[Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved....

40
[Public]—For everyone 2008 Check Point Software Technologies Ltd. All rights reserved. pure security Check Point Total Security Bezpieczne sieci, stacje robocze, aplikacje i dane Michał Jarski Country Manger Poland Romania & Bulgaria
  • date post

    19-Dec-2015
  • Category

    Documents

  • view

    222
  • download

    1

Transcript of [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved....

Page 1: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

puresecurity™

Check Point Total SecurityBezpieczne sieci, stacje robocze, aplikacje i dane

Check Point Total SecurityBezpieczne sieci, stacje robocze, aplikacje i dane

Michał Jarski

Country MangerPoland Romania & Bulgaria

Page 2: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

2[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Impossible to manage

Complicated

Complex

Too many vendors

The customer environment…The customer environment…

Network security

Data security

* Prepared May 2007,Data based on our subjective assessment,Size of bubble represents relative size,Data not accurate, nor conclusive.

Endpoint security

Iden

tity,

Acc

ess

Man

agem

ent

Authorization,

Authentication

Security

management

Thr

eat

man

agem

ent

Can such Can such complexity complexity

deliver a deliver a high level of high level of

security?security?

Page 3: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

3[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Introducing…Introducing…

Network &Gateways

Data &Endpoint

MANAGEMENT

totalsecurity from Check Point

Page 4: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

4[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point 2008Check Point 2008

Most scalable

“Total security” solutions

From $150to

20Gbps

All protections,one package

one pricefor 3 years

12

Th

rou

gh

pu

t (G

bp

s)

M8

Price

0.2

4

SMBSMB Mid MarketMid Market

7

2.4

1.2

0.4

Safe@Office

UTM-1 Edge

UTM-1 450

UTM-1 1050

UTM-1 2050

M2

M6

Enterprise Integrated Appliances

Enterprise Integrated Appliances

VirtualizedSolutions (VSX)

VirtualizedSolutions (VSX)

12

Th

rou

gh

pu

t (G

bp

s)

M8

Price

0.2

4

SMBSMB Mid MarketMid Market

7

2.4

1.2

0.4

Safe@Office

UTM-1 Edge

UTM-1 450

UTM-1 1050

UTM-1 2050

M2

M6

Enterprise Integrated Appliances

Enterprise Integrated Appliances

VirtualizedSolutions (VSX)

VirtualizedSolutions (VSX)

Only from Check Point

Unified Gateways

20

Page 5: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

5[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Introducing the industry’s only single solution for endpoint security

Firewall / NAC / program control

Anti-virus / anti-spyware

Data security

Remote access / VPN

Replaces multiple vendorswith a single, simple solution

Lower deployment cost

Better security

Single endpoint security agent

Coming now!

Check Point 2008Check Point 2008

Only from Check Point

Page 6: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

6[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Network gateways

Remote access

Endpoint PCs

Data security

Network gateways

Remote access

Endpoint PCs

Data security

Policy definition

Deployment

Provisioning

Monitoring

Reporting

Compliance

Auditing

Policy definition

Deployment

Provisioning

Monitoring

Reporting

Compliance

Auditing

Check Point 2008Check Point 2008

Single security

management console

Only from Check Point

Page 7: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

puresecurity™

Check Point Total Security GatewaysCheck Point Total Security Gateways

Page 8: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

8[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Check Point – Q12008Check Point – Q12008

Most scalableFrom $150

to20Gbps

12

Th

rou

gh

pu

t (G

bp

s)

M8

Price

0.2

4

SMBSMB Mid MarketMid Market

7

2.4

1.2

0.4

Safe@Office

UTM-1 Edge

UTM-1 450

UTM-1 1050

UTM-1 2050

M2

M6

Enterprise Integrated Appliances

Enterprise Integrated Appliances

VirtualizedSolutions (VSX)

VirtualizedSolutions (VSX)

12

Th

rou

gh

pu

t (G

bp

s)

M8

Price

0.2

4

SMBSMB Mid MarketMid Market

7

2.4

1.2

0.4

Safe@Office

UTM-1 Edge

UTM-1 450

UTM-1 1050

UTM-1 2050

M2

M6

Enterprise Integrated Appliances

Enterprise Integrated Appliances

VirtualizedSolutions (VSX)

VirtualizedSolutions (VSX)

Unified Gateways

20

Page 9: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

9[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

List Price

12

0.2

Current Appliance CoverageCurrent Appliance Coverage

4

SmallOffice / Branch

SmallOffice / Branch

SMB /Medium Branch

SMB /Medium Branch

$5K $20K $40K

Enterprise Perimeter / Core /Large Branch

Enterprise Perimeter / Core /Large Branch

7

2.4

1.2

0.4

$15K $35K$10K $30K$25K$2.5K

UTM-1 1050TS 1 year

UTM-1 2050TS 1 year

FW

Th

rou

gh

pu

t (G

bp

s)

