[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved....
-
date post
19-Dec-2015 -
Category
Documents
-
view
222 -
download
1
Transcript of [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved....
[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
puresecurity™
Check Point Total SecurityBezpieczne sieci, stacje robocze, aplikacje i dane
Check Point Total SecurityBezpieczne sieci, stacje robocze, aplikacje i dane
Michał Jarski
Country MangerPoland Romania & Bulgaria
2[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Impossible to manage
Complicated
Complex
Too many vendors
The customer environment…The customer environment…
Network security
Data security
* Prepared May 2007,Data based on our subjective assessment,Size of bubble represents relative size,Data not accurate, nor conclusive.
Endpoint security
Iden
tity,
Acc
ess
Man
agem
ent
Authorization,
Authentication
Security
management
Thr
eat
man
agem
ent
Can such Can such complexity complexity
deliver a deliver a high level of high level of
security?security?
3[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Introducing…Introducing…
Network &Gateways
Data &Endpoint
MANAGEMENT
totalsecurity from Check Point
4[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Check Point 2008Check Point 2008
Most scalable
“Total security” solutions
From $150to
20Gbps
All protections,one package
one pricefor 3 years
12
Th
rou
gh
pu
t (G
bp
s)
M8
Price
0.2
4
SMBSMB Mid MarketMid Market
7
2.4
1.2
0.4
Safe@Office
UTM-1 Edge
UTM-1 450
UTM-1 1050
UTM-1 2050
M2
M6
Enterprise Integrated Appliances
Enterprise Integrated Appliances
VirtualizedSolutions (VSX)
VirtualizedSolutions (VSX)
12
Th
rou
gh
pu
t (G
bp
s)
M8
Price
0.2
4
SMBSMB Mid MarketMid Market
7
2.4
1.2
0.4
Safe@Office
UTM-1 Edge
UTM-1 450
UTM-1 1050
UTM-1 2050
M2
M6
Enterprise Integrated Appliances
Enterprise Integrated Appliances
VirtualizedSolutions (VSX)
VirtualizedSolutions (VSX)
Only from Check Point
Unified Gateways
20
5[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Introducing the industry’s only single solution for endpoint security
Firewall / NAC / program control
Anti-virus / anti-spyware
Data security
Remote access / VPN
Replaces multiple vendorswith a single, simple solution
Lower deployment cost
Better security
Single endpoint security agent
Coming now!
Check Point 2008Check Point 2008
Only from Check Point
6[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Network gateways
Remote access
Endpoint PCs
Data security
Network gateways
Remote access
Endpoint PCs
Data security
Policy definition
Deployment
Provisioning
Monitoring
Reporting
Compliance
Auditing
Policy definition
Deployment
Provisioning
Monitoring
Reporting
Compliance
Auditing
Check Point 2008Check Point 2008
Single security
management console
Only from Check Point
[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
puresecurity™
Check Point Total Security GatewaysCheck Point Total Security Gateways
8[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Check Point – Q12008Check Point – Q12008
Most scalableFrom $150
to20Gbps
12
Th
rou
gh
pu
t (G
bp
s)
M8
Price
0.2
4
SMBSMB Mid MarketMid Market
7
2.4
1.2
0.4
Safe@Office
UTM-1 Edge
UTM-1 450
UTM-1 1050
UTM-1 2050
M2
M6
Enterprise Integrated Appliances
Enterprise Integrated Appliances
VirtualizedSolutions (VSX)
VirtualizedSolutions (VSX)
12
Th
rou
gh
pu
t (G
bp
s)
M8
Price
0.2
4
SMBSMB Mid MarketMid Market
7
2.4
1.2
0.4
Safe@Office
UTM-1 Edge
UTM-1 450
UTM-1 1050
UTM-1 2050
M2
M6
Enterprise Integrated Appliances
Enterprise Integrated Appliances
VirtualizedSolutions (VSX)
VirtualizedSolutions (VSX)
Unified Gateways
20
9[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
List Price
12
0.2
Current Appliance CoverageCurrent Appliance Coverage
4
SmallOffice / Branch
SmallOffice / Branch
SMB /Medium Branch
SMB /Medium Branch
$5K $20K $40K
Enterprise Perimeter / Core /Large Branch
Enterprise Perimeter / Core /Large Branch
7
2.4
1.2
0.4
$15K $35K$10K $30K$25K$2.5K
UTM-1 1050TS 1 year
UTM-1 2050TS 1 year
FW
Th
rou
gh
pu
t (G
bp
s)
The Need:Lower UTM
Models
The Need:Lower UTM
Models
UTM-1 Edge
UTM-1 450TS 1 year
The Need: High-End Turnkey Solutions
The Need: High-End Turnkey Solutions
M2
M6
M8
CustomSolutions
10[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
The Solution – New Appliance OptionsThe Solution – New Appliance Options
Streamlined DeploymentStreamlined Deployment
Single Vendor Solution
Streamlined Administration
Streamlined Administration
SmartCenter Support
Greater ChoiceGreater Choice Additional Platform Options
Record Price/Performance
Record Price/Performance
