endpoint security management r80 customer presentation

19
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Simplifying Endpoint Security Management Jordi Medina Torregrosa Endpoint BDM for Iberia [email protected]

Upload: jordimedina

Post on 13-Dec-2014

1.142 views

Category:

Technology


1 download

DESCRIPTION

Endpoint Security Management R80 Customer Presentation

TRANSCRIPT

Page 1: Endpoint Security Management R80 Customer Presentation

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Simplifying Endpoint Security Management

Jordi Medina Torregrosa

Endpoint BDM for Iberia

[email protected]

Page 2: Endpoint Security Management R80 Customer Presentation

2 2 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Security Management Today

Difficult to administrate, support and manage

Limited visibility into security

Increasing Endpoints per user

Assorted Endpoints per user

Multiple vendors

Multiple Endpoint Security Products

Page 3: Endpoint Security Management R80 Customer Presentation

3 3 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

IT Managers’ opposing objectives

Endpoint Security Management Challenge

Maximize end-user

productivity

Effectively manage

the complexity

Mobile users on

multiple machines

Multiple capabilities to

protect endpoint and

ensure compliance

Protect end users and

corporate from threats

Visibility and control

of policy

Page 4: Endpoint Security Management R80 Customer Presentation

4 4 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unified Security Endpoint Management

Check Point Simplifies Endpoint Security Management

Manage Security of Users,

Not Just Machines

Unique Visibility and Control

Unified Endpoint

Security Management

Page 5: Endpoint Security Management R80 Customer Presentation

5 5 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Simplifies Endpoint Security Management

Unified Endpoint

Security

management

Page 6: Endpoint Security Management R80 Customer Presentation

6 6 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unified Endpoint Security

Unify all endpoint security protection in a single management console and server

Full Disk

Encryption

Media

Encryption

Remote

Access

WebCheck Firewall/

Compliance Check Anti-Malware/

Program Control

Page 7: Endpoint Security Management R80 Customer Presentation

7 7 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Comprehensive Security on the Endpoint

Protect against drive-by-downloads,

phishing sites and zero-day attacks

Stop unwanted traffic, prevent malware

and block targeted attacks

Automatically and transparently secure

all information on endpoint hard drives

Centrally enforceable encryption of

removable media and port control

Protects your endpoint from unsecure,

malicious and unwanted applications

Provide secure, seamless access to

corporate networks remotely

Page 8: Endpoint Security Management R80 Customer Presentation

8 8 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Simplifies Endpoint Security Management

Get Unique

Visibility and

Control

Page 9: Endpoint Security Management R80 Customer Presentation

9 9 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unique Visibility and Control

Monitor… Manage… Enforce…

…everything that’s

important to you

…policy and exceptions

on the fly

…compliance before the

network is accessed

Page 10: Endpoint Security Management R80 Customer Presentation

10 10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unique Visibility and Control

View all policies

in use

Summarized

infection

reporting

Filter compliance

report by groups

or networks

View all

endpoint

connectivity

View all latest

updates

Monitor with customizable, at-a-glance dashboard

Page 11: Endpoint Security Management R80 Customer Presentation

11 11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unique Visibility and Control

Manage all levels of the organization —

down to users and machines

Rose’s laptop Rose’s desktop

High-level view

Organizations

Users

Machines

Seamless Active Directory Integration

Adam Phillip Rose

Finance Sales HR Engineering

My organization

Page 12: Endpoint Security Management R80 Customer Presentation

12 12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unique Visibility and Control

Enforce and remediate endpoint compliance

Correct endpoint

security modules?

Updated OS

service pack?

Approved

applications only?

Updated anti-

malware version?

Verify

Restrict

Access

Allow

Access

Remediate

YES

NO

Page 13: Endpoint Security Management R80 Customer Presentation

13 13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unique Visibility and Control

HR Finance

Quickly deploy the right level of protection

for the right group

Page 14: Endpoint Security Management R80 Customer Presentation

14 14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Simplifies Endpoint Security Management

Manage Security

of Users, Not

Just Machines

Page 15: Endpoint Security Management R80 Customer Presentation

15 15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

HR machines have

many users

Manage Security of Users, Not Just Machines

Security policy follows the user

Rose has many

machines

Page 16: Endpoint Security Management R80 Customer Presentation

16 16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Drill down on groups, users and

all their machines in a few clicks

Manage Security of Users, Not Just Machines

Quickly

determine

Rose’s status

Search or click AD to

investigate group or

user status

Find Rose’s

machines

quickly View Rose’s

policies

Page 17: Endpoint Security Management R80 Customer Presentation

17 17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Manage Security of Users, Not Just Machines

Easily modify security policy

Page 18: Endpoint Security Management R80 Customer Presentation

18 18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Unified Security Endpoint Management

Check Point Simplifies Endpoint Security Management

Manage Security of Users,

Not Just Machines

Unique Visibility and Control

Unified Endpoint

Security Management

Page 19: Endpoint Security Management R80 Customer Presentation

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Thank You!