The Need:Lower UTM

Models

The Need:Lower UTM

Models

UTM-1 Edge

UTM-1 450TS 1 year

The Need: High-End Turnkey Solutions

The Need: High-End Turnkey Solutions

M2

M6

M8

CustomSolutions

Page 10: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

10[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

The Solution – New Appliance OptionsThe Solution – New Appliance Options

Streamlined DeploymentStreamlined Deployment

Single Vendor Solution

Streamlined Administration

Streamlined Administration

SmartCenter Support

Greater ChoiceGreater Choice Additional Platform Options

Record Price/Performance

Record Price/Performance

Highest Security, under $4/ Mbps

Page 11: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

11[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Introducing Power-1 AppliancesIntroducing Power-1 Appliances

Record price/performance– Under $4US/Mbps

High Performance, High Security– Gateway throughput up to 14 Gbps

– Intrusion prevention throughput up to 6 Gbps

Streamlined deployment of enterprise security– Hardware/software solution from single vendor

High Security for High Performance Environments

Power-1 5070 Power-1 9070

Page 12: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

12[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

New entry level model and increased performance range

3 new UTM-1 Total Security appliances 3 new UTM-1 Total Security appliances

Introduces new entry level model under $5,000 Delivers high performance from 400 Mbps to over 4 Gbps Comprehensive security

Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam

All-inclusive security updates for up to three years Built-in centralized management for multiple sites

UTM-1 270 UTM-1 570 UTM-1 3070

Page 13: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

13[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved. List Price

12

0.2

The Expanded Appliance LineThe Expanded Appliance Line

4FW

Th

rou

gh

pu

t (G

bp

s)

SmallOffice / Branch

SmallOffice / Branch

SMB /Medium Branch

SMB /Medium Branch

$5K $20K $55K

Enterprise Perimeter / Core /Large Branch

Enterprise Perimeter / Core /Large Branch

7

2.4

1.2

0.4

UTM-1 Edge X32

$15K $45K$10K $35K$25K$2.5K

UTM-1 270

UTM-1 570

UTM-1 3070

UTM-1 450

UTM-1 1050

UTM-1 2050

M2

M6

M8Power-1 5070

Power-1 9070

Page 14: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

14[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Power-1 Appliance SpecificationsPower-1 Appliance Specifications

Power-1 5070 Power-1 9070

Software Edition NGX R65 Power NGX R65 Power

10/100/1000 Ports 8/12 12/16

Firewall Throughput 9 Gbps 14 Gbps

VPN Throughput 2.4 Gbps 3.7 Gbps

Concurrent Sessions 1.1 Million 1.1 Million

VLANs 256 256

Intrusion Prevention 4.5 Gbps 6.1 Gbps

Storage Capacity 160 Gb 2 X 160 Gb

Security Acceleration Yes Yes

List Price $36,500 $49,500

Page 15: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

15[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Advanced Acceleration TechnologiesAdvanced Acceleration Technologies

Accelerated SmartDefenseIntegrated Intrusion PreventionAccelerated SmartDefenseIntegrated Intrusion Prevention

Page 16: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

16[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved. List Price

12

0.2

The Expanded Appliance LineThe Expanded Appliance Line

4FW

Th

rou

gh

pu

t (G

bp

s)

SmallOffice / Branch

SmallOffice / Branch

SMB /Medium Branch

SMB /Medium Branch

$5K $20K $55K

Enterprise Perimeter / Core /Large Branch

Enterprise Perimeter / Core /Large Branch

7

2.4

1.2

0.4

UTM-1 Edge X32

$15K $45K$10K $35K$25K$2.5K

UTM-1 270

UTM-1 570

UTM-1 3070

UTM-1 450

UTM-1 1050

UTM-1 2050

M2

M6

M8Power-1 5070

Power-1 9070

Page 17: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

17[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

New entry level model and increased performance range

3 new UTM-1 Total Security appliances 3 new UTM-1 Total Security appliances

Introduces new entry level model under $5,000 Delivers high performance from 400 Mbps to over 4 Gbps Comprehensive security

Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam

All-inclusive security updates for up to three years Built-in centralized management for multiple sites

