36
1 ©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd. Daniel Safar|Country manager, CZR region INTRODUCING GEN V PROTECTIONS AGAINST ATTACK

INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

1©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

Daniel Safar|Country manager, CZR region

INTRODUCING GEN V PROTECTIONS AGAINST ATTACK

Page 2: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

2©2018 Check Point Software Technologies Ltd.

WE LIVEIN AN AMAZINGWORLD

Page 3: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

3©2018 Check Point Software Technologies Ltd.

WE LIVE LONGER

Source: ourworldindata.org

age

LIFE EXPECTANCY

Page 4: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

4©2018 Check Point Software Technologies Ltd.

WE HAVE BETTER LIVING STANDARDS

Source: ourworldindata.org

EXTREME POVERTY% of population living in poverty

[Protected] Distribution or modification is subject to approval

Page 5: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

5©2018 Check Point Software Technologies Ltd.

WE GET BETTER EDUCATION

Source: ourworldindata.org

% of literate population

LITERACY

Page 6: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

6©2018 Check Point Software Technologies Ltd.

THE ERA OF DIGITAL TRANSFORMATION

CONNECTING TO THE CLOUD AND MOBILE

Page 7: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

7©2018 Check Point Software Technologies Ltd.

#1 Taxi company owns no cars

#1 Accommodation company owns no real estate

#1 media provider creates no content

#1 fastest growing TV network lays

no cables

#1 Valuable retailer has no inventory

DISRUPTIVE BUSINESS MODELS

Page 8: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

8©2018 Check Point Software Technologies Ltd.

THE CHANGE IS HAPPENING NOW

2016 MOBILE OVERTAKEN DESKTOP

WHATSAPP OVERTAKEN VOICE

SOCIAL MEDIA OVERTAKES TV AS

MAIN SOURCE OF NEWS

Page 9: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

9©2018 Check Point Software Technologies Ltd.

THE INFRASTRUCTURE IS CHANGING NOW

CLOUDMOBILE

SERVERIOT

VIRTUALIZATION

Page 10: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

10©2018 Check Point Software Technologies Ltd.

FOR THE BAD ACTORS ASWELL AS THE GOOD GUYS

CHANGES CREATE NEW OPPORTUNITIES

Page 11: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

11©2018 Check Point Software Technologies Ltd.

Security is the biggest barrier to IoT adoption

Security Concerns Continue Amid Cloud Adoption

Cybersecurity Is Biggest Risk of Autonomous Cars

ITPRO

InformationWeek

Bloomberg

“”

Page 12: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

12©2018 Check Point Software Technologies Ltd.

WAS 2017 A CYBER-SECURITY WAKE-UP CALL ?

WannaCryThousands of enterprises in over 99 countries

NotPetyaCompletely shutting down an entire country and impacting over 60 more

Page 13: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

13©2018 Check Point Software Technologies Ltd.

The Global Risks Report 2018

Page 14: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

14©2018 Check Point Software Technologies Ltd. 14©2018 Check Point Software Technologies Ltd.

Generations of Attacks and Protections

Gen ILate 1980s –PC attacks - standalone

Virus

Gen IIMid 1990s –Attacks from the internet

Networks

Gen IIIEarly 2000s -Exploiting vulnerabilities in applications

Applications

The Anti Virus

The Firewall

Intrusion Prevention (IPS)

Gen IV2010 -Polymorphic Content

Payload

SandBoxingand Anti-Bot

Page 15: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

15©2018 Check Point Software Technologies Ltd.

Where are we ?

1990 2000 2010 2015 2017

THREATS

PROTECTIONSNetworks

Gen II

Applications

Gen III

Payload

Gen IV

GRADE I

GRADE II

GRADE III

GRADE V

GRADE IV

Virus

Gen I

Enterprises are between

Gen 2-3

2.8

Mega

Gen V

Page 16: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

16©2018 Check Point Software Technologies Ltd. 16©2018 Check Point Software Technologies Ltd.

2018 – GEN V OF ATTACKS

Large scale (across country and industry)

State-sponsored technologies

Multi-vector (network, cloud, mobile)

Page 17: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

17©2018 Check Point Software Technologies Ltd. 17©2018 Check Point Software Technologies Ltd.