Highest Security, under $4/ Mbps
11[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Introducing Power-1 AppliancesIntroducing Power-1 Appliances
Record price/performance– Under $4US/Mbps
High Performance, High Security– Gateway throughput up to 14 Gbps
– Intrusion prevention throughput up to 6 Gbps
Streamlined deployment of enterprise security– Hardware/software solution from single vendor
High Security for High Performance Environments
Power-1 5070 Power-1 9070
12[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
New entry level model and increased performance range
3 new UTM-1 Total Security appliances 3 new UTM-1 Total Security appliances
Introduces new entry level model under $5,000 Delivers high performance from 400 Mbps to over 4 Gbps Comprehensive security
Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam
All-inclusive security updates for up to three years Built-in centralized management for multiple sites
UTM-1 270 UTM-1 570 UTM-1 3070
13[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved. List Price
12
0.2
The Expanded Appliance LineThe Expanded Appliance Line
4FW
Th
rou
gh
pu
t (G
bp
s)
SmallOffice / Branch
SmallOffice / Branch
SMB /Medium Branch
SMB /Medium Branch
$5K $20K $55K
Enterprise Perimeter / Core /Large Branch
Enterprise Perimeter / Core /Large Branch
7
2.4
1.2
0.4
UTM-1 Edge X32
$15K $45K$10K $35K$25K$2.5K
UTM-1 270
UTM-1 570
UTM-1 3070
UTM-1 450
UTM-1 1050
UTM-1 2050
M2
M6
M8Power-1 5070
Power-1 9070
14[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Power-1 Appliance SpecificationsPower-1 Appliance Specifications
Power-1 5070 Power-1 9070
Software Edition NGX R65 Power NGX R65 Power
10/100/1000 Ports 8/12 12/16
Firewall Throughput 9 Gbps 14 Gbps
VPN Throughput 2.4 Gbps 3.7 Gbps
Concurrent Sessions 1.1 Million 1.1 Million
VLANs 256 256
Intrusion Prevention 4.5 Gbps 6.1 Gbps
Storage Capacity 160 Gb 2 X 160 Gb
Security Acceleration Yes Yes
List Price $36,500 $49,500
15[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Advanced Acceleration TechnologiesAdvanced Acceleration Technologies
Accelerated SmartDefenseIntegrated Intrusion PreventionAccelerated SmartDefenseIntegrated Intrusion Prevention
16[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved. List Price
12
0.2
The Expanded Appliance LineThe Expanded Appliance Line
4FW
Th
rou
gh
pu
t (G
bp
s)
SmallOffice / Branch
SmallOffice / Branch
SMB /Medium Branch
SMB /Medium Branch
$5K $20K $55K
Enterprise Perimeter / Core /Large Branch
Enterprise Perimeter / Core /Large Branch
7
2.4
1.2
0.4
UTM-1 Edge X32
$15K $45K$10K $35K$25K$2.5K
UTM-1 270
UTM-1 570
UTM-1 3070
UTM-1 450
UTM-1 1050
UTM-1 2050
M2
M6
M8Power-1 5070
Power-1 9070
17[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
New entry level model and increased performance range
3 new UTM-1 Total Security appliances 3 new UTM-1 Total Security appliances
Introduces new entry level model under $5,000 Delivers high performance from 400 Mbps to over 4 Gbps Comprehensive security
Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam
All-inclusive security updates for up to three years Built-in centralized management for multiple sites
UTM-1 270 UTM-1 570 UTM-1 3070
18[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
UTM-1 Appliance SpecificationsUTM-1 Appliance Specifications
UTM-1 270 UTM-450 UTM-1 570 UTM-1 1050 UTM-1 2050 UTM-1 3070
Software Edition NGX R65 NGX R65 NGX R65 NGX R65 NGX R65 NGX R65
10/100 Ports - - - 4 4 -
10/100/1000 Ports 4 4 4 4 4 10
Firewall Throughput 400 Mbps 400 Mbps 1.1 Gbps 1.2 Gbps 2.4 Gbps 4.5 Gbps
VPN Throughput 100 Mbps 200 Mbps 250 Mbps 220 Mbps 380 Mbps 1.1 Gbps
Concurrent Sessions 400,000 700,000 500,000 800,000 1.1 Million 1.1 Million
VLANs 256 256 256 256 256 256
Storage Capacity 160 Gbps 80 Gbps 160 Gbps 80 Gbps 80 Gbps 160 Gbps
Managed Sites 2 3 3 3 5 5
List Price $4,800 $7,500 $8,500 $13,000 $17,000 $24,000
19[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Programs SLA - unit replacementVariety of options to choose from
HW SLA
TAC SLA
Fulfillment
Warranty Standard Premium
By vendor local Hubs
Premium4H On site - *
HW replacement Next business day shipment
9x5 TAC HW RMA support
Next business day delivery target
24x7 TAC support
24x7x4H on site
Support by Check Point qualified engineer
By vendor local Hubs
By distribution at remote locations
By vendor local Hubs
By distribution at remote locations
1. By qualified partners
2. By qualified distributors
* - contact Check Point local representative
20[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
What does Total Security look like?What does Total Security look like?