UTM-1 270 UTM-1 570 UTM-1 3070

Page 18: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

18[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

UTM-1 Appliance SpecificationsUTM-1 Appliance Specifications

UTM-1 270 UTM-450 UTM-1 570 UTM-1 1050 UTM-1 2050 UTM-1 3070

Software Edition NGX R65 NGX R65 NGX R65 NGX R65 NGX R65 NGX R65

10/100 Ports - - - 4 4 -

10/100/1000 Ports 4 4 4 4 4 10

Firewall Throughput 400 Mbps 400 Mbps 1.1 Gbps 1.2 Gbps 2.4 Gbps 4.5 Gbps

VPN Throughput 100 Mbps 200 Mbps 250 Mbps 220 Mbps 380 Mbps 1.1 Gbps

Concurrent Sessions 400,000 700,000 500,000 800,000 1.1 Million 1.1 Million

VLANs 256 256 256 256 256 256

Storage Capacity 160 Gbps 80 Gbps 160 Gbps 80 Gbps 80 Gbps 160 Gbps

Managed Sites 2 3 3 3 5 5

List Price $4,800 $7,500 $8,500 $13,000 $17,000 $24,000

Page 19: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

19[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Programs SLA - unit replacementVariety of options to choose from

HW SLA

TAC SLA

Fulfillment

Warranty Standard Premium

By vendor local Hubs

Premium4H On site - *

HW replacement Next business day shipment

9x5 TAC HW RMA support

Next business day delivery target

24x7 TAC support

24x7x4H on site

Support by Check Point qualified engineer

By vendor local Hubs

By distribution at remote locations

By vendor local Hubs

By distribution at remote locations

1. By qualified partners

2. By qualified distributors

* - contact Check Point local representative

Page 20: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

20[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

What does Total Security look like?What does Total Security look like?

Intrusion Prevention

Anti-Spyware

Web Filtering

VPN (site-to-site, remote access)

Gateway Anti-Virus

Leader in Firewall Market

HTTP FTP

IM E-mail P2P

VoIP SQL

Messaging Security NEW!

SSL VPN

Page 21: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

21[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Broader Attacks Require Broader SecurityBroader Attacks Require Broader Security

Attacks against the messaging infrastructure

Spam, Phishing, and other malicious e-mails

Malware within messages content

Messaging Antivirus

Messaging Firewall and IPS

Anti-Spam/Anti-Phishing

Page 22: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

22[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Six Dimension, Best-in-class Messaging SecuritySix Dimension, Best-in-class Messaging Security

Messaging Firewall and IPS

POP3 SMTP IMAP

Anti-Spam/Phishing Protection

Pattern-based IP Reputation

Anti-Virus Protection

Signature-based Zero-Hour Protection

Check Point is the only UTM vendor offering

6 Dimension Protectioncovering ALL 3 threat categories

6 dimension protection for superior messaging security Protects against advanced spam (image-based, multi-language and zero-day)

Easy to deploy and manage

Page 23: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

23[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Benefits of Open ChoiceBenefits of Open Choice

Broader ChoiceBroader Choice

Best Price / PerformanceBest Price /

Performance

Simplicity & Security

Simplicity & Security

More options to serve your security needs

Greater level of security activated at high performance levels

Increased ability to apply consistent, strong security

Page 24: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

24[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Open Choice OptionsOpen Choice Options

Check Point Appliances

Single vendor for hardware, software and support

Includes Integrated Appliance Solutions – custom integration of software and IBM hardware

Leverage existing hardware vendor relationship

Certified by Check Point for interoperability

Standardize on a server vendor

Leverage existing infrastructure investment

Secured by Check Point Appliances

Check Point Software on Open Servers

Page 25: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

[Public]—For everyone©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

puresecurity™

Check Point Endpoint SecuritySingle agent for endpoint securityCheck Point Endpoint SecuritySingle agent for endpoint security

Page 26: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

26[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Introducing: Check Point Endpoint SecurityIntroducing: Check Point Endpoint Security

15 years leadership in

firewalls

Based on award-winning

ZoneAlarm

Market-leading Pointsec®

technology

12 years leadership in remote access

VPN

Single Agent for Endpoint SecuritySingle Agent for Endpoint Security

Unified Management

Mitigates the broadest range of endpoint risks Unifies all essential components Only solution that includes both data security and remote access

AntivirusAntivirusAnti-spywareAnti-spyware

Data Data SecuritySecurity Remote AccessRemote AccessFirewall/NACFirewall/NAC

Program ControlProgram Control

Page 27: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

27[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Single Agent for Endpoint SecuritySingle Agent for Endpoint Security

Easy to Deploy and Manage Only comprehensive endpoint

security solution:– Firewall, NAC & Program Control– Antivirus and anti-spyware– Data security– Remote Access

Single installation

Single, intuitive interface

Small agent footprint

Single Agent for Endpoint Security

Unified ManagementUnified Management

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NAC

Program Control

Only solution that includes both data security and VPN

Page 28: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

28[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Single ConsoleSingle Console

• All functions can be managed across the enterprise by a single console• Streamlines deployments•Client software can be pushed out without involving on-site IT staff or end users

At-Glance Dashboard View

Page 29: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

29[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Single ConsoleSingle Console

