280 likes | 437 Views
Visibility & Control – Identity, Application & Content Awareness. Andrea Bellinzaghi Technical Manager Check Point Italia. Boundaries are disappearing. Work from Anywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have Different Needs. Boundaries are disappearing.
E N D
Visibility & Control – Identity, Application & Content Awareness Andrea Bellinzaghi Technical Manager Check Point Italia
Boundaries are disappearing Work from Anywhere Share Data Use Different Devices Use Internet Tools Users Have Different Needs Boundaries are disappearing
New environment, new challenges Image of IT juggling: • Users • Internal assets (databases, servers) • Mobile devices • Information • Internet apps To secure this new environment, IT needs to do more
More Security…. …with Less: LessResources LessTime
INTRODUCING… 3DSECURITY
Security as a Business Process Policy that supports business needs Policy Security that involves people People Enforcement Easily enforce security policies
Policy Definition Legacy: Now:
Security is about People, not Numbers Security Is about People, not Numbers
IP Based Policy Challenges Access from Anywhere… Users no longer belong to specific networks!
Security following the user ! Granular security user-group and machine per user,
Introducing ..Check Point Identity Awareness Intuitive Management Accurate Security Full Integration
Check Point UserCheck™ Technology Ask Understand usage needs,while enforcing policy Internet Access Policy John Smith, According to the company policy, access to YouTube is intended for work-related use only. This is work related. Reason below: http://www.youtube.com http://www.youtube.com Makes Web control more practical Need to watch product demo Need to watch product demo Asks users to confirm usage in real-time Cancel OK
Granular Control of all Security layers Granular Visibility Mobile Access DLP Application Control & URL filtering SmartEvent User Access IPS Sensitive Data Network Threat Prevention Internet Applications Usage Mobile Access Identity Awareness Internet Applications Usage Internet Applications Usage Internet Applications Usage Internet Applications Usage Sensitive Data
Industry-Leading Next Generation Firewall Check Point the Only Firewall to Pass Latest NSS Next Generation Firewall Test and Earn "Recommend" Rating • Passed 100% of Traditional Firewall Tests • Passed 100% of Application Identification and Control Tests • Passed 100% all firewall policies with direct integration to Active Directory • Passed 100% of Tested Evasions • Low TCO
Industry-Leading IPS Check Point Sets a New Standard in Latest NSS Group IPS Test The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: • 97.3% Security Effectiveness • Multi-Gigabit rated throughput of 2.4Gbps • 100% anti-evasion coverage
Need to Control All Aspects of Web Websites Applications Not URL-based Facebook Chat www.hackthissite.org www.fantasyfootball.com Granularity beyond URLs Unified Control Needed !
Check Point Unifies URL Filtering and Application Control Unified Control of All Aspects of Web Security Websites — URL Filtering Unified categories — URLs and applications User/Group Granularity Applications — Application Control
Different Users Have Different Needs IT wants to conserve bandwidth But… Marketing needs to upload a product demo Should be allowed? Blocked? Support User Needs by Engaging End-Users
Check Point UserCheck™ Technology Ask Understand usage needs,while enforcing policy Internet Access Policy John Smith, According to the company policy, access to YouTube is intended for work-related use only. This is work related. Reason below: http://www.youtube.com http://www.youtube.com Makes Web control more practical Need to watch product demo Need to watch product demo Asks users to confirm usage in real-time Cancel OK
Check Point AppWiki World’s largestApplication Classification Library Over 4,500 applications Over 250,000social-network widgets Grouped in over 80 categories (including Web 2.0, IM, P2P, Voice & Video, File Share) appwiki.checkpoint.com
Check Point Offers the Right Solution Unified with Application Control • New and Improved URL Filtering Software Blade Engage users for practical enforcement Cloud-based categorization Granular user-based policies Available on ALL Security Gateways
Check Point Data Loss Prevention Inspect Sensitive data leaving organization in real time Prevent Data loss by involving user Check Point DLP Makes data loss prevention work
Inspect SSL-Encrypted Traffic Across All Software Blades DLP IPS Application Control Antivirus & Anti-Malware URL Filtering
Mobile Access Software Blade Easy Access to Email and Applications
Check Point 3D Security Combines Policy, People and Enforcement for Better Security Software Blades Architecture Centralized Management Flexible Deployment