GEN IV PROTECTION IS NO LONGER ENOUGH!

Gen IV

PAYLOAD

SandBoxingand Anti-Bot

2010 -Polymorphic Content

WE NEED PREVENTION (NOT-JUST DETECTION)

COVERING OUR WEAKEST POINTS – CLOUD, MOBILE

REAL-TIME ACTION

Page 18: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

18©2018 Check Point Software Technologies Ltd.

President How can I create

value for customers?

CIODo we have

up-to-the-second information everywhere we need it?

LEADERS MAKE MAJOR BUSINESS DECISIONS DAILYEVERY MAJOR DECISION EVOKES SECURITY RISKS

CEOHow can technology

transform my business?

CFODo I comply with

regulations?

CMOWill online marketing make a

difference?

Page 19: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

19©2018 Check Point Software Technologies Ltd.

HOW DO YOUINNOVATE, INSPIRE AND COMPETE WHILE REMAINING SECURE?

Page 20: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

20©2018 Check Point Software Technologies Ltd.

PATCHWORK OF POINT

SOLUTIONS.

COMPLEX SOLUTIONS

WITH UNCERTAIN

SECURITY COVERAGE.

Most security technologies today stay

• Looking for yesterday’s signatures

• Detection instead of prevention

ONE STEPBEHIND

Page 21: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

21©2018 Check Point Software Technologies Ltd.

THE TRADITIONAL APPROACH

Virus > < Anti-Virus

Malicious Websites > < URL Filtering

Intrusion > < Intrusion Prevention

Botnet > < Anti-Bot

High Risk Applications > < Application Control

Page 22: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

22©2018 Check Point Software Technologies Ltd.

NOW IMAGINE THE FUTUREOF CYBER SECURITY

[Protected] Distribution or modification is subject to approval

Page 23: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

23©2018 Check Point Software Technologies Ltd.

A future in which security is

managed with fewer people,

with less capital investment

and a smaller footprint on

the network. And yet, with

BETTER SECURITY

IMAGINE

Page 24: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

24©2018 Check Point Software Technologies Ltd.

CHECK POINT

PROVIDES YOUTHATFUTURE

Page 25: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

25©2018 Check Point Software Technologies Ltd.

Introducing GEN 5 PROTECTIONAgainst MEGA ATTACKS

Page 26: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

26©2018 Check Point Software Technologies Ltd. 26©2018 Check Point Software Technologies Ltd.

WHAT INGREDIENTS DO WE NEED ?

Page 27: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

27©2018 Check Point Software Technologies Ltd.

SAAS SECURITY

ADAPTIVE CLOUD

SECURITY

MOBILE APP SCANNING

SDN MICRO-SEGEMENTATION

CLOUD SECURITY

AUTO-SCALE

ORCHESTRATION

ACCOUNT TAKEOVER

PREVENTION

HYPERVISOR LEVEL SECURITY

PUBLIC-CLOUD AUTOPROVISION

MOBILE CODE ANALYSIS

MOBILE AI AND MACHINE LEARNING

DISK ENCRYPTION

MEDIA ENCRYPTION

MOBILE SMS PHISHING

MOBILE MAN IN THE MIDDLE

ATTACKBLUETOOTH

ATTACK DETECTION

SS7 ATTACK PREVENTION

ADVANCED JAILBREAK

PROTECTION

MEMORY ANALYSIS

THREAT EXTRACTION

HUMAN INTERACTION SIMULATION

INTRUSION PREVENTION

DOMAIN PREDICTION

MACHINE LEARNING

ANTI-RANSOMWARE

CPU LEVEL SANDBOX

ENDPOINT FORENSICS

CAMPAIGN HUNTING

IMAGE FILE SANITIZER

ENDPOINT EXPLOITATION

DETECTION

FLASH EMULATION

INTRUSION PREVENTION

DOMAIN PREDICTION

DECOYS & TRAPS

ANTI-RANSOMWARE

CPU LEVEL SANDBOX

CPU EXPLOIT DETECTOR

MACRO ANALYSIS

OS-LEVEL SANDBOX

DROPPED FILES EMULATION

TRANSPARENT HTTPS

INSPECTION

STATIC ANALYZER

LOW LATENCY FIREWALL

INTEGRATED PACKET

CAPTURE

SCALABLE IDENTITY ACCESS

VIRTUAL SYSTEMS (VSX)