Intrusion Prevention
Anti-Spyware
Web Filtering
VPN (site-to-site, remote access)
Gateway Anti-Virus
Leader in Firewall Market
HTTP FTP
IM E-mail P2P
VoIP SQL
Messaging Security NEW!
SSL VPN
21[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Broader Attacks Require Broader SecurityBroader Attacks Require Broader Security
Attacks against the messaging infrastructure
Spam, Phishing, and other malicious e-mails
Malware within messages content
Messaging Antivirus
Messaging Firewall and IPS
Anti-Spam/Anti-Phishing
22[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Six Dimension, Best-in-class Messaging SecuritySix Dimension, Best-in-class Messaging Security
Messaging Firewall and IPS
POP3 SMTP IMAP
Anti-Spam/Phishing Protection
Pattern-based IP Reputation
Anti-Virus Protection
Signature-based Zero-Hour Protection
Check Point is the only UTM vendor offering
6 Dimension Protectioncovering ALL 3 threat categories
6 dimension protection for superior messaging security Protects against advanced spam (image-based, multi-language and zero-day)
Easy to deploy and manage
23[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Benefits of Open ChoiceBenefits of Open Choice
Broader ChoiceBroader Choice
Best Price / PerformanceBest Price /
Performance
Simplicity & Security
Simplicity & Security
More options to serve your security needs
Greater level of security activated at high performance levels
Increased ability to apply consistent, strong security
24[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Open Choice OptionsOpen Choice Options
Check Point Appliances
Single vendor for hardware, software and support
Includes Integrated Appliance Solutions – custom integration of software and IBM hardware
Leverage existing hardware vendor relationship
Certified by Check Point for interoperability
Standardize on a server vendor
Leverage existing infrastructure investment
Secured by Check Point Appliances
Check Point Software on Open Servers
[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
puresecurity™
Check Point Endpoint SecuritySingle agent for endpoint securityCheck Point Endpoint SecuritySingle agent for endpoint security
26[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Introducing: Check Point Endpoint SecurityIntroducing: Check Point Endpoint Security
15 years leadership in
firewalls
Based on award-winning
ZoneAlarm
Market-leading Pointsec®
technology
12 years leadership in remote access
VPN
Single Agent for Endpoint SecuritySingle Agent for Endpoint Security
Unified Management
Mitigates the broadest range of endpoint risks Unifies all essential components Only solution that includes both data security and remote access
AntivirusAntivirusAnti-spywareAnti-spyware
Data Data SecuritySecurity Remote AccessRemote AccessFirewall/NACFirewall/NAC
Program ControlProgram Control
27[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Single Agent for Endpoint SecuritySingle Agent for Endpoint Security
Easy to Deploy and Manage Only comprehensive endpoint
security solution:– Firewall, NAC & Program Control– Antivirus and anti-spyware– Data security– Remote Access
Single installation
Single, intuitive interface
Small agent footprint
Single Agent for Endpoint Security
Unified ManagementUnified Management
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NAC
Program Control
Only solution that includes both data security and VPN
28[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Single ConsoleSingle Console
• All functions can be managed across the enterprise by a single console• Streamlines deployments•Client software can be pushed out without involving on-site IT staff or end users
At-Glance Dashboard View
29[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Single ConsoleSingle Console
Simplify Setup and Deployment
Quickly and easily install & update agentsQuickly and easily install & update agents
Shared settings streamline deploymentShared settings streamline deployment
Single Agent for Endpoint Security
Unified ManagementUnified Management
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NAC
Program Control
30[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Endpoint Policy EnforcementEndpoint Policy Enforcement
Single Agent for Endpoint Security
Unified ManagementUnified Management
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NAC
Program Control
Tracks endpoint compliance by ruleTracks endpoint compliance by rule
Enforces policy for 3rd party antivirusEnforces policy for 3rd party antivirus
31[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Unified Security ArchitectureUnified Security Architecture
