Upload
mauve
View
43
Download
0
Tags:
Embed Size (px)
DESCRIPTION
Visibility & Control – Identity, Application & Content Awareness. Andrea Bellinzaghi Technical Manager Check Point Italia. Boundaries are disappearing. Work from Anywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have Different Needs. Boundaries are disappearing. - PowerPoint PPT Presentation
Citation preview
©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Visibility & Control – Identity, Application & Content Awareness
Andrea Bellinzaghi
Technical Manager
Check Point Italia
22©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Boundaries are disappearing
Work from AnywhereShare DataUse Different DevicesUse Internet ToolsUsers Have Different Needs
Boundaries are disappearing
33©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
New environment, new challenges
To secure this new environment,IT needs to do more
44©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
More Security….
…with Less:
Less ResourcesLess Time
55©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
INTRODUCING…
3DSECURITY
66©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
|6
Easily enforce security policies
Security that involves people
Policy that supports business needs
Security as a Business Process
Policy
People
Enforcement
77©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Policy Definition
Legacy:Now:
88©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Security is about People, not Numbers
Security Is about People, not Numbers
99©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
IP Based Policy Challenges
Access from Anywhere…
Users no longer belong to specific networks!
1010©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
Granular securityper user,
Security following the user !
user-group and machine
1111©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
Accurate Security
Intuitive Management
Full Integration
Introducing ..Check Point Identity Awareness
1212©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
are an integral part of securityPeople
1313©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point UserCheck™ Technology
Understand usage needs,while enforcing policy
Makes Web control more
practical
Asks users to confirm usage in
real-time
Ask
http://www.youtube.com
Need to watch product demo
http://www.youtube.com
Internet Access Policy
John Smith,
According to the company policy, access to YouTube is intended for work-related use only.
This is work related. Reason below:
Need to watch product demo
Cancel OK
1414©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Granular Control of all Security layers
User Access
Granular Visibility
Network Threat Prevention
Internet Applications Usage
Sensitive Data
Mobile Access
Identity Awareness
Application Control &
URL filtering
DLP
Mobile Access
SmartEvent
IPS
1515©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Industry-Leading Next Generation Firewall
Check Point the Only Firewall to Pass Latest NSS Next Generation Firewall Test and Earn "Recommend" Rating Passed 100% of Traditional Firewall Tests Passed 100% of Application Identification and Control Tests Passed 100% all firewall policies with direct integration to Active Directory Passed 100% of Tested Evasions Low TCO
1616©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Sets a New Standard in Latest NSS Group IPS Test
Industry-Leading IPS
The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: 97.3% Security
Effectiveness Multi-Gigabit rated
throughput of 2.4Gbps 100% anti-evasion
coverage
1717©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Need to Control All Aspects of Web
Websites Applications
Facebook Chat
Granularity beyond URLs
Not URL-basedwww.hackthissite.org
www.fantasyfootball.com
Unified Control Needed !
1818©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point Unifies URL Filtering and Application Control
Websites — URL Filtering
Applications — Application Control
Unified categories — URLs and applications
User/Group Granularity
Unified Control of All Aspects of Web Security
1919©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Different Users Have Different Needs
IT wants to conserve bandwidth
Marketing needs to upload a product demo
But…
Should be allowed? Blocked?
Support User Needs by Engaging End-Users
2020©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point UserCheck™ Technology
Understand usage needs,while enforcing policy
Makes Web control more
practical
Asks users to confirm usage in
real-time
Ask
http://www.youtube.com
Need to watch product demo
http://www.youtube.com
Internet Access Policy
John Smith,
According to the company policy, access to YouTube is intended for work-related use only.
This is work related. Reason below:
Need to watch product demo
Cancel OK
2121©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point AppWiki
Over 4,500 applications Over 250,000 social-network
widgetsGrouped in over 80 categories (including Web 2.0, IM, P2P,
Voice & Video, File Share)
World’s largestApplication Classification Library
a p p w i k i . c h e c k p o i n t . c o m
2222©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Engage users for practical enforcement
Unified with Application Control
New and Improved URL Filtering Software Blade
Granular user-based policies
Cloud-based categorization
Available on ALL Security Gateways
Check Point Offers the Right Solution
2323©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Check Point DLPMakes data loss prevention work
PreventData loss by involving user
InspectSensitive data leaving organization in real time
Check Point Data Loss Prevention
2525©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Inspect SSL-Encrypted Traffic Across All Software Blades
URL Filtering
Application Control
Antivirus & Anti-Malware
IPSDLP
2626©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Mobile Access Software Blade
Easy Access to Email and Applications
2727©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
360º Visibility into All Security Events
2828©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |
Software Blades Architecture
Check Point 3D Security
Combines Policy, People and Enforcement for Better Security
Centralized Management
Flexible Deployment
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
Thank You!