INTRODUCING GEN V PROTECTIONS AGAINST ATTACK · The Global Risks Report 2018 ... Botnet > <...

Preview:

Citation preview

1©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

Daniel Safar|Country manager, CZR region

INTRODUCING GEN V PROTECTIONS AGAINST ATTACK

2©2018 Check Point Software Technologies Ltd.

WE LIVEIN AN AMAZINGWORLD

3©2018 Check Point Software Technologies Ltd.

WE LIVE LONGER

Source: ourworldindata.org

age

LIFE EXPECTANCY

4©2018 Check Point Software Technologies Ltd.

WE HAVE BETTER LIVING STANDARDS

Source: ourworldindata.org

EXTREME POVERTY% of population living in poverty

[Protected] Distribution or modification is subject to approval

5©2018 Check Point Software Technologies Ltd.

WE GET BETTER EDUCATION

Source: ourworldindata.org

% of literate population

LITERACY

6©2018 Check Point Software Technologies Ltd.

THE ERA OF DIGITAL TRANSFORMATION

CONNECTING TO THE CLOUD AND MOBILE

7©2018 Check Point Software Technologies Ltd.

#1 Taxi company owns no cars

#1 Accommodation company owns no real estate

#1 media provider creates no content

#1 fastest growing TV network lays

no cables

#1 Valuable retailer has no inventory

DISRUPTIVE BUSINESS MODELS

8©2018 Check Point Software Technologies Ltd.

THE CHANGE IS HAPPENING NOW

2016 MOBILE OVERTAKEN DESKTOP

WHATSAPP OVERTAKEN VOICE

SOCIAL MEDIA OVERTAKES TV AS

MAIN SOURCE OF NEWS

9©2018 Check Point Software Technologies Ltd.

THE INFRASTRUCTURE IS CHANGING NOW

CLOUDMOBILE

SERVERIOT

VIRTUALIZATION

10©2018 Check Point Software Technologies Ltd.

FOR THE BAD ACTORS ASWELL AS THE GOOD GUYS

CHANGES CREATE NEW OPPORTUNITIES

11©2018 Check Point Software Technologies Ltd.

Security is the biggest barrier to IoT adoption

Security Concerns Continue Amid Cloud Adoption

Cybersecurity Is Biggest Risk of Autonomous Cars

ITPRO

InformationWeek

Bloomberg

“”

12©2018 Check Point Software Technologies Ltd.

WAS 2017 A CYBER-SECURITY WAKE-UP CALL ?

WannaCryThousands of enterprises in over 99 countries

NotPetyaCompletely shutting down an entire country and impacting over 60 more

13©2018 Check Point Software Technologies Ltd.

The Global Risks Report 2018

14©2018 Check Point Software Technologies Ltd. 14©2018 Check Point Software Technologies Ltd.

Generations of Attacks and Protections

Gen ILate 1980s –PC attacks - standalone

Virus

Gen IIMid 1990s –Attacks from the internet

Networks

Gen IIIEarly 2000s -Exploiting vulnerabilities in applications

Applications

The Anti Virus

The Firewall

Intrusion Prevention (IPS)

Gen IV2010 -Polymorphic Content

Payload

SandBoxingand Anti-Bot

15©2018 Check Point Software Technologies Ltd.

Where are we ?

1990 2000 2010 2015 2017

THREATS

PROTECTIONSNetworks

Gen II

Applications

Gen III

Payload

Gen IV

GRADE I

GRADE II

GRADE III

GRADE V

GRADE IV

Virus

Gen I

Enterprises are between

Gen 2-3

2.8

Mega

Gen V

16©2018 Check Point Software Technologies Ltd. 16©2018 Check Point Software Technologies Ltd.

2018 – GEN V OF ATTACKS

Large scale (across country and industry)

State-sponsored technologies

Multi-vector (network, cloud, mobile)

17©2018 Check Point Software Technologies Ltd. 17©2018 Check Point Software Technologies Ltd.

