staying one step ahead in cyber security
TRANSCRIPT
©2016 Check Point Software Technologies Ltd. 1 ©2016 Check Point Software Technologies Ltd.
Petr Kadrmas | SE Eastern Europe Check Point Software Technologies
STAYING ONE STEP AHEAD IN
CYBER SECURITY
R80 & Check Point Appliances
©2016 Check Point Software Technologies Ltd. 2
With R80 Management
BUILDING THE SECURITY
FOR THE FUTURE
ONE STEP AHEAD
©2015 Check Point Software Technologies Ltd.
©2016 Check Point Software Technologies Ltd. 3
Managing Security Today is COMPLEX
P E O P L E
Fewer
resources
More tickets
Greater
expertise
P R O C E S S
Manual
processes
Multiple
security
solutions
Lack of
integration
T E C H N O L O G Y
Mobile
Cloud
On-Demand
Services
©2016 Check Point Software Technologies Ltd. 4
Integrated Threat
Management
Efficient, Automated
Operations Unified Policy
THE PLATFORM TO CONSOLIDATE ALL YOUR SECURITY
©2016 Check Point Software Technologies Ltd. 5
One Policy to Manage Everything
Users Devices Applications Data Gateways Private Cloud Public Cloud Virtual GW
©2016 Check Point Software Technologies Ltd. 6
Easily Segment Policy for Better Manageability and Control
Each policy segment can be delegated
to distribute workload
Walter
Ann
Duties separated based on IT role
©2016 Check Point Software Technologies Ltd. 7
Admin Concurrency Increases Team Productivity
Ann
Walter
Ann logs in, sees rule 3 locked
Walter logs in, works on rule 3
Ann works on rule 2
Multiple admins can work on same policy without conflict
©2016 Check Point Software Technologies Ltd. 8
Task-Oriented Features Increase Efficiency
With one click, access all associated logs and rule details
©2016 Check Point Software Technologies Ltd. 9
Smart APIs enable trusted integrations across your IT ecosystem
SDN
Ticketing
Provisioning
Network Management
Cloud Orchestration
©2016 Check Point Software Technologies Ltd. 10
Secure Documented
API and Orchestration BUILT FOR AUTOMATION
Open and complete API used as Web Service or CLI for orchestration
Strict Permissions
Control privileges to access the system
Automation access limited
Do not allow modification of entire rule base, limit to controlled layers
©2016 Check Point Software Technologies Ltd. 12
Investigate the Threat
[Protected] Non-confidential content
©2016 Check Point Software Technologies Ltd. 13
From View to Action
Respond to security incidents immediately
and prevent the next attack
©2016 Check Point Software Technologies Ltd. 15
Easily Customize Your Reports
Management Helpdesk Auditor
Accessible from any device
©2016 Check Point Software Technologies Ltd. 16
95% of security breaches could have been
prevented by the correct configuration
of security products
Gartner Compliance Overview Showing the customer how
their Check Point products
should be configured
Security Best Practices
©2016 Check Point Software Technologies Ltd. 17
With New SECURITY APPLIANCES
for customer of ANY SIZE
ONE STEP AHEAD
©2015 Check Point Software Technologies Ltd.
©2016 Check Point Software Technologies Ltd. 18
Next Generation Security Challenges
[Restricted] ONLY for designated groups and individuals
Advanced
Threats
Require
More Security
Growing
HTTPS
encrypted
traffic
Increasing
Data Rates and
Volumes
©2016 Check Point Software Technologies Ltd. 19
Addressing the Challenges
[Restricted] ONLY for designated groups and individuals
Advanced
Threats
Require
More Security
Growing
HTTPS
encrypted
traffic
Increasing
Data Rates and
Volumes
Inspect your
entire
encrypted
traffic (SSL)
Activate the
most advanced
Threat
Prevention
Stronger, Faster
and Future
Proof !
©2016 Check Point Software Technologies Ltd. 20
FULL RANGE OF MOST ADVANCED THREAT PREVENTION
Check Point New Security Appliances
[Restricted] ONLY for designated groups and individuals
Datacenters &
High End
Enterprises
23000 Appliances
(2 models)
Enterprises
15000 Appliances
(2 models)
Small Enterprises
5000 Appliances
(4 models)
Small, Remote Office –
Desktop
3200 Appliance
1400 Appliances
(4 models)
©2016 Check Point Software Technologies Ltd. 21
APPLIANCES DESIGNED TO ENABLE
Inspect your entire encrypted traffic
(SSL)
Stronger and Future Proof !
Activate the most Advanced
Threat Prevention
©2016 Check Point Software Technologies Ltd. 22
APPLIANCES DESIGNED TO ENABLE
Activate the most Advanced
Threat Prevention
Inspect your entire encrypted traffic
(SSL)
Stronger and Future Proof !
©2016 Check Point Software Technologies Ltd. 23
Now You Can Turn On Maximum Protection
[Restricted] ONLY for designated groups and individuals
Threat Prevention Threat Prevention
MAX Protection MIN Protection
©2016 Check Point Software Technologies Ltd. 24 [Restricted] ONLY for designated groups and individuals
NGFW Threat
Prevention
0
50
100
150
200
250
300
Mb
ps
(P
rod
. T
raff
ic)
NGFW Threat
Prevention
0
400
800
1200
1600
Mb
ps
(P
rod
. T
raff
ic)
4400 5200 12400 15400
Shift Gears to Maximum Protection! NGTP – Next Generation Threat Prevention (Firewall, IPS, Anti Virus, Anti Bot, Appl Ctrl, URL Filtering)
Activate FULL Threat Prevention with no Degradation
©2016 Check Point Software Technologies Ltd. 25 [Restricted] ONLY for designated groups and individuals
NGTP
NGTX
0
50
100
150
200
250
300
350
Mb
ps
(P
rod
. T
raff
ic)
NGTP NGTX
0
400
800
1200
1600
2000
2400
Mb
ps
(P
rod
. T
raff
ic)
4600 5400 13500 15600
Including the most advanced Zero Day Protection
NGTX – Next Generation Threat Extraction (NGTP + Threat Extraction + Threat Emulation)
©2016 Check Point Software Technologies Ltd. 26
APPLIANCES DESIGNED TO ENABLE
Activate the most Advanced
Threat Prevention
Inspect your entire encrypted traffic
(SSL)
Stronger and Future Proof !
