340 likes | 787 Views
Check Point Endpoint Security Secure . Fast . Simple. Date Name. Agenda. Endpoint Security Challenges Today The Check Point Solution Comprehensive endpoint security Secure, fast and simple to use Market leading data security Optimized Total Security Summary. 1994 1 solution. 2009
E N D
Agenda • Endpoint Security Challenges Today • The Check Point Solution • Comprehensive endpoint security • Secure, fast and simple to use • Market leading data security • Optimized Total Security • Summary
1994 1 solution 2009 ~9 solutions Full DiskEncryption Antivirus Antivirus Remoteaccess/VPN Anti-spam Firewall MediaEncryption Anti-malware Data leakage NAC The Evolution of Endpoint Security More threats More technologies More complexity
Too Much End User Complexity Security updates and patching Repeated security logons Multiple passwords Multiple security applications Reconnecting to VPN Trying to reconfigure VPN
Fast-Growing Web Threats BusinessWeek site hacked, serving drive-by exploits Drive-By Download Poisons Google Search Results May, 2009 September, 2008 VC's automated Twitter feed spreads malware June, 2009 Malware now spreads through the web not email Forrester June, 2008
The Headache of Data Security 53% of professionals have confidential data on their laptop 65% don’t protect them 12,000 stolen laptops in U.S. airports/week 61% of data breaches due to lack of policy enforcement Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008
More Regulations, More Compliance 95/46/EC European Union Directive PCI HIPAA SOX Gramm-Leach-Bliley Act DPA Data Protection Act PIPEDA Japanese Law Personal Information Protection Law Indian IT Act of 2000 Privacy Act 1988
Endpoint Security Needs Highest level of endpoint protection Simplified user experience Corporate data loss prevention Reduced complexity
Agenda • Endpoint Security Challenges Today • The Check Point Solution • Comprehensive endpoint security • Secure, fast and simple to use • Market leading data security • Optimized Total Security • Summary
Check Point Endpoint Security 2008The First and Only Single Agent for Endpoint Security 2009 Introducing Endpoint Security R73
Check Point Endpoint Security Comprehensive Endpoint Protection Transparent and Simple to Use Market-Leading Data Security Optimized Total Security
Comprehensive Endpoint Protection
Complete Endpoint Security • Most comprehensive • endpoint solution in a • single agent • Integrated VPN • Integrated data security • Innovative levels • of protection • WebCheck Secure Browsing • Program Control
Most Secure Endpoint SecurityCheck Point WebCheck Stops Web threats at the browser http://www.mywebsite.com http://www.cheap-software.com • Dual browser mode • Segregatescorporate data from the Internet • Isolates potential threats in the virtual browser sandbox • Protects against drive-by downloads and phishing attacks WebCheck enabled Untrusted site Trusted site
Check Point WebCheck Highest level of protection
Check Point Program Control Authorized Applications Protect from malware by controlling endpoint applications • Lock down endpoint to reduce support costsand complexity • Easy to maintain with Program Advisor service automating application policy decisions
Transparent User Experience Single Interface Single Agent Single Update Single Single Scan Logon
Check Point OneCheck Single Logon Endpoint Reduce complexity of multiple authentications Transparent and simple to use Windows VPN OneCheck Data security
VPN Auto Connect Stay connected on the move Transparent and simple to use Connect securely from hotspots Automatically reconnect when moving between networks (LAN, WiFi, GPRS) Automatically open hotspot registration page immediately upon connection • Determine the correct configuration and connect automatically Configure new connections automatically
Transparent and Fast Fastest scanin the industry(62% faster than closest competitor) Smallest memoryfootprint (before, during and after scan) Fastest Web page downloadwith WebCheck enabled Smallest diskfootprint after install
Check Point Data Security Media Encryption Control all activities and access on ports Transparently encrypt all removable media Control data loss on all endpoints Full Disk Encryption Complete data security with 256-bit encryption File /folder encryption Pre-boot authentication Enforce password policies with more than 100 different smartcard models
Data Security Market Leader Best Mobile Device Solution Product Excellence Encryption Solution Windows 7 Mac Leader in Magic Quadrant 9 Years in a Row Linux Smartphones Gold Medal 2009 Reader’s Choice Awards Secure data on all platforms Highest level of certification Recognized across the industry
Rapid Large-Scale Deployment 150,000 endpoints encrypted, .00066 failure rate 50,000 endpoints secured in 30 days Telecommunications Company Government Agency EW mode Eliminate management scalability serverless management Flexible agent Deploy only what you need Open architecture Co-exist with 3rd-party products Windows-integrated logon Data security with no user disruption Endpoint distribution utility Use existing installation tools Meet compliance objectives and secure corporate data now!
Total Security Challenge Today Separation of endpoint and network security Lack of policy orchestration Infrastructure duplication Weak threat coverage
Cooperative Enforcement Built-in Network Access Control • Control endpoint access to corporate network • Coordinate network and endpoint security policies QUARANTINED Enforce endpoint compliance • Quarantine non-compliant systems
Security Infrastructure Optimization VPN VPN Gateway VPN Client NAC NAC on Gateway NAC on Client Network Security Endpoint Security Server consolidation Simple deployment Simple management
Unified Threat Research Check Point Protection Update Worldwide coordinated network and endpoint threat research Update Protection against Microsoft Office Web Components Multiple ActiveX Controls Remote Code Execution Vulnerability (MS09-043) Subscribe Overview Details Protection Check Point Reference: CPAI-2009-1029 Date Published: 15-Jul-09 Severity: Critical Source: MSFT Security Bulletin Industry Reference CVE-2009-0562 CVE-2009-1136 Protection Provided by: Endpoint Security R72 Security Gateway R70 VPN-1 NGX R65 IPS-1 Unified notifications for new threats Common threat definitions across endpoint and network Multi-layered protection across endpoint and network security
Endpoint Security Management Easy Deployment, Easy Management with Single Console Coming Soon
Your Opportunity with Check Point Best endpoint security User transparency and ease of use Corporate data loss prevention Reduced complexity
Summary Comprehensive Endpoint Protection Transparent and Simple to Use Market-Leading Data Security Optimized Total Security