38
1 [Public]—For everyone 2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th March, 2009 Ross Baker Sales Manager Data Security

1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

Embed Size (px)

Citation preview

Page 1: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

1[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point – View From The Endpoint.

Partner Webcast 5th March, 2009

Ross BakerSales ManagerData Security

Page 2: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

2[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

A Global Security LeaderA Global Security Leader

* Frost & Sullivan

• Global leader in firewall/VPN* and mobile data encryption

• More than 100,000 protected businesses• More than 60 million consumers• 100% of Fortune 100 customers

100% security

• 100% focus on information security• >1,000 dedicated security experts • Protecting networks and enterprise data

Global

• ~1,900 employees• 71 offices, 28 countries• 3,000 partners, 88 countries• HQ in Israel and U.S.

Leader

Page 3: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

3[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point, not just Network SecurityCheck Point, not just Network Security

Page 4: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

4[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Time lineTime line

Dec 2008Sales at 30% growth

April 2008Data Security function evolves in “endpoint”

1999 - 2006Pointsec & Reflex Magnetics

evangelise data security idea

Dec 2007Strong Data Security Sales

Estimate 50%+ growth in 2008

April 2007Check Point & Pointsec

teams integrate

Jan 2007Check Point acquires Pointsec for $620m

Page 5: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

5[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Page 6: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

6[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Mobile Device Hierarchy Mobile Device Hierarchy

Enables: Faster processing

(Remote work on large files)

More wireless network connection options(Access to company data)

Increased storage capacity(Sensitive data at risk)

Employee & Client Information and

Intellectual Property(R&D, HR)

Access Information(Passwords)

Data(Push E-Mails)

Contacts,Calendar

Laptops

USBCD

DVD

PDAs

SmartPhones

CellPhones

Content Sensitivity & Threat Potential

Climbing Up Mobile Device Complexity

Page 7: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

7[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Mobile Device Hierarchy Mobile Device Hierarchy

Enables: Faster processing

(Remote work on large files)

More wireless network connection options(Access to company data)

Increased storage capacity(Sensitive data at risk)

Employee & Client Information and

Intellectual Property(R&D, HR)

Access Information(Passwords)

Data(Push E-Mails)

Contacts,Calendar

Laptops

USBCD

DVD

PDAs

SmartPhones

CellPhones

Content Sensitivity & Threat Potential

Climbing Up Mobile Device Complexity

Page 8: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

8[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

The risks for the mobile executive The risks for the mobile executive

Lost device – laptop, PDA, phone and USB media

Unauthorised access using hotel, airport or

serviced office hotspots

Theft or malicious attack

Stupidity

Remote working practice not subject to corporate scrutiny

78% of companies that had their computers stolen did not encrypt hard discsBERR 2008 Information Security Breaches Survey

Page 9: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Page 10: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

10[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Product CombinationsProduct Combinations

Check Point Endpoint Security Suite

Full Disk Encryption

Personal FirewallHost-IPS / 802.1x

NACVPN Client Media EncryptionPort protection

AntivirusAnti-spyware

Endpoint Security Client R70

Page 11: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

11[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Endpoint Security PricingEndpoint Security Pricing

Page 12: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

12[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point Endpoint SecurityCheck Point Endpoint Security

Page 13: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

13[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

TCO is important right now…TCO is important right now…

Check PointCheck Pointcan helpcan help

Page 14: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

14[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

We have a security

hole!

Enterprises stock upNiche solutionsDifferent vendors

Enterprise stock more productsEnterprise stock more products

Page 15: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

15[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Never enough security

Increased administration time and costs

Multiple test cycles – every time an agent in updated

Endpoint Security ChallengesEndpoint Security Challenges

Too many security agents to manage

Multiple admin consoles – a console for each agent

Software compatibility issues between separate agents

Resulting in…

Page 16: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

16[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

The Suppliers - 2006The Suppliers - 2006

Page 17: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

17[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

The Suppliers - TodayThe Suppliers - Today

Page 18: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

18[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

About the marketAbout the market

- Supply out-weighs demand

- The opportunity is clear

- Is Endpoint already a commodity?

- Public Sector particularly lucrative

- Fine balance between functionality and cost

- Channel role is vital (relationship selling)

- Resellers deciding which vendor to back

- Market is encouraging reseller competition

- More than 50% of Companies in the UK have NO solution

- IT staff at end user sites lack technical expertise in this space

- First to the customer sets the expectation

Page 19: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

19[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

What we see in RFP’sWhat we see in RFP’sProtect organisation's information & reputation

Commitments to installation and performance

Provide a highly available, scalable & reliable Infrastructure

Lower the operational cost

Increase effectiveness of doing business

Technological superiority of the solution

Vendor financial stability

Page 20: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

20[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Be aware of all cost componentsBe aware of all cost components

*** Some may apply

Page 21: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

21[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Back to basicsBack to basics

Anyone lost a laptop lately?

