300 likes | 421 Views
Endpoint Security Current portfolio and looking forward. October 2010. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80. Conclusion. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80.
E N D
Endpoint SecurityCurrent portfolio and lookingforward October2010
Agenda 1 2 3 Background: Current Endpoint Portfolio LookingForward: Endpoint Security R80 Conclusion
Agenda 1 2 3 Background: Current Endpoint Portfolio LookingForward: Endpoint Security R80 Conclusion
Endpoint Security today • Our current portfolio Abra R73 (HFA1) Mobile clients (VPN, Encryption)
R73 Evolution R7x R73 / HFA1 R71 / R72 Unified Client Project R70 Pointsec Acquisition ZoneLabs Acquisition 2004 2008 2009 2010 2007
Endpoint Security R73 • Unified Endpoint Protection • Best of breed Components • Data Security • Network Security • Remote Access components • Provides full security coverage • Flexible & Modular • Deploy what you need now, add what you need in the future • Multiple component and suite deployment options
R73 – Data Security • Full Disk Encryption protects data at rest • Combines full hard drive encryption and pre-boot authentication • Media Encryption protects your removable medias • Combines Media Encryption and Port Protection
R73 HFA1 – Network Protection • Not just a firewall • Innovative Network Protection Technologies • Program Advisor, WebCheck • Complementary Anti-Malware • Award-winning, high-performance
R73 HFA1 - Remote Access • Choice of two VPN clients: • Endpoint Connect • Smart connection, whatever the network or connectivity challenges • Transparent “in the office” user experience • Embedded hot-spot handling • 32- and 64-bit client support • Legacy SecureClient • Ensuring topology and deployment compatibility
Endpoint Security R73 – New features • Support of Windows 7 • New Anti Malware engine • ME new features • Serial ID device filtering • Nero v9+ support for CD/DVD encryption • Local File & Folder Encryption • FDE • Support of IRRT enabledlaptops (Dell E-Series) • Improved client-side performance
Fast User Experience Lowest CPU and Memory Utilization CheckPoint Symantec McAfee CheckPoint Symantec McAfee 130 - 100 - 70 - 40 - 10 - 175 - 160 - 145 - 130 - 115 - Megabytes Seconds Memory footprint System Boot Time Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs
Fast User Experience Fastest Anti-malware Scan Time CheckPoint CheckPoint 1600 - 1200 - 800 - 400 - 0 - 1600 - 1200 - 800 - 400 - 0 - Seconds Seconds McAfee Symantec McAfee Anti-malware RECURRING scan time Anti-malware INITIAL scan time Symantec Anti-malware tests on Windows 7 Source: Check Point Labs
Endpoint Security R73 HFA1 – What's new • Support of Windows Server 2003 and 2008 32bit • FDE new features • Supports latestintel chipset • Supports hibernation on 64bits OS • ME new features • Encrypted client-side logs & profiles • Temp folder drive/location definition • Remote Help for non-AD users • WebRH • AD integration • Support of SQL Server 2008 • SA new features • Server Support for Anti-malware • Check Point R71 management support
Abra R70 • Turn any PC into a corporate desktop • USB-based form factor with HW/SW encryption • Requires no admin, host OS, or reboot • On- and off-line working modes supported • Keep mobile data secure • Secure Workspace isolates/protects data from host • Central SW policy controls applications & features • Maintain secure connectivity • Provide flexible, secure access to corporate resources, info repositories, and applications • Leverage existing CP gateway protections/features
Mobile Clients • VPN client is available on the following platforms: • Windows Mobile • Symbian • And now iPhone (SecureConnect) • Encryption is available on the following: • Windows Mobile • Symbian
Agenda 1 2 3 Background: Current Endpoint Portfolio Looking Forward: Endpoint Security R80 Conclusion
R80 Evolution R8x 2,5 years of development R80 Unified Management Project R7x R73 / HFA1 R71 / R72 Unified Client Project R70 Pointsec Acquisition ZoneLabs Acquisition 2004 2008 2009 2010 2007
A new era in Endpoint Security! Coming Soon Q4 FDE Central Management Simple, Flexible Enhanced Monitoring ME
R80: Unique Core Values • TrulyUnified Management • Organization-centric Management • Simple, efficient policydefinition • Flexible client deployment • Enhanced Monitoring • Leveraging CP Infrastructure • Comprehensive & Innovative
R80: Truly Unified Management • All endpoint blades and policies managed from the same place • Consistent look and feel • No nested admin console • One component to install
R80: Organization-Centric Management • Assignment Policy Model based on organization • Policies can be assigned based on connectivity state and/or compliance level • Leverage current AD architecture to manage & monitor endpoints
R80: Simple, Efficient Policy Definition • Best practice out of the box policies protect endpoints quickly • Advanced configuration options always available for added granularity
R80: Flexible Client Deployment • Ability to create MSI package for deployment • Device Agent only or featured package • Full handling of client deployment based on policy
R80: Enhanced Monitoring • Full view on current endpoint status and events • Customizable & Exportable • Adaptable Drill-down reporting based on organization level
R80: Leveraging CP Infrastructure • Combined Network & Endpoint Log Management provides total security view – useful for compliance • Sharing of Network Objects and Administration provides stronger, simpler security
R80: Comprehensive and Innovative • Comprehensivefeatures: Media Encryption, Integrated FW, Integrated VPN, and Data Security • Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebChecksecurebrowsing
Agenda 1 2 3 Background: Current Endpoint Portfolio Looking Forward: Endpoint Security R80 Conclusion
Conclusion • Check Point continues to improveits portfolio withinnovative and performant solutions • R73, Abra, SecureConnect for iPhone • Laterthisyear, R80 willbring us to a new way of managing Endpoint Security • Afterbeing the first one to release a (really) unified client to the market, no doubtthatwewillbe the first one to release a (really) unified management