180 likes | 297 Views
Mobility – the Security Challenge. Nov 12th 2008 Peter Lönnqvist Business Manager EndPoint security. The mobile office – Available for everyone. New situation Mobile equipment Uncontrolled networks Communcation in new ways New risk exposure New costs.
E N D
Mobility – the Security Challenge Nov 12th 2008 Peter Lönnqvist Business ManagerEndPoint security
The mobile office – Available for everyone • New situation • Mobile equipment • Uncontrolled networks • Communcation in new ways • New risk exposure • New costs http://www.tech-404.com/rss/data_loss.aspx
Business Requirements – A Challange ExecutiveLevel Management level Operational level Laws, EuroSOX PCI, PUL, Competition ....$$$$ Policys, Cobit, PCI, ISO 27000, ITIL, Audits,Consolidation, budget Antivirus...$ Administration...$ Encrytion...$ VPN...$ Mobility...$ WEB...$ FW...$
Check Point End Point Security Malware Protection Firewall/NAC Secure Remote Access Full Disk Encryption Media Encryption Unified Management ME FDE Secure Access Market-leading Pointsec® technology • 15 years leadership in firewalls • Based on award-winning ZoneAlarm • 12 years leadership in remote access VPN • Mitigates the broadest range of endpoint risks • Unifies all essential components • Only solution that includes both data security and remote access
EndPoint - ”Secure Access” Personal Firewall AV/AS VPN NAC Program control/ Advisory
How Program Advisor Works Program Client Program Database Check Point Policy Server Database contains information on over 500,000 programs Unknown program attempts access Permissions applied Client asks server about program Server returns policy Program Advisor returns best practices policy Server asks Program Advisor
EndPoint - ”Data security” Full Disk Encryption Port Control Loss of Data Removable media Protection
Endpoint – One part of the infrastructure CoorporateEnforcement https://portal.sslvpn.checkpoint.com/ICS/scanPage
Unified Management Malware Protection Enforce Policy Compliance Secure Remote Access Full Disk Encryption Media Encryption Unified Management Compliance Reports Antivirus Reports Enforcement Settings Antivirus & Anti-spyware Policy Dashboard Connectivity Reports Secure Access FDE ME
Endpoint – One part of the infrastructure PCI Requirements
Why Check Point End Point • Lowered TCO • One client to manage (install, configure, update) • One vendor ( function, error detection, intop-less complexity) • One administrion consol (Education,Competence, Function) • Less impact on the enduser – increased uptime • Technology • Known technology that scales (Zone Alarm, Pointsec etc) • Consolidation is important – Network and ”End Point” • Good total solution – we are quite alone
Summary ENDPOINTOne singlesecurity client MANAGEMENTOne singleconsole GATEWAYOne unifiedproduct line puresecurity totalsecurity from Check Point