MULTICORE VPN

SECURE-XL

SSL INSPECTION

NATIONWIDE PROTECTION

VERTICAL SCALING

ZONE-BASED SECURITY

CONTENT AWARENESS

NETWORK ENCRYPTION

ICS/SCADA PROTECTION

APPLICATION CONTROL

USER-CHECK

URL FILTERING

HTTP 2.0

DLPICS/SCADA

PROTECTION

LARGE SCALE MANAGEMENT

REST APIS

SECURITY ADVISOR

SECURITY MANAGEMENT

PORTAL

EVENT CORRELATION

Page 28: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

28©2018 Check Point Software Technologies Ltd.

SS7 ATTACK PREVENTION

LARGE SCALE MANAGEMENT

MOBILE MAN IN THE MIDDLE

ATTACK

MEMORY ANALYSIS

PUBLIC-CLOUD AUTOPROVISION

THREAT EXTRACTION

NETWORK ENCRYPTION

REST APIs ORCHESTRATION

CPU LEVEL SANDBOX

ADAPTIVE CLOUD

SECURITY CLOUD

SECURITY AUTO-SCALE

Page 29: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

29©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd.

MAKING GEN V POSSIBLE

SS7 ATTACK PREVENTION

LARGE SCALE MANAGEMENT

MOBILE MAN IN THE

MIDDLE ATTACK

MEMORY ANALYSIS

PUBLIC-CLOUD AUTOPROVISION

THREAT EXTRACTION

NETWORK ENCRYPTION

REST APIs ORCHESTRATION

CPU LEVEL SANDBOX

ADAPTIVE CLOUD

SECURITY CLOUD

SECURITY AUTO-SCALE

Page 30: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

30©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

HOW DO WE MOVE TO GEN V OF SECURITY?

Page 31: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

31©2018 Check Point Software Technologies Ltd.

You Need a Small Army of Security Technologies

MachineLearning

CPU-LevelSandboxing

Page 32: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

32©2018 Check Point Software Technologies Ltd.

LOOKS IMPOSSIBLE?

MIRACLES TAKE A LITTLE LONGER.(Charles Alexandre de Calonne, 1794)

THE IMPOSSIBLE WE

DO IMMEDIATELY

Page 33: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

33©2018 Check Point Software Technologies Ltd. 33©2018 Check Point Software Technologies Ltd.

THIS WORKS !YOU CAN MAKE IT POSSIBLE

MachineLearning

CPU-LevelSandboxing

ThreatExtraction

Virtual Firewall

Endpoint Detection

& Response

Human Behavioral Analytics

DataEncryption

Data LeakPrevention

Anti-Bot FlashDetonation

URLFiltering

FirewallICS/ SCADA Protection

MachineLearning

ProxyNetwork

EncryptionAnti-

RansomwareZero

PhishingMobile Threat

PreventionCPU-Level

Sandboxing

HTTPS Inspection

Intrusion Prevention

Anti-Virus DDOSHypervisor

Level SecurityApplication

Control

T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E

Page 34: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

34©2018 Check Point Software Technologies Ltd.

THE F IRST CONSOLIDATED SECURITY ACROSS NETWORKS ,

CLOUD , AND MOBILE , PROVIDING THE HIGHEST LEVEL

OF THREAT PREVENTION .

T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E

Page 35: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

35©2018 Check Point Software Technologies Ltd.

ACROSS ALL NETWORKS, CLOUDS AND MOBILE

ONE SECURITY PLATFORM

Leveraging unified threat intelligence & open interfaces

PREEMPTIVETHREAT PREVENTION

Blocking the most sophisticated attacks before they happen

Single Management, Modular Policy

Management & integrated threat visibility

CONSOLIDATED SYSTEM

T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E

Page 36: INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > < Anti-Bot High Risk Applications > < Application Control ©2018 Check Point

36©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

THANK YOU