GEN IV PROTECTION IS NO LONGER ENOUGH!

Gen IV

PAYLOAD

SandBoxingand Anti-Bot

2010 -Polymorphic Content

WE NEED PREVENTION (NOT-JUST DETECTION)

COVERING OUR WEAKEST POINTS – CLOUD, MOBILE

REAL-TIME ACTION

18©2018 Check Point Software Technologies Ltd.

President How can I create

value for customers?

CIODo we have

up-to-the-second information everywhere we need it?

LEADERS MAKE MAJOR BUSINESS DECISIONS DAILYEVERY MAJOR DECISION EVOKES SECURITY RISKS

CEOHow can technology

transform my business?

CFODo I comply with

regulations?

CMOWill online marketing make a

difference?

19©2018 Check Point Software Technologies Ltd.

HOW DO YOUINNOVATE, INSPIRE AND COMPETE WHILE REMAINING SECURE?

20©2018 Check Point Software Technologies Ltd.

PATCHWORK OF POINT

SOLUTIONS.

COMPLEX SOLUTIONS

WITH UNCERTAIN

SECURITY COVERAGE.

Most security technologies today stay

• Looking for yesterday’s signatures

• Detection instead of prevention

ONE STEPBEHIND

21©2018 Check Point Software Technologies Ltd.

THE TRADITIONAL APPROACH

Virus > < Anti-Virus

Malicious Websites > < URL Filtering

Intrusion > < Intrusion Prevention

Botnet > < Anti-Bot

High Risk Applications > < Application Control

22©2018 Check Point Software Technologies Ltd.

NOW IMAGINE THE FUTUREOF CYBER SECURITY

[Protected] Distribution or modification is subject to approval

23©2018 Check Point Software Technologies Ltd.

A future in which security is

managed with fewer people,

with less capital investment

and a smaller footprint on

the network. And yet, with

BETTER SECURITY

IMAGINE

24©2018 Check Point Software Technologies Ltd.

CHECK POINT

PROVIDES YOUTHATFUTURE

25©2018 Check Point Software Technologies Ltd.

Introducing GEN 5 PROTECTIONAgainst MEGA ATTACKS

26©2018 Check Point Software Technologies Ltd. 26©2018 Check Point Software Technologies Ltd.

WHAT INGREDIENTS DO WE NEED ?

27©2018 Check Point Software Technologies Ltd.

SAAS SECURITY

ADAPTIVE CLOUD

SECURITY

MOBILE APP SCANNING

SDN MICRO-SEGEMENTATION

CLOUD SECURITY

AUTO-SCALE

ORCHESTRATION

ACCOUNT TAKEOVER

PREVENTION

HYPERVISOR LEVEL SECURITY

PUBLIC-CLOUD AUTOPROVISION

MOBILE CODE ANALYSIS

MOBILE AI AND MACHINE LEARNING

DISK ENCRYPTION

MEDIA ENCRYPTION

MOBILE SMS PHISHING

MOBILE MAN IN THE MIDDLE

ATTACKBLUETOOTH

ATTACK DETECTION

SS7 ATTACK PREVENTION

ADVANCED JAILBREAK

PROTECTION

MEMORY ANALYSIS

THREAT EXTRACTION

HUMAN INTERACTION SIMULATION

INTRUSION PREVENTION

DOMAIN PREDICTION

MACHINE LEARNING

ANTI-RANSOMWARE

CPU LEVEL SANDBOX

ENDPOINT FORENSICS

CAMPAIGN HUNTING

IMAGE FILE SANITIZER

ENDPOINT EXPLOITATION

DETECTION

FLASH EMULATION

INTRUSION PREVENTION

DOMAIN PREDICTION

DECOYS & TRAPS

ANTI-RANSOMWARE

CPU LEVEL SANDBOX

CPU EXPLOIT DETECTOR

MACRO ANALYSIS

OS-LEVEL SANDBOX

DROPPED FILES EMULATION

TRANSPARENT HTTPS

INSPECTION

STATIC ANALYZER

LOW LATENCY FIREWALL

INTEGRATED PACKET

CAPTURE

SCALABLE IDENTITY ACCESS

VIRTUAL SYSTEMS (VSX)

