33
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael Amselem Head of Sales Europe Data Security and protection

©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

Embed Size (px)

Citation preview

Page 1: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Check Point Endpoint Security, 3D malware protection and data security

Michael Amselem

Head of Sales Europe Data Security and protection

Page 2: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

22©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Market Trends

2 R80 – Manage Your users

3 Success stories

Page 3: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

33©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Market Trends

Anti Malware$955M

(30%)

Threat Manage-ment (Firewall, HIPS)

$271M(9%)

Data Security$797M

(25%)

Security Suites$1,107M

(36%)

IDC World Wide Enterprise Endpoint Security forecast

Total Market Estimation in 2010/11: $2.8B -$3.1B

CAGR: +20.2% CAGR:

-8.5%

CAGR: +12.6%

CAGR: +10.7%

Page 4: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

44©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Top 10 Trends of 2011

Cloud Computing

Virtualization

Threat Landscape

IT Consumerization

Consolidation & Complexity

Data Security and Loss

Web 2.0 & Social Media

Governance, Risk & Compliance (GRC)

Cost Reduction

Green IT

6

5

43

21

78

910

Page 5: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

55©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

2011 Security Trends

Threat Landscape4

Page 6: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

66©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Today’s Threat Landscape

IncreasingSophistication

Multi-vector

Polymorphic

Blended and multi-variant

StuxnetAurora

BotnetsXSS

Zeus

TrojansWorms

Crime and Profit-driven

Cyber Crimeware Financial theft Intellectual

property Criminal networks

Cyber-warfare and Hactivists

Cyber-warfare Iran and Stuxnet Wikileaks Cyber ‘Hactivists’

Page 7: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

77©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

2011 Security Trends

Consolidation and Complexity

5

Page 8: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

88©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

InformationWeek2010 Survey of security decision makers

Biggest IT Security ChallengesWhich of the following are the biggest information/network security challenges facing your company?

Managing the complexity of security 51%

Enforcing security policies 35%

Preventing data breaches from outside attackers 29%

Preventing data theft by employees or other insiders 23%

The requirementto manage security complexitygrows steadily each year.

On Complexity and Point-product Sprawl

Page 9: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

99©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

IPS Firewall

VPN

Antivirus/ Anti-spam

NAC

DLP

URL Filtering

IPS

Network

FW

VPN

AV / Anti-spam

NAC

DLP

URL Filtering

Client

VPNHost FW

Encry

ption

ProgramControl

Por

t P

rote

ctio

n

On Complexity and Point-product Sprawl

Top network security technologies and point products deployed

Your world:

And don’t forget endpoint—nearly doubling the number of point products…

Page 10: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1010©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

2011 Security Trends

Governance, Risk and Compliance

8

Page 11: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1111©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Regulatory OverloadS

OX

PC

I DS

S

GL

BA

E.U

. D

ata

Pri

vacy

Dir

ecti

ve

BA

SE

L II

HIP

AA

-HIT

EC

H

SE

C

STA

TE

LA

WS

Prevalent IT GRC Standards

Page 12: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1212©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

“Compliance has the greatest influence on information security costs”

InformationWeek2010 Survey of security decision makers

Most Influential Factors On Security ProgramWhich of the following factors have the greatest influence on your information security program?

Industry and/or government compliance mandates 60%

Our security group’s assessment of threats and risks the company faces

42%

Information security best practices 37%

Threats and risks associated with business models or processes

26%

On Governance, Risk and Compliance

Page 13: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1313©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

On key CSO priorities for 2011

The 2011 Global State of Information Security Survey

Increasing the focus on data protection 71%

Prioritizing security investments based on risk 69%

Strengthening the company’s governance, risk and compliance programs 67%

Refocusing on core of existing strategy 66%

Accelerating the adoption of security-related automation technologies to increase efficiencies and cut costs 66%

Pursuing more complete configuration of DLP tools 65%

Page 14: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1414©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Market Trends

2 R80 – Manage your users

3 Success stories

Page 15: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1515©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

3DSECURITY

Page 16: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1616©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Consolidated into a single view

Security that involves people

Policy that focuses on business needs

Security as a business process

Page 17: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1717©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unique Visibility and Control

Monitor… Manage… Enforce…

…everything that’s important to you

…policy and exceptions on the fly

…compliance before the network is accessed

Page 18: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1818©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Best User Experience