©2016 Check Point Software Technologies Ltd. 27 [Restricted] ONLY for designated groups and individuals
HTTPS
85%
HTTPS
(SSL)
0%
Now You Can Inspect Your Entire Encrypted Traffic (SSL)
©2016 Check Point Software Technologies Ltd. 28
Optimized for Maximum Inspection of Encrypted Traffic (SSL)
[Restricted] ONLY for designated groups and individuals
HTTP
HTTP
HTTPS (SSL)
0
20
40
60
80
100
120
140
Mb
ps (
NG
TP
)
Higher Performance even with 85% SSL Inspection
5200 4400
0%
85%
HTTP
HTTP
HTTPS (SSL)
0
100
200
300
400
500
600
Mb
ps (
NG
TP
)
85%
5800 12400 * Outbound Traffic
©2016 Check Point Software Technologies Ltd. 29
APPLIANCES DESIGNED TO ENABLE
Activate the most Advanced
Threat Prevention
Inspect your entire encrypted traffic
(SSL)
Stronger and Future Proof !
©2016 Check Point Software Technologies Ltd. 30
Future Proof
[Restricted] ONLY for designated groups and individuals
40G Expansion Cards Acceleration Card-Ready for most Models
SSD Optional Drives
©2016 Check Point Software Technologies Ltd. 31
Appliances for any enterprise size
[Restricted] ONLY for designated groups and individuals
3200
Appliance
5000
Appliances
(4 models)
15000
Appliances
(2 models)
23000
Appliances
(2 models)
3200 5200 5400 5600 5800 15400 15600 23500 23800
140 250 330 540 1000 1500 2200 2900 3600
NGTP throughput (Mbps):
©2016 Check Point Software Technologies Ltd. 32
Appliances for Small & Home Office
[Restricted] ONLY for designated groups and individuals
1430 & 1450
Appliance (8 ports)
1430 1450 1470 1490
1470 & 1490
Appliance (18 ports)
©2016 Check Point Software Technologies Ltd. 33
Check Point
1400 Appliances
Featuring Central management and up to 220Mbps real-world throughput
with all threat prevention on
ENTERPRISE-GRADE SECURITY
Big Security for a Small Office
[Protected] Non-confidential content
* available during H2’2016
*
NGTP
©2016 Check Point Software Technologies Ltd. 34
Check Point 1400 Series Appliances
1430 1450 1470 1490
Firewall Throughput 900 Mbps 1100 Mbps 1600 Mbps 1800 Mbps
Threat Prevention throughput 90 Mbps 150 Mbps 175 Mbps 220 Mbps
Network ports 8 x 1Gbe Copper 18 x 1Gbe Copper, 1 x SFP
Wifi (optional) 802.11 b/g/n/ac 802.11 n/ac and 802.11 b/g/n
VDSL* (optional) Yes Yes
Power over Ethernet* (optional) N/A Yes
Starting Price $799 $1,299 $1,999 $2,899
[Protected] Non-confidential content
* available H2 2016
©2016 Check Point Software Technologies Ltd. 35 [Protected] Non-confidential content
Big Secur i t y fo r SMB…
C H E C K P O I N T 7 0 0 S E R I E S
Advanced Security, Uncompromising Performance
©2016 Check Point Software Technologies Ltd. 36
730/750 Appliances
[Protected] Non-confidential content
Up to 200Mbps Threat Prevention
802.11ac WiFi
©2016 Check Point Software Technologies Ltd. 37
770/790 Appliances
[Protected] Non-confidential content
Up to 330Mbps Threat Prevention
802.11ac and 802.11n WiFi
©2016 Check Point Software Technologies Ltd. 38
Check Point
700 Appliances
Same security in the 700 appliances as used to protect large organizations
ENTERPRISE-GRADE SECURITY
Big Security. Small Size.
[Protected] Non-confidential content
* available during H2’2016
*
Firewall
VPN IPS
Anti-Spam
URLF
Anti-Virus App Control
Anti-Bot
©2016 Check Point Software Technologies Ltd. 39
The Security and Control You Need
[Protected] Non-confidential content
Protects you from
hackers trying to
access your network
Have visibility and
control on how
internet is used
Securely and privately
access your data
from anywhere
©2016 Check Point Software Technologies Ltd. 40
Check Point 700 Series Appliances
730 750 770 790
Firewall Throughput 900 Mbps 1100 Mbps 1600 Mbps 1800 Mbps
Threat Prevention throughput 100 Mbps 200 Mbps 270 Mbps 330 Mbps
Network ports 8 x 1Gbe Copper 18 x 1Gbe Copper, 1 x SFP
Wifi (optional) 802.11 b/g/n/ac 802.11 n/ac and 802.11 b/g/n
VDSL* (optional) Yes Yes
Power over Ethernet* (optional) N/A Yes
Starting Price $499 $799 $1,299 $1,999
[Protected] Non-confidential content
* available H2 2016