14
[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. pure security Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe [email protected]

Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

  • Upload
    trinhtu

  • View
    230

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved. puresecurity™

Check Point NAC and Endpoint Security

Martin Koldovský

SE Manager Eastern Europe

[email protected]

Page 2: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

2[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

NAC is Here to

Enforce identity-based access policies– Control who is accessing what – Prevent guests from unauthorized access– Allow demonstrable compliance with growing

body of regulatory requirements Mitigate the risks of endpoint-borne attacks

– Check endpoint compliance as a precondition for network access

– Quarantine and remediate non-compliant endpoints

– Monitor devices connected on the network– Protect against attacks on critical resources

Page 3: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

3[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Context: NAC and “The disappearing perimeter”

Flat networks are gone. Networks are becoming functionally segmented

Access controls are being deployed between segments

NAC brings identity and compliance awareness into segmentation and access control

Database

Internal Access Network

Internal Applications

DMZ

Employee

Partner

Wireless

Finance

Sales

Partner

Employee

Internet

Page 4: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

4[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Network Access Confusion

NAC has been over-hyped! Now we’re in the “trough of disillusionment”

The rate of pilot-to-production is very low– (and these pilots don’t come cheap!)

The initial promise of “clientless NAC” is proving to be a mirage

Standards are slow to take hold

Page 5: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

5[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point NAC

Identity aware firewall in VPN-1Identity aware firewall in VPN-1

SecureClient SCV (desktop configuration verification)SecureClient SCV (desktop configuration verification)

Integrity Client Network Access Control (Client Self-Enforcement) Integrity Client Network Access Control (Client Self-Enforcement)

Integrity & VPN Gateway Access Control Integration (CP Endpoint Integrity & VPN Gateway Access Control Integration (CP Endpoint Security and Cisco VPN Gateways)Security and Cisco VPN Gateways)

Integrity/802.1x LAN Access Control IntegrationIntegrity/802.1x LAN Access Control Integration

Founding Member of Trusted Network Connect (TNC) InitiativeFounding Member of Trusted Network Connect (TNC) Initiative

Clientless Security for Enforcement of Unmanaged PCsClientless Security for Enforcement of Unmanaged PCs

Cooperative Enforcement with ConnectraCooperative Enforcement with Connectra

Secure Automated RemediationSecure Automated Remediation

Cooperative Enforcement with VPN-1 Edge (802.1x)Cooperative Enforcement with VPN-1 Edge (802.1x)

Unified Management of NAC, Endpoint, and Network Security Unified Management of NAC, Endpoint, and Network Security InfrastructureInfrastructure

Enforcement with Intel AMT Enforcement with Intel AMT

CP EPS with VPN-1 UTM/PowerCP EPS with VPN-1 UTM/Power

20022002

20032003

20042004

20052005

20072007

Leverag

ing

Existin

g In

vestmen

t

20082008

19991999

199x199x

Page 6: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

6[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

You can do it today with Endpoint Security

Secure Employee Access with:– Endpoint Security Self-Enforcement– 802.1x support for VLAN steering – Cooperative Enforcement for VPN-1

and UTM-1 – All transparent to users!

Use Connectra portal for Guest/Partner access– Endpoint Security On-Demand

(ICS) provides posture checking– For partners seeking access to

internal applications, Check Point Secure Workspace provides a sanitized virtual platform the organization can trust

– Use SNX to deliver applications to partners, when needed

Page 7: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

7[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Summary

Endpoint Security – one of key NAC components – single agent with unified management

With Check Point NAC you maximize the value of your investment with Check Point’s network and endpoint products

Check Point NAC allows you to enter NAC gradually Unified Internal and external (VPN) NAC 802.1x, inline enforcement and client enforcement NAC features enhanced by:

– Expanded identity and compliance aware firewall– Integrated guest management system– Easy deployment with minimal impact on users and network

Page 8: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved. puresecurity™

Check Point Endpoint Security

Page 9: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

9[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Challenges in Endpoint Security Management

Too many security agents to manage Multiple administrator consoles to manage—one for each agent Administrators require specialized training

Page 10: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

10[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

1st Enterprise Endpoint Security Solution

15 years leadership in

firewalls

Based on award-winning

ZoneAlarm

Market-leading Pointsec®

technology

12 years leadership in remote access

VPN

Single Agent for Endpoint SecuritySingle Agent for Endpoint Security

Unified ManagementUnified Management

Mitigates the broadest range of endpoint risks Unifies all essential components Only solution that includes both data security and remote access

AntivirusAntivirusAnti-spywareAnti-spyware

Data Data SecuritySecurity Remote AccessRemote AccessFirewall/NACFirewall/NAC

Program ControlProgram Control

Page 11: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

11[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Single Agent for Endpoint Security

Easy to Deploy and Manage Only comprehensive endpoint

security solution:– Firewall, NAC & Program Control– Antivirus and anti-spyware– Data security– Remote Access

Single installation Single, intuitive interface Small agent footprint

Single Agent for Endpoint Security

Unified ManagementUnified Management

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NAC

Program Control

Only solution that includes Only solution that includes bothboth data security and VPN data security and VPN

Page 12: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

12[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Intuitive Dashboard ViewInfection Alerts Download Packages

Endpoint status &

Client connections

Current License Status

Direct access to most recent

policies

Antivirus & Anti-spyware Updates

Agent Updates

Page 13: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

13[Public]—For everyone

puresecurity™

©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Highest-rated Technologies

Rated Highest of 6 Endpoint Products

Best Remote Access IPSec VPN solution

Leader in Gartner Mobile Data Protection Leader in Gartner Mobile Data Protection Magic Quadrant Magic Quadrant 7 years in a row7 years in a row

Over 100 million VPN clients installedOver 100 million VPN clients installed

Common Criteria EAL 4 certifiedCommon Criteria EAL 4 certified

15 years firewall leadership15 years firewall leadership

Over 80 million PCs protectedOver 80 million PCs protected

Page 14: Check Point NAC and Endpoint Security - HTEregi.hte.hu/data/upload/File/80505HTE-EOQ-Koldov... · Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved. puresecurity™

Questions?

Thank You