Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
1©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.
Daniel Safar|Country manager, CZR region
INTRODUCING GEN V PROTECTIONS AGAINST ATTACK
2©2018 Check Point Software Technologies Ltd.
WE LIVEIN AN AMAZINGWORLD
3©2018 Check Point Software Technologies Ltd.
WE LIVE LONGER
Source: ourworldindata.org
age
LIFE EXPECTANCY
4©2018 Check Point Software Technologies Ltd.
WE HAVE BETTER LIVING STANDARDS
Source: ourworldindata.org
EXTREME POVERTY% of population living in poverty
[Protected] Distribution or modification is subject to approval
5©2018 Check Point Software Technologies Ltd.
WE GET BETTER EDUCATION
Source: ourworldindata.org
% of literate population
LITERACY
6©2018 Check Point Software Technologies Ltd.
THE ERA OF DIGITAL TRANSFORMATION
CONNECTING TO THE CLOUD AND MOBILE
7©2018 Check Point Software Technologies Ltd.
#1 Taxi company owns no cars
#1 Accommodation company owns no real estate
#1 media provider creates no content
#1 fastest growing TV network lays
no cables
#1 Valuable retailer has no inventory
DISRUPTIVE BUSINESS MODELS
8©2018 Check Point Software Technologies Ltd.
THE CHANGE IS HAPPENING NOW
2016 MOBILE OVERTAKEN DESKTOP
WHATSAPP OVERTAKEN VOICE
SOCIAL MEDIA OVERTAKES TV AS
MAIN SOURCE OF NEWS
9©2018 Check Point Software Technologies Ltd.
THE INFRASTRUCTURE IS CHANGING NOW
CLOUDMOBILE
SERVERIOT
VIRTUALIZATION
10©2018 Check Point Software Technologies Ltd.
FOR THE BAD ACTORS ASWELL AS THE GOOD GUYS
CHANGES CREATE NEW OPPORTUNITIES
11©2018 Check Point Software Technologies Ltd.
Security is the biggest barrier to IoT adoption
Security Concerns Continue Amid Cloud Adoption
Cybersecurity Is Biggest Risk of Autonomous Cars
ITPRO
InformationWeek
Bloomberg
“”
“
“
”
”
12©2018 Check Point Software Technologies Ltd.
WAS 2017 A CYBER-SECURITY WAKE-UP CALL ?
WannaCryThousands of enterprises in over 99 countries
NotPetyaCompletely shutting down an entire country and impacting over 60 more
13©2018 Check Point Software Technologies Ltd.
The Global Risks Report 2018
14©2018 Check Point Software Technologies Ltd. 14©2018 Check Point Software Technologies Ltd.
Generations of Attacks and Protections
Gen ILate 1980s –PC attacks - standalone
Virus
Gen IIMid 1990s –Attacks from the internet
Networks
Gen IIIEarly 2000s -Exploiting vulnerabilities in applications
Applications
The Anti Virus
The Firewall
Intrusion Prevention (IPS)
Gen IV2010 -Polymorphic Content
Payload
SandBoxingand Anti-Bot
15©2018 Check Point Software Technologies Ltd.
Where are we ?
1990 2000 2010 2015 2017
THREATS
PROTECTIONSNetworks
Gen II
Applications
Gen III
Payload
Gen IV
GRADE I
GRADE II
GRADE III
GRADE V
GRADE IV
Virus
Gen I
Enterprises are between
Gen 2-3
2.8
Mega
Gen V
16©2018 Check Point Software Technologies Ltd. 16©2018 Check Point Software Technologies Ltd.
2018 – GEN V OF ATTACKS
Large scale (across country and industry)
State-sponsored technologies
Multi-vector (network, cloud, mobile)
17©2018 Check Point Software Technologies Ltd. 17©2018 Check Point Software Technologies Ltd.
GEN IV PROTECTION IS NO LONGER ENOUGH!
Gen IV
PAYLOAD
SandBoxingand Anti-Bot
2010 -Polymorphic Content
WE NEED PREVENTION (NOT-JUST DETECTION)
COVERING OUR WEAKEST POINTS – CLOUD, MOBILE
REAL-TIME ACTION
18©2018 Check Point Software Technologies Ltd.
President How can I create
value for customers?
CIODo we have
up-to-the-second information everywhere we need it?
LEADERS MAKE MAJOR BUSINESS DECISIONS DAILYEVERY MAJOR DECISION EVOKES SECURITY RISKS
CEOHow can technology
transform my business?
CFODo I comply with
regulations?
CMOWill online marketing make a
difference?
19©2018 Check Point Software Technologies Ltd.
HOW DO YOUINNOVATE, INSPIRE AND COMPETE WHILE REMAINING SECURE?
20©2018 Check Point Software Technologies Ltd.
PATCHWORK OF POINT
SOLUTIONS.
COMPLEX SOLUTIONS
WITH UNCERTAIN
SECURITY COVERAGE.
Most security technologies today stay
• Looking for yesterday’s signatures
• Detection instead of prevention
ONE STEPBEHIND
21©2018 Check Point Software Technologies Ltd.
THE TRADITIONAL APPROACH
Virus > < Anti-Virus
Malicious Websites > < URL Filtering
Intrusion > < Intrusion Prevention
Botnet > < Anti-Bot
High Risk Applications > < Application Control
22©2018 Check Point Software Technologies Ltd.
NOW IMAGINE THE FUTUREOF CYBER SECURITY
[Protected] Distribution or modification is subject to approval
23©2018 Check Point Software Technologies Ltd.
A future in which security is
managed with fewer people,
with less capital investment
and a smaller footprint on
the network. And yet, with
BETTER SECURITY
IMAGINE
24©2018 Check Point Software Technologies Ltd.