Unified Endpoint and Network Security Management
Single Agent for Endpoint Security
Unified ManagementUnified Management
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NAC
Program Control
Endpoint Security logs can be monitored from SmartCenter
Centralized security event correlation, management, and reporting with Eventia® Suite
Shared management server, log-in, and console
32[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Industry-leading FirewallIndustry-leading Firewall
Unified Management
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NACFirewall/NAC
Program ControlProgram Control
15 years of Firewall Leadership
Single Agent for Endpoint Security
Proactive inbound and outbound protection
Blocks unwanted traffic Stealth mode - makes
endpoints invisible to hackers
Segmentation contains outbreaks and enables high granularity network access control
33[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Enhanced Program ControlEnhanced Program Control
Single Agent for Endpoint Security
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NACFirewall/NAC
Program ControlProgram Control
Program Advisor Service
Unified Management
Automatically enforces program permissions
– Immediately terminates known malicious programs
– Ensures only legitimate and approved programs run on PCs
How do we do it?– Known good application
authenticity service– Known bad malware
identification– Hundreds of thousands or
applications in Program Advisor database
– Based on real-time data from millions of endpoints
34[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Network Access ControlNetwork Access Control
Single Agent for Endpoint Security
AntivirusAnti-spyware
Data Security
Remote AccessFirewall/NACFirewall/NAC
Program ControlProgram Control
Internal and VPN NAC
Ensures only safe PCs are allowed to access network
Ensure Endpoint Policy ComplianceUnified Management
Cooperative Enforcement™ with Check Point and 3rd party gateways
Cooperative Enforcement™ with Check Point and 3rd party gateways
802.1x support enables NAC in multi-vendor networking environments
802.1x support enables NAC in multi-vendor networking environments
35[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Antivirus / Anti-spywareAntivirus / Anti-spyware
Single Agent for Endpoint Security
AntivirusAntivirusAnti-spywareAnti-spyware
Data Security
Remote AccessFirewall/NAC
Program Control
Eliminate Viruses and other Malware
Unified Management
Award-winning engine delivers the best malware protection
Highest detection rates Fast antivirus response
– 12 hours (compared to 24-48 hours industry average)
Hourly signature updates
36[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Data Security Data Security
Single Agent for Endpoint Security
AntivirusAnti-spyware
Data Data SecuritySecurity
Remote AccessFirewall/NAC
Program Control
Protect Data from Loss or Theft
Unified Management
Check Point is the most widely deployed solution for protecting valuable data
– Over 14 million seats deployed
Based on Pointsec® market-leading technology
– Full Disk Encryption – provides the most complete & comprehensive protection for all data
– Port Protection – Keeps data safe by controlling activity on ports and devices
– Media Encryption – encrypts sensitive data transferred via portable media devices such as USB flash drives
37[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Remote AccessRemote Access
Single Agent for Endpoint Security
AntivirusAnti-spyware
Data Security
Remote AccessRemote AccessFirewall/NAC
Program Control
Unified Management
Ensure Confidential Remote Communications
Secure remote VPN access through VPN-1® gateways
Only endpoint security solution that includes unified remote access
Applies full security policies to the VPN traffic
Multiple VPN entry points provides high availability and flexible access
38[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
SummarySummary
Powerful SecurityPowerful Security
for Simplified Execution
for Confident Protection
Single Agent
Single Console
Single Agent
Single Console
39[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Summary–Total Security from Check PointSummary–Total Security from Check Point
Best securityBest security Best technologyBest technology Best expertiseBest expertise• Single, unified
gateway product line• Single endpoint
security agent• Single, integrated
console for security management
• 15 years of leadership
• Best technologies,in every field
• Unified security architecture
• 1,900 people• 3,000 partners
40[Public]—For everyone
puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
Questions?Questions?