190 likes | 295 Views
IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies. A Changing World. 2004. Security threats. Worst Year On Record. Internet reliance. 1993. 1996. 2000. 2003. 2004.
E N D
IDG CIO GovernmentSecuring Information Assets:Architecture, Not Devices!Scott FergusonRegional Director ANZCheck Point Software Technologies
A Changing World 2004 Security threats Worst Year On Record Internet reliance 1993 1996 2000 2003 2004
New Constituents; Web Services; Partner Web Access; WLAN; Remote Employees Security Breach: Network Downtime, Lost Revenue, Regulatory Commitments, Damage to Corporate Reputation New, Dynamic & Blended Security Threats IT Budgets need to stay productivity focused Dedicated Security Resources are Limited 2004’s Top Security Concerns Security: Still A Challenge!
Why is Security such a Big Challenge? • In a connected world everyone is a target • Attacks spread quickly • Multitude of distributed systems to protect (and connect) • Multiple disparate technologies to implement and manage • Exponential ManagementComplexity Web Server
Industry Trends - Enterprises Resource Limitations 5-5.5% of IT budget designated for security Average of 1 full-time security employee/1,000 users Top Security Concerns: Protection of company/ private information Protection against financial losses Need for customer and supplier confidence Concerns around internal network/system security Use of Web services Shareholder confidence Increased Risk • 84% suffer operational or financial losses • Application level attacks highest consequences • Current security system shortcomings • Depth of protection • Management complexity Sources: Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003 Vanson Bourne, The Global IT Security Report, 2003
Australia’s Position • Relaxed culture, plague of set and forget strategies that are not sufficient • Point products permeate • Complexity = complacency • Behind the 8-ball (especially the mid-tier) • Lag behind US, Europe, Asia Pac and NZ in management involvement • Opportunity For Change!
Risks to Your Infrastructure PerimeterSecurity InternalSecurity WebSecurity (Web protection andaccess control) • Worms/viruses • LAN exposure • Access abuse • Unpatched systems • Expanding • perimeter • Sophisticated • attacks • Application-level • attacks • Increased Web • dependence • Secure access • Web server • exposure
Options in Today’s Market PerimeterSecurity InternalSecurity WebSecurity NW Firewall NIDS SSO Multiple Technologies, Inconsistent and Disparate Management Systems SSL VPNs App Firewall HIDS VPN App Specific Portal Authentication Personal FW Web FW
Stateful Inspection/ FireWall-1 VPN-1 SmartDefense OPSEC Next Generation Application Intelligence 2002 2001 2003 2004 EAL 4 EAL 4+ 1993 1997 1998 1999 2000 1994 1995 1996 A History of Innovation Check Point: security is our focus
Architecture – What does it mean? • 1. The art or science of building (Webster) • 2. The way in which anything is physically constructed or designed (Cambridge) • 3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com) • 4. (Vendors) Anything with our brand
Architecture Not Devices Process Policy Publication + Review People Culture + Behaviour + Education Technology Deployment of multiple technologies + Integrate + Single Management + Scale (from the mobile phone PDA and Laptop)
In-depth inspection SMART management Intelligent Security Solutions Worry-free protection Internal Web Perimeter Architecture Not Devices
Architecture Not Devices CP Multiple, Market Leading Technologies Integrated Management & Reporting Trend MicroSurfControlSun Micro Nokia +171 Other product sets CitrixTivoliNortel Interoperability OPSEC
Managing Security with Intelligence Define Policy Enforce Security IntelligentSecurity Lifecycle Analyze & Change Monitor & Report
SMART Management Security Management Life Cycle Your Goal: Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralised information database minimises capital expenditures • Define Policy • Easy-to-use Graphical interface • Graphical policy visualization • Enforce Security • Stateful Inspection • Application Intelligence Security Management Life Cycle • Monitor & Report • Real-time monitoring • Instant status of all • security elements • Automatic reports • Analyze & Change • Detailed logging
In-depth inspection SMART management Intelligent Security Solutions Worry-free protection Internal Web Perimeter Architecture Not Devices • Protect investments • Enhance client relationships through IT enablement • Allow you to focus on your business, not on IT • Increase productivity
Moving Forward:Deeper, Broader, Smarter Security Deeper content analysis, multi-layer analysis, application specific Broader deployments gateways, switches, clients, servers desktop, handheld Smarter security management, integrated management tools, event analysis and correlation
Summary • Intelligently Managed Security Process • Perimeter, Internal and Web Security • Broader, Deeper, Smarter Intelligent Security Solutions Security Technology Evolution VPN-1 Internet reliance Security threats FireWall-1 1993 1996 2003 2005 2000
Architecture Not DevicesVisit the Check Point Stand and register for a free evaluation kit