17
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Simplifies Cloud Security

Security for the Virtual Environment

Embed Size (px)

Citation preview

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Check Point Simplifies Cloud Security

22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Agenda

1 Customer Drivers and Challenges

4 Packaging and Software Blades

2 Solution Overview

3 Virtualization Use Scenarios

5 Summary

33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Server Virtualization Market Trends

► By 2012 half of the enterprise workload will be virtualized

► 60% of IT Managers claim securing virtual machines is difficult

Organizations with virtualized environments are asking for a simple solution to secure the

Virtual Machines.

44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

The Drivers For Change

Reduce operational costs Reusing and leveraging

investment in technology Maximizing resources Reduce Datacenter footprint

Increased flexibility Speed of deployment

Higher utilization of resources Greener computing Reduced power consumption

Maximizing Investment

55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtualization Security Challenges

Inspect traffic between Virtual Machines (VMs)Inspect traffic between Virtual Machines (VMs)

Secure new Virtual Machines automatically

Secure new Virtual Machines automatically

Protection from external threats

Protection from external threats

Security Challenges

in Virtual Environments

66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Hypervisor

VM VMVM

Virtualization Security Challenges

Security Challenges

in Virtual Environments

77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtualization Security Challenges

Security Challenges in Virtual Environments (Data Center/Cloud)

Maintain zero-downtime during Virtual Machines live migration Maintain zero-downtime during Virtual Machines live migration

Ensure Security in dynamic environments

Ensure Security in dynamic environments

88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Introducing Check PointSecurity Gateway Virtual Edition (VE)

Unified Management for Physical and Virtual

Unified Management for Physical and Virtual

Best Virtual Security Gateway with the Software Blade Architecture

Best Virtual Security Gateway with the Software Blade Architecture

Securing the Virtual Machines Securing the Virtual Machines

Check Point Delivers Plug and Play Security for Public and Private Clouds

Starting at $2,000

Software Blades

Check Point Security Gateway

Virtual Edition

99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Secure the Virtual Infrastructure

Inter-VM Traffic Inspection Protects Virtual Machines Inter-VM Traffic Inspection Protects Virtual Machines

►Seamless security within the Hypervisor

►Integration with VMsafe technology

►Audit configuration changes in the virtualization system

►Seamless security within the Hypervisor

►Integration with VMsafe technology

►Audit configuration changes in the virtualization system

VMVM VE

Hypervisor ConnectorHypervisor

1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtual Edition Features

Hypervisor

► Include Firewall, IPS, VPN and all other Software Blades.

► Flexible and extensible security

Best Security

Antivirus

IPS

VPN

Firewall

VM VM VE

Hypervisor Connector

Software Blades

Check Point Security Gateway Virtual Edition (VE)

1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtual Edition Features

Inspecting Inter-VM Traffic

VMs ProtectionVMs Protection

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

► Include Firewall, IPS, VPN and all other Software Blades.

► Flexible and extensible security

Best Security

Hypervisor

VM VM VE

Hypervisor Connector

VM VM

1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtual Edition Features

Securing Dynamic Environments

VMs ProtectionVMs Protection

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

► Include Firewall, IPS, VPN and all other Software Blades.

► Flexible and extensible security

Best Security

Hypervisor

VM VM VE

Hypervisor Connector

1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtual Edition Features

► Same management for Physical and Virtual

► Running the management blades on a Virtual Machine

► Same management for Physical and Virtual

► Running the management blades on a Virtual Machine

Unified Management

Unified Management

► Include Firewall, IPS, VPN and all other Software Blades.

► Flexible and extensible security

Best Security VMs ProtectionVMs Protection

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtual Edition Features

► Same management for Physical and Virtual

► Running the management blades on a Virtual Machine

► Same management for Physical and Virtual

► Running the management blades on a Virtual Machine

Unified Management

Unified Management

► Include Firewall, IPS, VPN and all other Software Blades.

► Flexible and extensible security

Best Security VMs ProtectionVMs Protection

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

► Plug and Play with no topology changes

► Securing new VMs automatically

► Zero-downtime during VMs live migration

Hypervisor

VM

Hypervisor Connector

VM

Virtualizing the Management Systems

1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Virtualized Security Scenarios

Office in a Box

Use Security Gateway Virtual Edition (VE) with firewall, IPS, VPN and Software Blade to secure your office networks and assets

VE

Hypervisor

Enterprise Security Gateways

Consolidate your Security Gateways deployment into a virtualized environment

VE

Hypervisor

VE VE

Secure the Virtual Environment

Use Security Gateway Virtual Edition to apply granular firewall and IPS policies for inter-VM traffic

Hypervisor

Hypervisor Connector

VE

1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Software Blades for Virtual Systems

+Additional Software

Blades can be added A-La-Carte

Optional

SGVExxxx

New containers for Security Gateway VE

Firewall with integrated Hypervisor protection

Based on number of physical cores

Firew

all

From $2000

1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Summary

Unified Management for Physical and Virtual

Unified Management for Physical and Virtual

Best Virtual Security Gateway with the Software Blade Architecture

Best Virtual Security Gateway with the Software Blade Architecture

Securing the Virtual Machines Securing the Virtual Machines

Check Point Delivers Plug and Play Security for Public and Private Clouds

Starting at $2,000

Software Blades

Check Point Security Gateway

Virtual Edition