140 likes | 175 Views
Transforming Security – People, Policy and Enforcement. January 2011 Caroline Ikomi Technical Director. Boundaries are disappearing. Work from A nywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have D ifferent N eeds. Boundaries are disappearing.
E N D
Transforming Security – People, Policy and Enforcement January 2011 Caroline Ikomi Technical Director
Boundaries are disappearing Work from Anywhere Share Data Use Different Devices Use Internet Tools Users Have Different Needs Boundaries are disappearing
New environment, new challenges To secure this new environment, IT needs to do more
More Security…. …with Less: LessResources LessTime
3D SECURITY Introducing… Policy Enforcement People
Security as a Business Process Policy that supports business needs Policy Security that involves people People Enforcement Easily enforce security policies
Policy Definition Legacy: Now:
Check Point UserCheck Technology Application Usage Alert You are trying to access YouTube. Corporate application use policy limits YouTube access to business use only in order to save bandwidth. Please select and confirm your use-case: Personal ,Business , or Cancel Educate and Engage end-users Educates users on risk and usage policies http://www.youtube.com Makes control more practical
Granular Control of all Security layers Granular Visibility Mobile Access DLP Application Control SmartEvent User Access IPS Sensitive Data Network Threat Prevention Internet Applications Usage Mobile Access Identity Awareness Internet Applications Usage Internet Applications Usage Internet Applications Usage Internet Applications Usage Sensitive Data
Industry-Leading IPS Check Point Sets a New Standard in Latest NSS Group IPS Test The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: • 97.3% Security Effectiveness • Multi-Gigabit rated throughput of 2.4Gbps • 100% anti-evasion coverage
Security is about People, not Numbers Security Is about People, not Numbers