Page 22: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

22[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Encrypted textEncrypted text

“.›Ï”óùžF>?cßÕ¹\6žš)+ú·ê8æþÝEÑ‚ßÈž‹ã]nŠ7@ãaë×mJGöÓ5sì!k!,eŽ‡–r?QrÙm¨®$åÝè•¥,#8PHé‘›•êè£&ÁWVð’¡‚x[¶t¼”ÅÍ•HÌpbdåÔ{Âß<h•ØÓ,Kì>HêG®8ššaò°<˜);ò@G¯ç`ü'nü£™Ÿï]«OÅ„ö‚‚7¹ÊçÓªVzm-� �Í©8Øþ[F¿ô•ïõ7ýŠ)ÜjrHèðÐ全î{õ¨‰N²Î;|LH”6ª÷ÐTý‚†¦>Òëç8ü‰·Ü6U&æUmë„dk1A+žpðrɌݣ� � � � � �±÷Pš¹™Ð_²Æ‰·ó†Óò8V×o-!<Šµß=u:t¡sò¶¡§LÍ6¿ ßï¹=¹÷& VK9«f¯N»u9“>±ÕŸ}„‘ÒU�¥ö»Å½"ž8ÚC~å¤kz]ŸšBeŠ8ÒÃDÍfLYð8FÝ®ÙõrOÊo^Ïðxžó–� � �P_î. Övlx"ÏŽÅ·¥nbÓ†²�ÌPy¥.ÿ&±×QÉ\ ¸Ô’k@eÀbÇ”Â]·ßÀ‰Öˆj! ‰ë8y˜öc‰kÜä‚ï¤$ ‹rÞØ~?(IêUiJNÓWÒP‹ÿ:ØïãüV$ÚYä\i%ñZRW¬©þ ̀„…•â.ÑX� � �õ†ƒ;ÄQ§ŽENRåncƒ8n’ž.Ï‹B+¨P`Fb¤r¦:Ô Á",«=Mø#§†PªW ±B›•ÜÒ|üWùÐüÑüc.&ï¶'mE|^´søÔúW™VOµ›]œ†±Â3 ?ÙÂgL±›¤°H’†µ+Z<γ³vmE ‡‰3¯ƒµ·ŸfGô¯¾g*@<Ų^OñÒ%oÕ¾!©æÒ7=Ī¼*d%©ç� ¼¥Ÿ(z2f‹AÿDû–í±1ÌÐc€‰(?ÉûÇN�œkI×3É]±6 u‚ß+z»>t\Op K7céÒ¤qWèë@fŽ^8b¢ëº Tq÷9ìNôQÂG÷×A±<+–S/ztÍ*e´ô"è� �â–è+6dÚ2'H]Йˆ?Ü̲»ÏÜTɆî]3Rtvç§è«üªYÜr5äq¨¢ÝÙ»Êè´Wyýl^€)Ÿ·JϹÂä2îp1³ F׶„À� � � �ÂÂKÀÃ$nÏÅÖLå×DLÉ4”jµ\Âz|àS¹pA €1°™íwhÍs¿‚ ¨a¢mžëFÁU;àïÏéq„Õ"szv¬t$«ï2� � �SÑ·×È¡4 ÝmœÜ=ûÝWžÒßQ+g®fUi–t’¢Ë‹ü" zøÅP+9%ù¤Ùë�d±Ij«øjWdóÌ^z0'NÇZË@Zœ"ß.7Û¨¶ Õ‘HzÕ?(I<9•w;ö\¨ ;ÃÄ£ª•Ð¸çø¸1K ¼¸©1|Üaa_ʼЄ!Úô©FÕñ¿J%ŽxòÓIjx»9’&è⺩ŽfÛjeÓ·#}–bÖ]qõHß3¶c³:2‰µ/Þ÷� � � � �ë,ÒŒj-ÎX¢ª§ã72Š‚ý£ñt„R�™¦ó?ªØÏ,ŠAœ{Ð ̄ GzÇ—O¹ÒOÿ¼â`‡3ï[bï£æ<Oæá°"óÐè6¡I‡ò6…é¥ô~´¿œ’|ã¾(‚;(¦Ê<FZßÖ,v_-ÊçZÆGtúy0âû§Ç󃂕w?tnèÿa+€í5¯@ó w°ÞîXë'`AW’;OgzíöàüT ³|¹OÝ3àìy¨`±éw!ÞÙÎä>ù� � � �_m#Q„2à À‹‰6xPÙ|I}f4ŽØ¸Š2–PJjÚ€¡Ã ¦K—u&¡ ðŽb¾º v¶(eU¼¥@öxªÇ7ELnÏÅ"{¼#Äü—zÌñ ›{ÿK\¥pæ½Í”ï¬8®õOYßíl4Ëèá®y/„”‚ñ6¤$zÙQ¡¦²� g“•`ê©‚Ð9ô3ïÌ5(;ÈÖc™87ºäÁðóÚ+«ú~I¾� � � �`JŸ/1%â>² ¿%ÐaAŒ�c"kHÐ

