24
©2012 Check Point Software Technologies Ltd. What’s New in Check Point Endpoint Security E80.40 [Protected] For public distribution Jordi Medina Torregrosa Data Security BDM for Spain & Portugal [email protected]

Whats new in Check Point Security E80.40

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Whats new in Check Point Security E80.40

©2012 Check Point Software Technologies Ltd.

What’s New in Check Point Endpoint Security E80.40

[Protected] For public distribution

Jordi Medina Torregrosa

Data Security BDM for Spain & Portugal [email protected]

Page 2: Whats new in Check Point Security E80.40

2 ©2012 Check Point Software Technologies Ltd.

Unprotected

endpoints

put the entire

business at RISK

- Accept network

connections from anyone

- Remote connection apps

Unauthorized Access

Threat Infection

- Download infected

content from vulnerable

programs & OS

Data Loss

- Business data on hard

drives & storage devices

- Public file storage apps

[Protected] For public distribution

Page 3: Whats new in Check Point Security E80.40

3 ©2012 Check Point Software Technologies Ltd.

Addressing Security Risks on Endpoints

[Protected] For public distribution

Page 4: Whats new in Check Point Security E80.40

4 ©2012 Check Point Software Technologies Ltd.

Introducing Check Point

Endpoint Security E80.40

Best Security Control & Visibility

Single Security Solution

Across Windows & Mac

Integrated with Check Point

Management Architecture

[Protected] For public distribution

Page 5: Whats new in Check Point Security E80.40

5 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Unified Security for Endpoints

Secures

endpoint

connections

Verify

security

compliance

Fire

wa

ll & C

om

plia

nc

e

Encrypt local

hard drives

Controls

users access

to device

Fu

ll Dis

k E

ncry

ptio

n

Encrypt

business data

copied to

removable

devices

Me

dia

En

cry

ptio

n

Stops

infected

files & data

Control

apps install

& launch

An

ti Ma

lwa

re

Connect

Securely to

business

resources

Check Point Endpoint Software Blades

Page 6: Whats new in Check Point Security E80.40

6 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

The ONLY unified

Client for PC For Mac As Well ! And Now --

All Blades are Windows 8 Ready

Media Encryption and Anti Malware for Mac - 2013

Page 7: Whats new in Check Point Security E80.40

7 ©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 7

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Best Security Control & Visibility

[Protected] For public distribution

Page 8: Whats new in Check Point Security E80.40

8 ©2012 Check Point Software Technologies Ltd.

First, Define A Security Policy

[Protected] For public distribution

An Example for an Organizational Policy

Encrypt All

Drives on

PC & Mac

Encrypt business

data copied to

storage devices

Allow connections

only from

trusted sources

Scan files

upon access &

delete infected files

Page 9: Whats new in Check Point Security E80.40

9 ©2012 Check Point Software Technologies Ltd.

A Unified, Simple to Understand

Security Policy With E80.40

[Protected] For public distribution

Page 10: Whats new in Check Point Security E80.40

10 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Visibility to organizational security picture

Page 11: Whats new in Check Point Security E80.40

11 ©2012 Check Point Software Technologies Ltd.

5

[Protected] For public distribution

Security Forensics & Analysis

with Endpoint Security SmartEvent

Page 12: Whats new in Check Point Security E80.40

12 ©2012 Check Point Software Technologies Ltd.

Check Point Endpoint Compliance Analysis

Understand endpoint security risks

Run on ANY PC –

regardless installed endpoint product

Simple to read and understand

[Protected] For public distribution

Page 13: Whats new in Check Point Security E80.40

13 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Local device analysis

- Download the analysis tool

- View report in <1 minute

WWW

Organizational Analysis

- Run on targeted devices

- Unified report in SmartConsole

Analyze from one device –

to the entire organization

Page 14: Whats new in Check Point Security E80.40

14 ©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 14

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

Integrated with Check Point Management Architecture

[Protected] For public distribution

Page 15: Whats new in Check Point Security E80.40

15 ©2012 Check Point Software Technologies Ltd.

Netw

ork

Po

licy

Alongside

with Network

Security

management

R75.40

En

dp

oin

t Po

licy

Endpoint

Security

Management

E80.40

[Protected] For public distribution

SMART-1

Security Management

Manage endpoint security policies

with Check Point SMART-1

Page 16: Whats new in Check Point Security E80.40

16 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Cooperative Security Enforcement

Security Gateway

Protected Device

Remote access

Verify Security

Compliance

Upon Connect

Page 17: Whats new in Check Point Security E80.40

17 ©2012 Check Point Software Technologies Ltd.

Unified Security Intelligence

Another Example:

John tries to

copy data

outside the

organization

Corporate Strategy – backup

[email protected]

Strategy Plans 2012

Strategy

Plans 2012

Real time security visibility with SmartLog

– Across network and endpoint

[Protected] For public distribution

Page 18: Whats new in Check Point Security E80.40

18 ©2012 Check Point Software Technologies Ltd.

Unified Security Intelligence

Strategy Plans 2012

Real time security visibility with SmartLog

– Across network and endpoint

Full visibility of

John’s attempts to

copy data outside

[Protected] For public distribution

Page 19: Whats new in Check Point Security E80.40

19 ©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 19

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |

More in Endpoint Security E80.40

[Protected] For public distribution

Page 20: Whats new in Check Point Security E80.40

20 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Personal Data Data is not encrypted

Access to any user/device

Business Data Data is encrypted

Transparent access only to

approved users and devices

Separate and protect business data

from personal data on storage devices

Page 21: Whats new in Check Point Security E80.40

21 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Need to provide this presentation to our partner

X

Engage and educated users while

keeping business continuity with UserCheck

Page 22: Whats new in Check Point Security E80.40

22 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

And even more…

Additional features in Endpoint Security E80.40

Getting-Started

Wizard

Custom image

in full disk

Encryption

Scan

Multiple

AD trees

Web-remote

help to remediate

passwords

Manage

80,000 seats

Configure &

preview user

messages

Set alerts &

notifications

Send alerts

in email

Page 23: Whats new in Check Point Security E80.40

23 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution

Summary

Check Point Endpoint Security E80.40

Best Control &

Visibility

Integrated with

Check Point

Management

architecture

One Endpoint

Solution

Page 24: Whats new in Check Point Security E80.40

©2012 Check Point Software Technologies Ltd.

Thank You!

[Protected] For public distribution