InterfaceSingle

AgentSingle

UpdateSingle

ScanSingle

LogonSingle

CheckPoint

M

cAfe

e

Sy

man

tec

Anti-malware Scan Time

1600 -

1200 -

800 -

400 -

0 -

Sec

on

ds

CheckPoint

McA

fee

Sym

ante

c

System Boot Time

130 -

100 -

70 -

40 -

10 -

Sec

on

ds

CheckPoint

McA

fee

Symantec

Memory Footprint

175 -

160 -

145 -

130 -

115 -

MB

ytes

Fastest Scan Time Fastest Boot Time Smallest Footprint

Page 19: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

1919©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Software Blades

LaptopsDesktops

Quickly deploy the right level of protection for the right machines

Page 20: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2020©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

HR machines have many users

Manage Security of Users, Not Just Machines

Security policy follows the user

Rose has many machines

Page 21: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2121©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Drill down on groups, users and all their machines in a few clicks

Manage Security of Users, Not Just Machines

Quickly determine

Rose’s status

Search or click AD to investigate group or

user status

Find Rose’s machines

quicklyView Rose’s

policies

Page 22: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2222©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Market Trends

2 R80 – Manage your users

3 Success stories

Page 23: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2323©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Security Management R80…

…wins opportunities in 5 continents

Page 24: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2424©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Supermarket Chain – South Europe

ApproachApproach

► Introduction to desktop team► Unified client, Unified

management and blades► SE Started a PoC

ResultsResults

► Installed 100 seats Total Security in a week

► McAfee footprint was higher► Bought 600 total security,

removing McAfee AV

BackgroundBackground

► Network security customer, but have different groups for network and desktop admins

► Ask for a full security suite with a single management

► McAfee AV incumbent

Page 25: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2525©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Military Equipment Manufacturer – UK

ResultsResults

► Successful PoC with pre-GA► Customer impressed with blade

deployment and its flexibility► Started deployment with GA► 1500 FDE and 500 TS seats

BackgroundBackground

► Customer runs Secure Client. Bought endpoint security for 2,000 endpoints

► Deployment was held due to complexity and prioritizations

► Following a successful rollout at the partner’s site, performed a PoC at the customer’s site

Page 26: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2626©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

New York Department of State

Approach & ResultsApproach & Results

► Already upgraded to GA► Customer’s trust has re-gained!

QuoteQuote

BackgroundBackground

► Bought 1,000 Total security seats in the past

► Never completed deployment, due to complexity internally

“We're able to unify our security policies across the entire organization; from groups to users and devices. We can manage our encryption, AV and other solutions in one place.“

Rob Stevens, Supervisor of User Services

Page 27: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2727©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Gas explorer and producer - Australia

ApproachApproach

► Complete solution of data security with DLP, Liquid Machines and Abra

ResultsResults► Deployed 150 seats for PoC,

for pilot groups tests.► Got top performance results► Acquired and deployed 10,000

seats► Next steps: 5,000 Abra, Liquid

Machines and DLP-1

BackgroundBackground

► Not a Check Point customer.► Issued an RFP for data security

due to some security incidents► Centralized management a

must► All competitors answered ► Symantec provides AV

Page 28: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2828©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Gartner’s feedback on R80

Page 29: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

2929©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Questions?

Page 30: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

3030©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Thank You!

Page 31: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

3131©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

RF Technology company - Middle East

ApproachApproach

► Broke Microsoft’s solution with discussions about incomplete security and administration

► Engaged the EA team to install the management and 3 seats

ResultsResults

► The customer installed independently 80 seats

► Found Symantec’s solution as not complete

► Bought 100 seats► Upgraded to GA already

BackgroundBackground

► Network security customer ► Looked for Media Encryption

and Full Disk Encryption ► Competition with Symantec and

Microsoft► Centralized management: must

Page 32: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

3232©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Financial Consultant Firm – South Africa

ApproachApproach

► Endpoint Security and DLP

ResultsResults

► Installed 102 seats in 4 days► Like the blade approach ► McAfee failed in PoC► Bought 400 TS seats & DLP-1,

and replacing McAfee AV

BackgroundBackground

► Network security customer► Customer mentioned a need to

protect their data► McAfee customer

Page 33: ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Check Point Endpoint Security, 3D malware protection and data security Michael

3333©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

6 Month Period Detection Comparison