MULTICORE VPN

SECURE-XL

SSL INSPECTION

NATIONWIDE PROTECTION

VERTICAL SCALING

ZONE-BASED SECURITY

CONTENT AWARENESS

NETWORK ENCRYPTION

ICS/SCADA PROTECTION

APPLICATION CONTROL

USER-CHECK

URL FILTERING

HTTP 2.0

DLPICS/SCADA

PROTECTION

LARGE SCALE MANAGEMENT

REST APIS

SECURITY ADVISOR

SECURITY MANAGEMENT

PORTAL

EVENT CORRELATION

28©2018 Check Point Software Technologies Ltd.

SS7 ATTACK PREVENTION

LARGE SCALE MANAGEMENT

MOBILE MAN IN THE MIDDLE

ATTACK

MEMORY ANALYSIS

PUBLIC-CLOUD AUTOPROVISION

THREAT EXTRACTION

NETWORK ENCRYPTION

REST APIs ORCHESTRATION

CPU LEVEL SANDBOX

ADAPTIVE CLOUD

SECURITY CLOUD

SECURITY AUTO-SCALE

29©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd.

MAKING GEN V POSSIBLE

SS7 ATTACK PREVENTION

LARGE SCALE MANAGEMENT

MOBILE MAN IN THE

MIDDLE ATTACK

MEMORY ANALYSIS

PUBLIC-CLOUD AUTOPROVISION

THREAT EXTRACTION

NETWORK ENCRYPTION

REST APIs ORCHESTRATION

CPU LEVEL SANDBOX

ADAPTIVE CLOUD

SECURITY CLOUD

SECURITY AUTO-SCALE

30©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

HOW DO WE MOVE TO GEN V OF SECURITY?

31©2018 Check Point Software Technologies Ltd.

You Need a Small Army of Security Technologies

MachineLearning

CPU-LevelSandboxing

32©2018 Check Point Software Technologies Ltd.

LOOKS IMPOSSIBLE?

MIRACLES TAKE A LITTLE LONGER.(Charles Alexandre de Calonne, 1794)

THE IMPOSSIBLE WE

DO IMMEDIATELY

33©2018 Check Point Software Technologies Ltd. 33©2018 Check Point Software Technologies Ltd.

THIS WORKS !YOU CAN MAKE IT POSSIBLE

MachineLearning

CPU-LevelSandboxing

ThreatExtraction

Virtual Firewall

Endpoint Detection

& Response

Human Behavioral Analytics

DataEncryption

Data LeakPrevention

Anti-Bot FlashDetonation

URLFiltering

FirewallICS/ SCADA Protection

MachineLearning

ProxyNetwork

EncryptionAnti-

RansomwareZero

PhishingMobile Threat

PreventionCPU-Level

Sandboxing

HTTPS Inspection

Intrusion Prevention

Anti-Virus DDOSHypervisor

Level SecurityApplication

Control

T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E

34©2018 Check Point Software Technologies Ltd.

THE F IRST CONSOLIDATED SECURITY ACROSS NETWORKS ,

CLOUD , AND MOBILE , PROVIDING THE HIGHEST LEVEL

OF THREAT PREVENTION .

T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E

35©2018 Check Point Software Technologies Ltd.

ACROSS ALL NETWORKS, CLOUDS AND MOBILE

ONE SECURITY PLATFORM

Leveraging unified threat intelligence & open interfaces

PREEMPTIVETHREAT PREVENTION

Blocking the most sophisticated attacks before they happen

Single Management, Modular Policy

Management & integrated threat visibility

CONSOLIDATED SYSTEM

T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E

36©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.

THANK YOU

Recommended