34
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Introducing Check Point 3D Security Jani Ekman Security Engineer

Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

Embed Size (px)

Citation preview

Page 1: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Introducing Check Point 3D Security

Jani Ekman

Security Engineer

Page 2: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

22©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Boundaries are disappearing

Work from AnywhereShare DataUse Different DevicesUse Internet ToolsUsers Have Different

Needs

Boundaries are disappearing

Page 3: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

33©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

New environment, new challenges

To secure this new environment,IT needs to do more

Page 4: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

44©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

More Security….

…with Less:

Less Resources

Less Time

Page 5: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

55©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Introduces 3D Security

Combine Policy, People and Enforcementfor Better Security

Define the right policies

Support user needs

Easily enforce security

Enforcement

Policy

People

Check Point

R75Check Point

R75

Page 6: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

66©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

What’s New in R75

Enhanced

Functionality

► Integrated DLP Software Blade

► Endpoint Security VPN R75 support

► IPS Signatures - NSS Report

► Multi-Domain Security Management

► Support for SG80

New Blades► Identity Awareness

► Application Control

► Mobile Access Software Blade

Additional

info► Introduced in Q4/2010

Page 7: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

77©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

John,

Let’s review the corporate strategy in

our morning meeting.

Green World Strategy Plan 2010

[email protected]

Corporate Strategy

Data Loss Prevention Alert

An email that you have just sent has been

quarantined.

Reason: attached document contains

confidential internal data

The message is being held until further

action.

Send , Discard , or Review Issue

Introducing Check Point Data Loss Prevention

Educate

Users on corporate data policies

Enforce

Data loss business processes

Prevent

Move from detection to prevention

Check Point Combines Technology and Processes to Make DLP Work

Page 8: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Identity Awareness Software blade

Page 9: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

99©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Identity Awareness Software Blade

Granular Security Policy per

User, Machine and Locationsoftwareblades

Iden

tity

aw

are

ness

Page 10: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1010©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Example of Identity Awareness

Corporate

Network

Internet

HR Server

Finance Server

Internal

Firewall

Perimeter

Firewall

AD /Directory

Web Server Pool

DMZ

Data CenterManaged

Assets

Guest

Contractor

Corporate

Laptop

PDA / SmartPhones

IP: 10.122.115.8

User: John Morgan /

Finance_Group

Machine: John_XP

IP: 192.168.0.99

Guest Name: Anna Smith

IP: 10.222.1.100

User: Frank Gore /

Marketing_Group

Application: FaceBook

Page 11: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1111©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Identity Awareness At-A-Glance

User and Machine

Awareness

Security

Gateways

Across All

Software Blades

Security Gateway ability to identify users and machines passing through the gateway

Available for multiple Software Blades

Firewall (R75) Application Control (R75) DLP, URLF, IPS (in the future)

Scalable for up to 25,000 concurrent users on Power-1 series

IA Software Blade

Page 12: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1212©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Access Roles

Easy to setup

Users and Groups

could be fetched

from the AD

directly

Across all blades

i.e. Firewall,

Application Control

Page 13: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1313©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Identity Sources

Clientless Identity AgentCaptive

Portal

Flexible options to obtain

Users’ Identity

1 2 3

Page 14: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1414©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Identity Sources

Clientless Identity AgentCaptive

Portal

Active Directory

Simple and Fast Deployment

No agent required on endpoint and Active Directory

ConnectionsIP to mapping

Page 15: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1515©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Identity Sources

Clientless Identity AgentCaptive

Portal

InternetWeb Portal redirect

HTTPS://cap.portal

Data Center

Restrict Guest access

Provide secure access for non-domain endpoints

Page 16: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1616©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Identity Sources

Clientless Identity AgentCaptive

Portal

Stronger security with User and Machine Identity

SSO and IP spoofing prevention

User and Machine

Authentication

(SSO – Kerberos)

Page 17: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Check Point Application Control Software Blade

Page 18: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1818©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

The Need for Application Control

Malware

ThreatsProductivity

Loss

Bandwidth

Hogging

IT staff lack strong visibility into this activity

Internet Applications:An integral part of today’s business

Page 19: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

1919©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Introducing

Check Point Application Control

Software Blade

Detect and control application usage

Available on EVERY gateway

AppWiki—Industry’s largest library

with over 100,000 applications

Educate users on corporate policies

Page 20: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2020©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Introducing Check Point AppWiki

Over 4,500 applications

Over 100,000 social-network

widgets

Grouped in over 150 categories

(including Web 2.0, IM, P2P,

Voice & Video, File Share)

World’s largestApplication Classification Library

a p p w i k i . c h e c k p o i n t . c o m

Page 21: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2121©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

http://appwiki.checkpoint.com

Page 22: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2222©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Application Control

Identify, allow, block or limit usage of applications at user or group level

Page 23: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2323©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Application Control Overview

My Organization

Shows the gateways with

App Blade enabled and

some policy statistics.

Messages and actions

Info about updates and

license status.

Detected applications

Statistics of popular

applications and active

users.

What’s new

Statistics of Applications

and Social Network

Widgets in the DB

Page 24: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Mobile Access Software Blade

Jani Ekman

Security Engineer

Page 25: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2525©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Remote Access Portfolio

Complete Remote Access Solutions

Check Point Mobile

SSL VPN Portal

On Demand Client (SNX)

Windows, Linux, Mac iOS, Android,

Symbian

Corporate Owned Personal Owned

Supported

Clients

Client

Software

Endpoint VPN Blade

Security Gateway PlatformsGateway Appliance

Windows

Abra

Page 26: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2626©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Mobile

SSL VPN Portal

On Demand Client (SNX)

Windows, Linux, Mac iOS, Android,

Symbian

Remote Access Portfolio

Complete Remote Access Solutions

Corporate Owned Personal Owned

Supported

Clients

Client

Software

Endpoint VPN Blade

Security Gateway PlatformsGateway Appliance

Windows

Abra

Mobile Access Software Blade

Page 27: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2727©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Mobile Access Software Blade

Check Point Mobile Access Products

Check Point Clients Check Point Mobile

Clientless Web Portal

SNX On-Demand

Mobile Access

Software Blade 50 concurrent connections

200 concurrent connections

Unlimited concurrent connections

Security Gateway

and AdminUser

Experience

Page 28: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2828©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Simple for end-user

Tap “Check Point Mobile”

Enter your password

Gain secure access to your data!

Page 29: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

2929©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Connect Securely from any device

Consistent user experience for all devices

Check point Mobile for

iPhone, iPad, Android &

Symbian

Check Point Mobile for PC &

Mac

Page 30: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

3030©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

User & Device Access Control

Personalized portal, based on identity

Setup device security features

Control data

access by user

and device

settingsRemote-Wipe device upon loss

Page 31: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

3131©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

There’s no Control without Visibility

Page 32: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

3232©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

360º Visibility into All Security Events

Page 33: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

3333©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Granular Control of all Security layers

Gra

nu

lar V

isib

ility

Identity

Awareness

Application

Control

DLP

Mobile

Access

SmartEvent

IPS

Page 34: Introducing Check Point 3D Security - stallion.lvstallion.lv/seminar/Otepaa2011/Introducing_3D_Security.pdf · ©2010 Check Point Software Technologies Ltd. | [Confidential] For Check

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Thank You!

[email protected]