentional Security Breach (Unintentional)
25[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Setting the SceneSetting the Scene
One USB flash drive in the wrong hands, and your firewall is useless!
80 % of security breaches are caused by insiders…
evenly important is the risk of introducing malicious code in the corporate network.
USB flash drives’ form factor makes them easy to lose.
26[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Product OperationProduct Operation
Endpoint PC
Check Point Endpoint Media Encryption
Centralized Auditing and ManagementAudit utility provided for initial assessment of port usage and security policy planning
Wired Wireless DevicesUSB Bluetooth Memory cardsFirewire Infrared Digital camerasSerial WiFi Music playersPrinter ModemsIDE Smart phones
PrintersKeyloggers
Controls Activity on ports and devices including:
27[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Device Discovery Device Discovery
Pointsec Device Discovery.exe
Knowing the scale of the problemKnowing the scale of the problem
• Requires no software installation
• Provides a complete snapshot of device activity
• Extensive exportable HTML reports summarise device activity and can be used to provide business case
• Essential Pre sales utility
• www.checkpoint.com/devicediscoverytool
28[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
29[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
30[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
31[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Product AvailabilityProduct Availability
Server and client software can be obtained via download from www.checkpoint.com or through the new Endpoint Security media kit
32[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Target CustomersTarget Customers
Existing Check Point customers
Current users of Pointsec / Reflex
Companies with Encryption projects
Companies embracing mobile working
Companies reducing supplier numbers
VPN upgrades & competitive upgrades
Disgruntled Symantec & McAfee users
Customers asking “for that memory stick blocking stuff”
33[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Which partners will be most successful?Which partners will be most successful?
Those who embrace the whole portfolio
Partners who invest in the solution technically
Partners who understand our licensing
Those who work closely with us
Partners providing true “value add”
Those who make use of our sales tools
6 /10 partners are silver/bronze partners
34[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Online DashboardOnline Dashboard
Instant compliance viewsInstant compliance views
35[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Single policy viewSingle policy view
Simplified security policySimplified security policy
36[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
“PC on a stick” “PC on a stick”
Who should use it?Who should use it? Day extenders, consultants, contractors or employees
who work from business centres –
Anyone that works from unmanaged devices!Anyone that works from unmanaged devices! Disaster recovery solution
What is it?What is it? A completely securesecure, portableportable and dissolvabledissolvable virtual
workspace, includes Check Point endpoint technologies Centrally managed, integrated with Remote Help
Available in Q2 2009
37[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
****
If Laptops are easy to lose presenting
a massive security risk –
What about Smart Phones / PDA’s?
Data Security 2009Data Security 2009
********
38[Public]—For everyone
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Any Questions?Any Questions?
Ross Baker [email protected] Tel – 07796 693466