a changing world

19
©2004 Check Point Software Technologies Ltd. Proprietary & Confiden IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies

Upload: reina

Post on 09-Jan-2016

24 views

Category:

Documents


2 download

DESCRIPTION

IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies. A Changing World. 2004. Security threats. Worst Year On Record. Internet reliance. 1993. 1996. 2000. 2003. 2004. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

IDG CIO GovernmentSecuring Information Assets:

Architecture, Not Devices!

Scott FergusonRegional Director ANZCheck Point Software Technologies

Page 2: A Changing World

2©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

A Changing World

1993 2003

Internet reliance

Security threats

1996 2000

Worst Year On Record

2004

2004

Page 3: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

2004’s Top Security Concerns

Security: Still A Challenge!

New Constituents; Web Services;

Partner Web Access; WLAN; Remote

EmployeesNew, Dynamic & Blended

Security Threats

IT Budgets need to stay productivity focused

Security Breach:Network Downtime,

Lost Revenue, Regulatory

Commitments, Damage to Corporate Reputation

Dedicated Security Resources are Limited

Page 4: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Why is Security such a Big Challenge?

In a connected world everyone is a target Attacks spread quickly Multitude of distributed systems to protect (and

connect) Multiple disparate technologies to implement

and manageWeb

Server

Exponential ManagementComplexity

Page 5: A Changing World

5©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

Industry Trends - Enterprises

Resource Limitations 5-5.5% of IT budget

designated for security Average of 1 full-time

security employee/1,000 users

Top Security Concerns: Protection of company/

private information Protection against financial

losses Need for customer and

supplier confidence Concerns around internal

network/system security Use of Web services Shareholder confidence

Increased Risk 84% suffer operational or

financial losses Application level attacks

highest consequences Current security system

shortcomings– Depth of protection– Management complexity

Sources:Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003Vanson Bourne, The Global IT Security Report, 2003

Page 6: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Australia’s Position

Relaxed culture, plague of set and forget strategies that are not sufficient

Point products permeate Complexity = complacency Behind the 8-ball (especially the mid-tier) Lag behind US, Europe, Asia Pac and

NZ in management involvement Opportunity For Change!

Page 7: A Changing World

7©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

Risks to Your Infrastructure

InternalSecurity

WebSecurity

(Web protection andaccess control)

PerimeterSecurity

Worms/viruses LAN exposure Access abuse Unpatched systems

• Expanding perimeter• Sophisticated attacks• Application-level attacks

• Increased Webdependence • Secure access• Web serverexposure

Page 8: A Changing World

8©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

Options in Today’s Market

InternalSecurity

WebSecurity

PerimeterSecurity

App Specific

Personal FW

HIDS

NIDS

SSL VPNs

SSO

Portal

Web FW

VPN

Authentication

App Firewall

NW FirewallMultiple Technologies,Inconsistent and Disparate

Management Systems

Page 9: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Stateful Inspection/

FireWall-1

Stateful Inspection/

FireWall-1

1993

OPSECOPSEC

1997

VPN-1VPN-1

1998

Next GenerationNext Generation

2001

SmartDefenseSmartDefense

2002

Application IntelligenceApplication Intelligence

2003 2004

EAL 4 EAL 4+Check Point: security is our focusCheck Point: security is our focus

A History of Innovation

1994 1995 1996 1999 2000

Page 10: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Architecture – What does it mean?

1. The art or science of building (Webster)

2. The way in which anything is physically constructed or designed (Cambridge)

3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com)

4. (Vendors) Anything with our brand

Page 11: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Architecture Not Devices

People

Culture

+Behaviour

+Education

Process

Policy

Publication+

Review

Technology

Deployment of multiple technologies

+Integrate

+ Single Management

+ Scale (from the

mobile phone PDA and Laptop)

Page 12: A Changing World

12©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

Architecture Not Devices

SMARTmanagement

Worry-freeprotection

Intelligent Security Solutions

Perimeter

In-depth inspection

Inte

rnal W

eb

Page 13: A Changing World

13©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

Architecture Not Devices

InteroperabilityTrend MicroSurfControlSun Micro

CitrixTivoliNortel

Nokia

+171 Other product sets

Integrated Management & Reporting

CP Multiple, Market Leading Technologies

OP

SE

C

Page 14: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Managing Security with IntelligenceManaging Security with Intelligence

Enforce SecurityDefine Policy

Monitor & ReportAnalyze & Change

IntelligentSecurity Lifecycle

Page 15: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Security Management Life Cycle

Security Management

Life Cycle

Define Policy• Easy-to-use Graphical interface• Graphical policy visualization

Monitor & Report• Real-time monitoring• Instant status of all security elements• Automatic reports

Analyze & Change• Detailed logging

Enforce Security• Stateful Inspection• Application Intelligence

SMART Management

Your Goal:

Lowest Total Cost of OwnershipLowest Total Cost of Ownership - Automated administrative tasks - Automated administrative tasks save time and money save time and money

- Centralised information database - Centralised information database minimises capital expenditures minimises capital expenditures

Page 16: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Architecture Not Devices

Protect investments Enhance client relationships through IT

enablement Allow you to focus on your business, not

on IT Increase productivity

SMARTmanagement

Worry-freeprotection

Intelligent Security Solutions

Perimeter

In-depth inspection

Inte

rnal W

eb

Page 17: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Moving Forward:Deeper, Broader, Smarter Security

Broader deployments gateways, switches, clients, servers desktop, handheld

Smarter security management,integrated management tools, event analysis and correlation

Deeper content analysis, multi-layer analysis, application specific

Page 18: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Summary

Intelligently Managed Security Process Perimeter, Internal and Web Security

– Broader, Deeper, Smarter

1993 2003

Internet reliance Security threats

1996 2000

Security Technology

Evolution

Intelligent SecuritySolutions

FireW

all-1VPN-1

2005

Page 19: A Changing World

©2004 Check Point Software Technologies Ltd. Proprietary & Confidential

Architecture Not Devices

Visit the Check Point Stand and register for a free evaluation kit