28
©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Visibility & Control – Identity, Application & Content Awareness Andrea Bellinzaghi Technical Manager Check Point Italia

Visibility & Control – Identity, Application & Content Awareness

  • Upload
    mauve

  • View
    43

  • Download
    0

Embed Size (px)

DESCRIPTION

Visibility & Control – Identity, Application & Content Awareness. Andrea Bellinzaghi Technical Manager Check Point Italia. Boundaries are disappearing. Work from Anywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have Different Needs. Boundaries are disappearing. - PowerPoint PPT Presentation

Citation preview

Page 1: Visibility & Control – Identity, Application  & Content Awareness

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Visibility & Control – Identity, Application & Content Awareness

Andrea Bellinzaghi

Technical Manager

Check Point Italia

Page 2: Visibility & Control – Identity, Application  & Content Awareness

22©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Boundaries are disappearing

Work from AnywhereShare DataUse Different DevicesUse Internet ToolsUsers Have Different Needs

Boundaries are disappearing

Page 3: Visibility & Control – Identity, Application  & Content Awareness

33©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

New environment, new challenges

To secure this new environment,IT needs to do more

Page 4: Visibility & Control – Identity, Application  & Content Awareness

44©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

More Security….

…with Less:

Less ResourcesLess Time

Page 5: Visibility & Control – Identity, Application  & Content Awareness

55©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

INTRODUCING…

3DSECURITY

Page 6: Visibility & Control – Identity, Application  & Content Awareness

66©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

|6

Easily enforce security policies

Security that involves people

Policy that supports business needs

Security as a Business Process

Policy

People

Enforcement

Page 7: Visibility & Control – Identity, Application  & Content Awareness

77©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Policy Definition

Legacy:Now:

Page 8: Visibility & Control – Identity, Application  & Content Awareness

88©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Security is about People, not Numbers

Security Is about People, not Numbers

Page 9: Visibility & Control – Identity, Application  & Content Awareness

99©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

IP Based Policy Challenges

Access from Anywhere…

Users no longer belong to specific networks!

Page 10: Visibility & Control – Identity, Application  & Content Awareness

1010©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Granular securityper user,

Security following the user !

user-group and machine

Page 11: Visibility & Control – Identity, Application  & Content Awareness

1111©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Accurate Security

Intuitive Management

Full Integration

Introducing ..Check Point Identity Awareness

Page 12: Visibility & Control – Identity, Application  & Content Awareness

1212©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

are an integral part of securityPeople

Page 13: Visibility & Control – Identity, Application  & Content Awareness

1313©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point UserCheck™ Technology

Understand usage needs,while enforcing policy

Makes Web control more

practical

Asks users to confirm usage in

real-time

Ask

http://www.youtube.com

Need to watch product demo

http://www.youtube.com

Internet Access Policy

John Smith,

According to the company policy, access to YouTube is intended for work-related use only.

This is work related. Reason below:

Need to watch product demo

Cancel OK

Page 14: Visibility & Control – Identity, Application  & Content Awareness

1414©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Granular Control of all Security layers

User Access

Granular Visibility

Network Threat Prevention

Internet Applications Usage

Sensitive Data

Mobile Access

Identity Awareness

Application Control &

URL filtering

DLP

Mobile Access

SmartEvent

IPS

Page 15: Visibility & Control – Identity, Application  & Content Awareness

1515©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Industry-Leading Next Generation Firewall

Check Point the Only Firewall to Pass Latest NSS Next Generation Firewall Test and Earn "Recommend" Rating Passed 100% of Traditional Firewall Tests Passed 100% of Application Identification and Control Tests Passed 100% all firewall policies with direct integration to Active Directory Passed 100% of Tested Evasions Low TCO

Page 16: Visibility & Control – Identity, Application  & Content Awareness

1616©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Sets a New Standard in Latest NSS Group IPS Test

Industry-Leading IPS

The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: 97.3% Security

Effectiveness Multi-Gigabit rated

throughput of 2.4Gbps 100% anti-evasion

coverage

Page 17: Visibility & Control – Identity, Application  & Content Awareness

1717©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Need to Control All Aspects of Web

Websites Applications

Facebook Chat

Granularity beyond URLs

Not URL-basedwww.hackthissite.org

www.fantasyfootball.com

Unified Control Needed !

Page 18: Visibility & Control – Identity, Application  & Content Awareness

1818©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Unifies URL Filtering and Application Control

Websites — URL Filtering

Applications — Application Control

Unified categories — URLs and applications

User/Group Granularity

Unified Control of All Aspects of Web Security

Page 19: Visibility & Control – Identity, Application  & Content Awareness

1919©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Different Users Have Different Needs

IT wants to conserve bandwidth

Marketing needs to upload a product demo

But…

Should be allowed? Blocked?

Support User Needs by Engaging End-Users

Page 20: Visibility & Control – Identity, Application  & Content Awareness

2020©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point UserCheck™ Technology

Understand usage needs,while enforcing policy

Makes Web control more

practical

Asks users to confirm usage in

real-time

Ask

http://www.youtube.com

Need to watch product demo

http://www.youtube.com

Internet Access Policy

John Smith,

According to the company policy, access to YouTube is intended for work-related use only.

This is work related. Reason below:

Need to watch product demo

Cancel OK

Page 21: Visibility & Control – Identity, Application  & Content Awareness

2121©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point AppWiki

Over 4,500 applications Over 250,000 social-network

widgetsGrouped in over 80 categories (including Web 2.0, IM, P2P,

Voice & Video, File Share)

World’s largestApplication Classification Library

a p p w i k i . c h e c k p o i n t . c o m

Page 22: Visibility & Control – Identity, Application  & Content Awareness

2222©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Engage users for practical enforcement

Unified with Application Control

New and Improved URL Filtering Software Blade

Granular user-based policies

Cloud-based categorization

Available on ALL Security Gateways

Check Point Offers the Right Solution

Page 23: Visibility & Control – Identity, Application  & Content Awareness

2323©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point DLPMakes data loss prevention work

PreventData loss by involving user

InspectSensitive data leaving organization in real time

Check Point Data Loss Prevention

Page 24: Visibility & Control – Identity, Application  & Content Awareness

2525©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Inspect SSL-Encrypted Traffic Across All Software Blades

URL Filtering

Application Control

Antivirus & Anti-Malware

IPSDLP

Page 25: Visibility & Control – Identity, Application  & Content Awareness

2626©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Mobile Access Software Blade

Easy Access to Email and Applications

Page 26: Visibility & Control – Identity, Application  & Content Awareness

2727©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

360º Visibility into All Security Events

Page 27: Visibility & Control – Identity, Application  & Content Awareness

2828©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Software Blades Architecture

Check Point 3D Security

Combines Policy, People and Enforcement for Better Security

Centralized Management

Flexible Deployment

Page 28: Visibility & Control – Identity, Application  & Content Awareness

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Thank You!