1 / 33

Check Point Endpoint Security Secure . Fast . Simple

Check Point Endpoint Security Secure . Fast . Simple. Agenda. Endpoint Security Challenges Today The Check Point Solution Comprehensive endpoint security Secure, fast and simple to use Market leading data security Optimized Total Security Summary. 1994 1 solution. 2009 ~9 solutions.

iona
Download Presentation

Check Point Endpoint Security Secure . Fast . Simple

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Check Point Endpoint SecuritySecure. Fast. Simple

  2. Agenda • Endpoint Security Challenges Today • The Check Point Solution • Comprehensive endpoint security • Secure, fast and simple to use • Market leading data security • Optimized Total Security • Summary

  3. 1994 1 solution 2009 ~9 solutions Full DiskEncryption Antivirus Antivirus Remoteaccess/VPN Anti-spam Firewall MediaEncryption Anti-malware Data leakage NAC The Evolution of Endpoint Security More threats More technologies More complexity

  4. Too Much End User Complexity Security updates and patching Repeated security logons Multiple passwords Multiple security applications Reconnecting to VPN Trying to reconfigure VPN

  5. Fast-Growing Web Threats BusinessWeek site hacked, serving drive-by exploits Drive-By Download Poisons Google Search Results May, 2009 September, 2008 VC's automated Twitter feed spreads malware June, 2009 Malware now spreads through the web not email Forrester June, 2008

  6. The Headache of Data Security 53% of professionals have confidential data on their laptop 65% don’t protect them 12,000 stolen laptops in U.S. airports/week 61% of data breaches due to lack of policy enforcement Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008

  7. More Regulations, More Compliance 95/46/EC European Union Directive PCI HIPAA SOX Gramm-Leach-Bliley Act DPA Data Protection Act PIPEDA Japanese Law Personal Information Protection Law Indian IT Act of 2000 Privacy Act 1988

  8. Endpoint Security Needs Highest level of endpoint protection Simplified user experience Corporate data loss prevention Reduced complexity

  9. Agenda • Endpoint Security Challenges Today • The Check Point Solution • Comprehensive endpoint security • Secure, fast and simple to use • Market leading data security • Optimized Total Security • Summary

  10. Check Point Endpoint Security 2008The First and Only Single Agent for Endpoint Security 2009 Introducing Endpoint Security R73

  11. Check Point Endpoint Security Comprehensive Endpoint Protection Transparent and Simple to Use Market-Leading Data Security Optimized Total Security

  12. Comprehensive Endpoint Protection

  13. Complete Endpoint Security • Most comprehensive • endpoint solution in a • single agent • Integrated VPN • Integrated data security • Innovative levels • of protection • WebCheck Secure Browsing • Program Control

  14. Most Secure Endpoint SecurityCheck Point WebCheck Stops Web threats at the browser http://www.mywebsite.com http://www.cheap-software.com • Dual browser mode • Segregatescorporate data from the Internet • Isolates potential threats in the virtual browser sandbox • Protects against drive-by downloads and phishing attacks WebCheck enabled Untrusted site Trusted site

  15. Check Point WebCheck Highest level of protection

  16. Check Point Program Control Authorized Applications Protect from malware by controlling endpoint applications • Lock down endpoint to reduce support costsand complexity • Easy to maintain with Program Advisor service automating application policy decisions

  17. Transparent and Simple to Use

  18. Transparent User Experience Single Interface Single Agent Single Update Single Single Scan Logon

  19. Check Point OneCheck Single Logon Endpoint Reduce complexity of multiple authentications Transparent and simple to use Windows VPN OneCheck Data security

  20. VPN Auto Connect Stay connected on the move Transparent and simple to use Connect securely from hotspots Automatically reconnect when moving between networks (LAN, WiFi, GPRS) Automatically open hotspot registration page immediately upon connection • Determine the correct configuration and connect automatically Configure new connections automatically

  21. Transparent and Fast Fastest scanin the industry(62% faster than closest competitor) Smallest memoryfootprint (before, during and after scan) Fastest Web page downloadwith WebCheck enabled Smallest diskfootprint after install

  22. Market Leading Data Security

  23. Check Point Data Security Media Encryption Control all activities and access on ports Transparently encrypt all removable media Control data loss on all endpoints Full Disk Encryption Complete data security with 256-bit encryption File /folder encryption Pre-boot authentication Enforce password policies with more than 100 different smartcard models

  24. Data Security Market Leader Best Mobile Device Solution Product Excellence Encryption Solution Windows 7 Mac Leader in Magic Quadrant 9 Years in a Row Linux Smartphones Gold Medal 2009 Reader’s Choice Awards Secure data on all platforms Highest level of certification Recognized across the industry

  25. Rapid Large-Scale Deployment 150,000 endpoints encrypted, .00066 failure rate 50,000 endpoints secured in 30 days Telecommunications Company Government Agency EW mode Eliminate management scalability serverless management Flexible agent Deploy only what you need Open architecture Co-exist with 3rd-party products Windows-integrated logon Data security with no user disruption Endpoint distribution utility Use existing installation tools Meet compliance objectives and secure corporate data now!

  26. Optimized Total Security

  27. Total Security Challenge Today Separation of endpoint and network security Lack of policy orchestration Infrastructure duplication Weak threat coverage

  28. Cooperative Enforcement Built-in Network Access Control • Control endpoint access to corporate network • Coordinate network and endpoint security policies QUARANTINED Enforce endpoint compliance • Quarantine non-compliant systems

  29. Security Infrastructure Optimization VPN VPN Gateway VPN Client NAC NAC on Gateway NAC on Client Network Security Endpoint Security Server consolidation Simple deployment Simple management

  30. Unified Threat Research Check Point Protection Update Worldwide coordinated network and endpoint threat research Update Protection against Microsoft Office Web Components Multiple ActiveX Controls Remote Code Execution Vulnerability (MS09-043) Subscribe Overview Details Protection Check Point Reference: CPAI-2009-1029 Date Published: 15-Jul-09 Severity: Critical Source: MSFT Security Bulletin Industry Reference CVE-2009-0562 CVE-2009-1136 Protection Provided by: Endpoint Security R72 Security Gateway R70 VPN-1 NGX R65 IPS-1 Unified notifications for new threats Common threat definitions across endpoint and network Multi-layered protection across endpoint and network security

  31. Endpoint Security Management Easy Deployment, Easy Management with Single Console Coming Soon

  32. Your Opportunity with Check Point Best endpoint security User transparency and ease of use Corporate data loss prevention Reduced complexity

  33. Summary Comprehensive Endpoint Protection Transparent and Simple to Use Market-Leading Data Security Optimized Total Security

More Related