20
©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

Embed Size (px)

Citation preview

Page 1: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals

Visions for 2010

Anna Russell & Andy Clark

Page 2: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

22©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Agenda

1 The Security Maze

2

3

4 DLP

2010 Security From Check Point

New Product – ABRA

5 Questions

Page 3: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

33©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Security Past

In the past there were few security challenges…

… and few solutions

The Internet grew… and so did security.

… and it became pretty complex.

Page 4: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

44©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

15 different point products

The Security Maze

Page 5: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

55©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

The Security Maze

Try to find your way…

Page 6: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

66©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

The Security Maze

…or take the Check Point route.

Page 7: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

77©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

The Security Maze

…or take the Check Point route.

Page 8: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

88©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Solving the mazeA holistic approach where endpoint and network are integrated and DLP, IPS impact all domains of security

Solving the mazeA holistic approach where endpoint and network are integrated and DLP, IPS impact all domains of security

Software BladesThe architecture that will change securitySoftware BladesThe architecture that will change security

Total security solutionsComprehensive gateways,including appliances

Total security solutionsComprehensive gateways,including appliances

Defined 3 domains:Endpoint and data, network and gateway, management

Defined 3 domains:Endpoint and data, network and gateway, management

20072007

20082008

20092009

20102010

Check Point Stays Ahead…

Page 9: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

99©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

ABRA

1Introducing Abra

2 New Workforce Challenges

3 The Abra Solution

Page 10: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1010©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

► Instantly turn any PC into your own corporate desktop

► Virtual workspace that keeps mobile data secure

► Ideal for mobile workers, contractors and disaster recovery

► Instantly turn any PC into your own corporate desktop

► Virtual workspace that keeps mobile data secure

► Ideal for mobile workers, contractors and disaster recovery

Put your office in your pocket

Page 11: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1111©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Why Abra?

Who Needs Abra?

Who Needs Abra?

Why?Why?Unauthorized applicationsUnauthorized applications

Every user Mobile. Remote. Home.

Every user Mobile. Remote. Home.

ContractorsUnmanaged PCs

ContractorsUnmanaged PCs

Disaster recoverySustain productivity

Disaster recoverySustain productivity

Unsecured connectionsUnsecured connections

Data lossData loss

Compliance for unmanaged PCsCompliance for unmanaged PCs

Page 12: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1212©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

3rd-Party Workforce Challenges

Partners, Contractors and Shared Environments

Partners, Contractors and Shared Environments

Examples

► Control partner access to restricted corporate data

► Provide shared workspaces in call centers

► Prevent loss of sensitive data left behind on contractor’s PC

“Over 44% of all cases in this year’s data-breach study involved third-party mistakes.”

—Ponemon Institute 2009

Page 13: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1313©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Remote Workforce Challenges

Home Office Workers Home Office Workers

Examples

► Isolate corporate data on PCs used by family and friends

► Prevent loss of confidential data through peer-to-peer networks

► Work securely from home without your corporate PC

“42% of US employers allowed staff to work remotely this year—up from 30%.”

—World at Work 2009 (Survey of 2,288 U.S. employers)

Page 14: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1414©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Disaster-Recovery Challenges

The Case of H1N1 FluThe Case of H1N1 Flu

Examples

► Keep workers productive during pandemic outbreaks

► Maintain business continuity during severe weather

► Quickly and easily equip workforce to work remotely

“The H1N1 pandemic could cause absenteeism rates of 40 percent or higher for enterprises.”

—Gartner 2009

Page 15: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1515©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Plug-and-Play Solution to Fit Any PC

Work Off-LineWork Off-Line

Access working files and data from the virtual workspace

Access working files and data from the virtual workspace

Work On-LineWork On-Line

Seamless and secure connectivity to the corporate network

Seamless and secure connectivity to the corporate network

Page 16: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1616©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Standard Windows Environment

Access encrypted

files on USB drive

Access approved websites

Toggle between secure

workspace and host

PCLaunch

approved applicatio

ns

Page 17: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1717©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Low TCO Solution for Mobile Users

Leverage Existing InfrastructureLeverage Existing Infrastructure

Security Infrastruct

ure

Security Infrastruct

ure

Security gateways

Central management

IT AssetsIT Assets

Laptop and desktop PCs

OS and application

licenses

Page 18: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1818©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Three Solutions in One

Check Point Abra

Securevirtualization

Secured connection solutions

Portable, plug-and-play solutions

Page 19: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

1919©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Cost-effective and Available Soon

PricingPricing

Availability

Availability

March 2010March 2010

4GB $140.00

4GB $140.00

8GB $210.00

8GB $210.00

Page 20: ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals Visions for 2010 Anna Russell & Andy Clark

2020©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Check Point AbraPut your office in your pocket

Check Point AbraPut your office in your pocket

Turn Any PC into Your Own

Keep Mobile Data Secure

Ideal for Mobile Workers