Page 23: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

23[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

MasterBoot

Record

MandatoryAccessControl

ModifiedPartition

Boot Record

OperatingSystem

System Files(PW Swap etc.)

Full Disk EncryptionCheck Point

Data

User Data

Unprotected

Highly Sensitive FilesBoot Records

MBR PBR DataOperatingSystem

System Files(PW Swap etc.)

File Encryption

MBR PBR DataOperatingSystem

System Files(PW Swap etc.)

Check Point End Point Full Disk EncryptionCheck Point End Point Full Disk Encryption

Secured Information

Open Information

The Check Point solution provides the most complete

& comprehensive protection for all data!

Page 24: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

24[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

The Insider ThreatThe Insider Threat

Companies are fully aware that employees pose a growing risk to data security. Recent press articles highlight two types of insider threats:

• Malicious attack by employee (Intentional)• Unintentional Security Breach (Unintentional)

Page 25: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

25[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Setting the SceneSetting the Scene

One USB flash drive in the wrong hands, and your firewall is useless!

80 % of security breaches are caused by insiders…

evenly important is the risk of introducing malicious code in the corporate network.

USB flash drives’ form factor makes them easy to lose.

Page 26: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

26[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Product OperationProduct Operation

Endpoint PC

Check Point Endpoint Media Encryption

Centralized Auditing and ManagementAudit utility provided for initial assessment of port usage and security policy planning

Wired Wireless DevicesUSB Bluetooth Memory cardsFirewire Infrared Digital camerasSerial WiFi Music playersPrinter ModemsIDE Smart phones

PrintersKeyloggers

Controls Activity on ports and devices including:

Page 27: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

27[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Device Discovery Device Discovery

Pointsec Device Discovery.exe

Knowing the scale of the problemKnowing the scale of the problem

• Requires no software installation

• Provides a complete snapshot of device activity

• Extensive exportable HTML reports summarise device activity and can be used to provide business case

• Essential Pre sales utility

• www.checkpoint.com/devicediscoverytool

Page 28: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

28[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Page 29: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

29[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Page 30: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

30[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Page 31: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

31[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Product AvailabilityProduct Availability

Server and client software can be obtained via download from www.checkpoint.com or through the new Endpoint Security media kit

Page 32: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

32[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Target CustomersTarget Customers

Existing Check Point customers

Current users of Pointsec / Reflex

Companies with Encryption projects

Companies embracing mobile working

Companies reducing supplier numbers

VPN upgrades & competitive upgrades

Disgruntled Symantec & McAfee users

Customers asking “for that memory stick blocking stuff”

Page 33: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

33[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Which partners will be most successful?Which partners will be most successful?

Those who embrace the whole portfolio

Partners who invest in the solution technically

Partners who understand our licensing

Those who work closely with us

Partners providing true “value add”

Those who make use of our sales tools

6 /10 partners are silver/bronze partners

Page 34: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

34[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Online DashboardOnline Dashboard

Instant compliance viewsInstant compliance views

Page 35: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

35[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Single policy viewSingle policy view

Simplified security policySimplified security policy

Page 36: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

36[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

“PC on a stick” “PC on a stick”

Who should use it?Who should use it? Day extenders, consultants, contractors or employees

who work from business centres –

Anyone that works from unmanaged devices!Anyone that works from unmanaged devices! Disaster recovery solution

What is it?What is it? A completely securesecure, portableportable and dissolvabledissolvable virtual

workspace, includes Check Point endpoint technologies Centrally managed, integrated with Remote Help

Available in Q2 2009

Page 37: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

37[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

****

If Laptops are easy to lose presenting

a massive security risk –

What about Smart Phones / PDA’s?

Data Security 2009Data Security 2009

********

Page 38: 1 [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point – View From The Endpoint. Partner Webcast 5th

38[Public]—For everyone

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Any Questions?Any Questions?

Ross Baker [email protected] Tel – 07796 693466