Simplify Setup and Deployment

Quickly and easily install & update agentsQuickly and easily install & update agents

Shared settings streamline deploymentShared settings streamline deployment

Single Agent for Endpoint Security

Unified ManagementUnified Management

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NAC

Program Control

Page 30: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

30[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Endpoint Policy EnforcementEndpoint Policy Enforcement

Single Agent for Endpoint Security

Unified ManagementUnified Management

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NAC

Program Control

Tracks endpoint compliance by ruleTracks endpoint compliance by rule

Enforces policy for 3rd party antivirusEnforces policy for 3rd party antivirus

Page 31: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

31[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Unified Security ArchitectureUnified Security Architecture

Unified Endpoint and Network Security Management

Single Agent for Endpoint Security

Unified ManagementUnified Management

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NAC

Program Control

Endpoint Security logs can be monitored from SmartCenter

Centralized security event correlation, management, and reporting with Eventia® Suite

Shared management server, log-in, and console

Page 32: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

32[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Industry-leading FirewallIndustry-leading Firewall

Unified Management

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NACFirewall/NAC

Program ControlProgram Control

15 years of Firewall Leadership

Single Agent for Endpoint Security

Proactive inbound and outbound protection

Blocks unwanted traffic Stealth mode - makes

endpoints invisible to hackers

Segmentation contains outbreaks and enables high granularity network access control

Page 33: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

33[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Enhanced Program ControlEnhanced Program Control

Single Agent for Endpoint Security

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NACFirewall/NAC

Program ControlProgram Control

Program Advisor Service

Unified Management

Automatically enforces program permissions

– Immediately terminates known malicious programs

– Ensures only legitimate and approved programs run on PCs

How do we do it?– Known good application

authenticity service– Known bad malware

identification– Hundreds of thousands or

applications in Program Advisor database

– Based on real-time data from millions of endpoints

Page 34: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

34[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Network Access ControlNetwork Access Control

Single Agent for Endpoint Security

AntivirusAnti-spyware

Data Security

Remote AccessFirewall/NACFirewall/NAC

Program ControlProgram Control

Internal and VPN NAC

Ensures only safe PCs are allowed to access network

Ensure Endpoint Policy ComplianceUnified Management

Cooperative Enforcement™ with Check Point and 3rd party gateways

Cooperative Enforcement™ with Check Point and 3rd party gateways

802.1x support enables NAC in multi-vendor networking environments

802.1x support enables NAC in multi-vendor networking environments

Page 35: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

35[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Antivirus / Anti-spywareAntivirus / Anti-spyware

Single Agent for Endpoint Security

AntivirusAntivirusAnti-spywareAnti-spyware

Data Security

Remote AccessFirewall/NAC

Program Control

Eliminate Viruses and other Malware

Unified Management

Award-winning engine delivers the best malware protection

Highest detection rates Fast antivirus response

– 12 hours (compared to 24-48 hours industry average)

Hourly signature updates

Page 36: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

36[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Data Security Data Security

Single Agent for Endpoint Security

AntivirusAnti-spyware

Data Data SecuritySecurity

Remote AccessFirewall/NAC

Program Control

Protect Data from Loss or Theft

Unified Management

Check Point is the most widely deployed solution for protecting valuable data

– Over 14 million seats deployed

Based on Pointsec® market-leading technology

– Full Disk Encryption – provides the most complete & comprehensive protection for all data

– Port Protection – Keeps data safe by controlling activity on ports and devices

– Media Encryption – encrypts sensitive data transferred via portable media devices such as USB flash drives

Page 37: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

37[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Remote AccessRemote Access

Single Agent for Endpoint Security

AntivirusAnti-spyware

Data Security

Remote AccessRemote AccessFirewall/NAC

Program Control

Unified Management

Ensure Confidential Remote Communications

Secure remote VPN access through VPN-1® gateways

Only endpoint security solution that includes unified remote access

Applies full security policies to the VPN traffic

Multiple VPN entry points provides high availability and flexible access

Page 38: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

38[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

SummarySummary

Powerful SecurityPowerful Security

for Simplified Execution

for Confident Protection

Single Agent

Single Console

Single Agent

Single Console

Page 39: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

39[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Summary–Total Security from Check PointSummary–Total Security from Check Point

Best securityBest security Best technologyBest technology Best expertiseBest expertise• Single, unified

gateway product line• Single endpoint

security agent• Single, integrated

console for security management

• 15 years of leadership

• Best technologies,in every field

• Unified security architecture

• 1,900 people• 3,000 partners

Page 40: [Public]—For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point Total Security Bezpieczne sieci, stacje robocze,

40[Public]—For everyone

puresecurity™©2003–2008 Check Point Software Technologies Ltd. All rights reserved.

Questions?Questions?