CHECK POINT
PROVIDES YOUTHATFUTURE
25©2018 Check Point Software Technologies Ltd.
Introducing GEN 5 PROTECTIONAgainst MEGA ATTACKS
26©2018 Check Point Software Technologies Ltd. 26©2018 Check Point Software Technologies Ltd.
WHAT INGREDIENTS DO WE NEED ?
27©2018 Check Point Software Technologies Ltd.
SAAS SECURITY
ADAPTIVE CLOUD
SECURITY
MOBILE APP SCANNING
SDN MICRO-SEGEMENTATION
CLOUD SECURITY
AUTO-SCALE
ORCHESTRATION
ACCOUNT TAKEOVER
PREVENTION
HYPERVISOR LEVEL SECURITY
PUBLIC-CLOUD AUTOPROVISION
MOBILE CODE ANALYSIS
MOBILE AI AND MACHINE LEARNING
DISK ENCRYPTION
MEDIA ENCRYPTION
MOBILE SMS PHISHING
MOBILE MAN IN THE MIDDLE
ATTACKBLUETOOTH
ATTACK DETECTION
SS7 ATTACK PREVENTION
ADVANCED JAILBREAK
PROTECTION
MEMORY ANALYSIS
THREAT EXTRACTION
HUMAN INTERACTION SIMULATION
INTRUSION PREVENTION
DOMAIN PREDICTION
MACHINE LEARNING
ANTI-RANSOMWARE
CPU LEVEL SANDBOX
ENDPOINT FORENSICS
CAMPAIGN HUNTING
IMAGE FILE SANITIZER
ENDPOINT EXPLOITATION
DETECTION
FLASH EMULATION
INTRUSION PREVENTION
DOMAIN PREDICTION
DECOYS & TRAPS
ANTI-RANSOMWARE
CPU LEVEL SANDBOX
CPU EXPLOIT DETECTOR
MACRO ANALYSIS
OS-LEVEL SANDBOX
DROPPED FILES EMULATION
TRANSPARENT HTTPS
INSPECTION
STATIC ANALYZER
LOW LATENCY FIREWALL
INTEGRATED PACKET
CAPTURE
SCALABLE IDENTITY ACCESS
VIRTUAL SYSTEMS (VSX)
MULTICORE VPN
SECURE-XL
SSL INSPECTION
NATIONWIDE PROTECTION
VERTICAL SCALING
ZONE-BASED SECURITY
CONTENT AWARENESS
NETWORK ENCRYPTION
ICS/SCADA PROTECTION
APPLICATION CONTROL
USER-CHECK
URL FILTERING
HTTP 2.0
DLPICS/SCADA
PROTECTION
LARGE SCALE MANAGEMENT
REST APIS
SECURITY ADVISOR
SECURITY MANAGEMENT
PORTAL
EVENT CORRELATION
28©2018 Check Point Software Technologies Ltd.
SS7 ATTACK PREVENTION
LARGE SCALE MANAGEMENT
MOBILE MAN IN THE MIDDLE
ATTACK
MEMORY ANALYSIS
PUBLIC-CLOUD AUTOPROVISION
THREAT EXTRACTION
NETWORK ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL SANDBOX
ADAPTIVE CLOUD
SECURITY CLOUD
SECURITY AUTO-SCALE
29©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd.
MAKING GEN V POSSIBLE
SS7 ATTACK PREVENTION
LARGE SCALE MANAGEMENT
MOBILE MAN IN THE
MIDDLE ATTACK
MEMORY ANALYSIS
PUBLIC-CLOUD AUTOPROVISION
THREAT EXTRACTION
NETWORK ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL SANDBOX
ADAPTIVE CLOUD
SECURITY CLOUD
SECURITY AUTO-SCALE
30©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.
HOW DO WE MOVE TO GEN V OF SECURITY?
31©2018 Check Point Software Technologies Ltd.
You Need a Small Army of Security Technologies
MachineLearning
CPU-LevelSandboxing
32©2018 Check Point Software Technologies Ltd.
LOOKS IMPOSSIBLE?
MIRACLES TAKE A LITTLE LONGER.(Charles Alexandre de Calonne, 1794)
THE IMPOSSIBLE WE
DO IMMEDIATELY
33©2018 Check Point Software Technologies Ltd. 33©2018 Check Point Software Technologies Ltd.
THIS WORKS !YOU CAN MAKE IT POSSIBLE
MachineLearning
CPU-LevelSandboxing
ThreatExtraction
Virtual Firewall
Endpoint Detection
& Response
Human Behavioral Analytics
DataEncryption
Data LeakPrevention
Anti-Bot FlashDetonation
URLFiltering
FirewallICS/ SCADA Protection
MachineLearning
ProxyNetwork
EncryptionAnti-
RansomwareZero
PhishingMobile Threat
PreventionCPU-Level
Sandboxing
HTTPS Inspection
Intrusion Prevention
Anti-Virus DDOSHypervisor
Level SecurityApplication
Control
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
34©2018 Check Point Software Technologies Ltd.
THE F IRST CONSOLIDATED SECURITY ACROSS NETWORKS ,
CLOUD , AND MOBILE , PROVIDING THE HIGHEST LEVEL
OF THREAT PREVENTION .
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
35©2018 Check Point Software Technologies Ltd.
ACROSS ALL NETWORKS, CLOUDS AND MOBILE
ONE SECURITY PLATFORM
Leveraging unified threat intelligence & open interfaces
PREEMPTIVETHREAT PREVENTION
Blocking the most sophisticated attacks before they happen
Single Management, Modular Policy
Management & integrated threat visibility
CONSOLIDATED SYSTEM
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
36©2018 Check Point Software Technologies Ltd. ©2018 Check Point Software Technologies Ltd.
THANK YOU