Upload
helen-henry
View
216
Download
2
Tags:
Embed Size (px)
Citation preview
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Mike Barkett, CISSP
Head of Solutions Center Americas
June, 2012
22©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Agenda
1 Check Point / Market Overview
IT Security in Emerging Countries2
Impact and Q&A3
33©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point At A Glance
Founded 1993, HQ in Tel Aviv
Consistent, Visionary Leadership
100% Security
Innovation, IP, Thought Leadership
2012 Revenue: $1.25 Billion
17% CAGR 2006-2011
Who do organizations trust to secure their business?
44©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
$575
$731 $809
$924
$1,097
$1,250
2006 2007 2008 2009 2010 2011
Outstanding Financial Performance
Market Cap $11.4BRevenue Growth 17%
CAGR ‘06-11
55©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Innovative Technologies
StatefulInspection I
patent5,606,668
TrueVectorEngine I
patent5,987,611
TrueVectorEngine II
patent6,850,943
CooperativeEnforcement
patent6,873,988
SecureXL
patent6,496,935
StatefulInspection II
patent5,835,726
Significant R&D investment
More than 1,500 security experts
ApplicationIntelligence
Accelerated Data Path
(ADP)
CoreXL PacketXL
66©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Network SecurityVendor of the Year
2011
Award Winning Security Products
Computing SecurityAwards EncryptionProduct of the Year
2011
Best IPS/IDS ProductReader Trust
Award
2012
Leader, Magic Quadrant Enterprise
Network Firewall
2004–2011
Leader, Magic Quadrant MobileData Protection
2001–2011
Best Buy,Endpoint Security
2011
NGFW Earns “Recommend”
Rating from NSS
2011
IPS Earns“Recommend”
Rating from NSS
2011
Leader, Magic Quadrant - UTM
2010–2011
IT Product of the Year – DLP
Computerworld Czech Republic
2010
100% of Fortune 100 Use Check Point Products
77©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Hospital record update
Online bank balance check
Social network update
Supermarket checkout
PDA email check
Credit card payment
ATM withdrawal
Remote data backup
ERP supplier catalog update
Opening of a new branch
Setup a mobile office
at a client
Check today’s
sales orders
Update this year’s
bonuses
Log into a WiFi hotspot
Securing Business Everywhere
7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
88©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point and World Bank
Business relations back to 2002
Presence in Brazil and Singapore
Strong relationship with IMF
Strong team members in DC area– [email protected]
99©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Two Sources of Vulnerability
Human Technology
1010©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Threat Landscape
1111©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
User Access
Internet Applications Usage
Sensitive Data
Mobile Access
Network Threat Prevention
Check Point’s Solution: 3D Security
Gran
ular V
isibility
Identity Awareness
DLP
Mobile Access
SmartEvent
IPS
Anti-Bot
Antivirus
Application Control
URLF
1212©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Agenda
1 Check Point / Market Overview
IT Security in Emerging Countries2
Impact and Q&A3
1313©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Successes
Many throughout the world; some public case studies:
QTSC: Vietnam Government
Quala: Colombia Manufacturing
Liverpool: Mexico Retail
1414©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Security 101
CO
NFI
DE
NTI
ALI
TY AVA
ILAB
ILITY
INTEGRITY
1515©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Emerging IT Security: The Bad
1616©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Emerging IT Security: The Bad
Source: snapvoip.blogspot.com
1717©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Emerging IT Security: The Good
Essential for participation in global digital economy
IT Governance
National assets >= Corporate assets
Foster growth of information economy jobs
1818©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability– CoCom
1919©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability
2020©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability
2121©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability– Importability
2222©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability– Importability
2323©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability– Importability
Malware, Piracy– Not just software
2424©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
2525©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
2626©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Barriers & Path to Success
Prerequisites– Trade restrictions– Education
Encryption– Exportability– Importability
Malware, Piracy– Not just software
Bootstrap – Authentic security as a solution to counterfeit security problems
2727©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Agenda
1 Check Point / Market Overview
IT Security in Emerging Countries2
Impact and Q&A3
2828©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Global HR Impact
>2,000 employees
0 RIF’s in 2 decades
Staff in 40 countries
Dallas Tel Aviv Tokyo
Ottawa Stockholm
2929©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Questions?
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Thank You