30
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center Americas June, 2012

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

Embed Size (px)

Citation preview

Page 1: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Mike Barkett, CISSP

Head of Solutions Center Americas

June, 2012

Page 2: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

22©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1 Check Point / Market Overview

IT Security in Emerging Countries2

Impact and Q&A3

Page 3: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

33©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point At A Glance

Founded 1993, HQ in Tel Aviv

Consistent, Visionary Leadership

100% Security

Innovation, IP, Thought Leadership

2012 Revenue: $1.25 Billion

17% CAGR 2006-2011

Who do organizations trust to secure their business?

Page 4: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

44©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

$575

$731 $809

$924

$1,097

$1,250

2006 2007 2008 2009 2010 2011

Outstanding Financial Performance

Market Cap $11.4BRevenue Growth 17%

CAGR ‘06-11

Page 5: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

55©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Innovative Technologies

StatefulInspection I

patent5,606,668

TrueVectorEngine I

patent5,987,611

TrueVectorEngine II

patent6,850,943

CooperativeEnforcement

patent6,873,988

SecureXL

patent6,496,935

StatefulInspection II

patent5,835,726

Significant R&D investment

More than 1,500 security experts

ApplicationIntelligence

Accelerated Data Path

(ADP)

CoreXL PacketXL

Page 6: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

66©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Network SecurityVendor of the Year

2011

Award Winning Security Products

Computing SecurityAwards EncryptionProduct of the Year

2011

Best IPS/IDS ProductReader Trust

Award

2012

Leader, Magic Quadrant Enterprise

Network Firewall

2004–2011

Leader, Magic Quadrant MobileData Protection

2001–2011

Best Buy,Endpoint Security

2011

NGFW Earns “Recommend”

Rating from NSS

2011

IPS Earns“Recommend”

Rating from NSS

2011

Leader, Magic Quadrant - UTM

2010–2011

IT Product of the Year – DLP

Computerworld Czech Republic

2010

100% of Fortune 100 Use Check Point Products

Page 7: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

77©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Hospital record update

Online bank balance check

Social network update

Supermarket checkout

PDA email check

Credit card payment

ATM withdrawal

Remote data backup

ERP supplier catalog update

Opening of a new branch

Setup a mobile office

at a client

Check today’s

sales orders

Update this year’s

bonuses

Log into a WiFi hotspot

Securing Business Everywhere

7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Page 8: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

88©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point and World Bank

Business relations back to 2002

Presence in Brazil and Singapore

Strong relationship with IMF

Strong team members in DC area– [email protected]

Page 9: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

99©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Two Sources of Vulnerability

Human Technology

Page 10: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1010©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Threat Landscape

Page 11: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1111©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

User Access

Internet Applications Usage

Sensitive Data

Mobile Access

Network Threat Prevention

Check Point’s Solution: 3D Security

Gran

ular V

isibility

Identity Awareness

DLP

Mobile Access

SmartEvent

IPS

Anti-Bot

Antivirus

Application Control

URLF

Page 12: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1212©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1 Check Point / Market Overview

IT Security in Emerging Countries2

Impact and Q&A3

Page 13: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1313©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Successes

Many throughout the world; some public case studies:

QTSC: Vietnam Government

Quala: Colombia Manufacturing

Liverpool: Mexico Retail

Page 14: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1414©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Security 101

CO

NFI

DE

NTI

ALI

TY AVA

ILAB

ILITY

INTEGRITY

Page 15: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1515©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Emerging IT Security: The Bad

Page 16: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1616©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Emerging IT Security: The Bad

Source: snapvoip.blogspot.com

Page 17: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1717©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Emerging IT Security: The Good

Essential for participation in global digital economy

IT Governance

National assets >= Corporate assets

Foster growth of information economy jobs

Page 18: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1818©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– CoCom

Page 19: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

1919©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability

Page 20: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2020©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability

Page 21: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2121©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

Page 22: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2222©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

Page 23: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2323©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

Malware, Piracy– Not just software

Page 24: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2424©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Page 25: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2525©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Page 26: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2626©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

Malware, Piracy– Not just software

Bootstrap – Authentic security as a solution to counterfeit security problems

Page 27: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2727©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1 Check Point / Market Overview

IT Security in Emerging Countries2

Impact and Q&A3

Page 28: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2828©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global HR Impact

>2,000 employees

0 RIF’s in 2 decades

Staff in 40 countries

Dallas Tel Aviv Tokyo

Ottawa Stockholm

Page 29: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

2929©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Questions?

Page 30: ©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Mike Barkett, CISSP Head of Solutions Center

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Thank You