Your SlideShare is downloading. ×

Check Point SMB Proposition

283

Published on

Check Point SMB Proposition

Check Point SMB Proposition

Published in: Technology, Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
283
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • http://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdfCost == direct, indirect and opportunity costs that resulted from the loss or theft of information, disruption to business operations, revenue loss and destruction of property, plant and equipment. In addition to external consequences of the cyber crime, the analysis attempted to capture the total cost spent on detection, investigation, incident response, containment, recovery and after-the-fact or “ex-post” response.
  • SMBs are attractive targets for cyber criminals. Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users.
  • http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  • http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  • http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  • Inspired by: http://www.istockphoto.com/stock-photo-19680099-cloud-computing-services.php?st=eb02dbc
  • Transcript

    • 1. Check Point SMB Proposition: Small Size. Big Security Ofer Or April 2013 ©2013 Check Point Software Technologies Ltd.
    • 2. KEY INSIGHTS FROM CHECK POINT 2013 SECURITY REPORT ©2013 Check Point Software Technologies Ltd. 2
    • 3. 63% of organizations are infected with bots 63% ©2013 Check Point Software Technologies Ltd. 3
    • 4. In 75% of organizations, a host accesses a malicious website 75% Source: Check Point 2013 Security Report ©2013 Check Point Software Technologies Ltd. 4
    • 5. In 61% of organizations, a P2P file sharing application is used 72 % APAC 62 % Americas 55 % EMEA 61% Source: Check Point 2013 Security Report ©2013 Check Point Software Technologies Ltd. 5
    • 6. So what does it mean for SMBs? ©2013 Check Point Software Technologies Ltd. 6
    • 7. Cyber-Security is important for defense contractors, and critical infrastructure…Right? ©2013 Check Point Software Technologies Ltd. 7
    • 8. I’m too small… Why should hackers attack me…Right? ©2013 Check Point Software Technologies Ltd. 8
    • 9. My company is OK…we’ve got security! Right? ©2013 Check Point Software Technologies Ltd. 9
    • 10. 77% of SMBs think their company is safe from cyber threats 77% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 10
    • 11. SMBs don’t think they’re a target for cyber-attacks Why do you not consider cyber-attacks a serious threat to your company? We are too small to be targeted for an attack 47% We protect our business Other 50% 7% Source: SMB Threat Awareness Poll 2012 ©2013 Check Point Software Technologies Ltd. 11
    • 12. So we’re good… Right? ©2013 Check Point Software Technologies Ltd. 12
    • 13. Cost of Data Breach (in $M) $8.93 $5.95 $5.15 $3.25 $3.39 UK AU JP DE US Source: 2012 Cost of Cyber Security Study, Ponemon Institute ©2013 Check Point Software Technologies Ltd. 13
    • 14. 67% of reported data breaches were at companies with 11-100 employees “Smaller businesses are an ideal target for cyber raids, and cyber criminals understand this very well… ” 67% Source: Verizon Data Breach Investigation Report 2012 ©2013 Check Point Software Technologies Ltd. 14
    • 15. 90% of SMBs do not have a professional IT Manager 90% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 15
    • 16. 70% of SMBs do not provide any Internet Safety training to employees 70% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 16
    • 17. SMBs represent the best ROI for cyber-criminals Enterprise Value of information (in $) SMB Sweet-spot Consumer Level of protection ©2013 Check Point Software Technologies Ltd. 17
    • 18. So what should SMBs do? ©2013 Check Point Software Technologies Ltd. 18
    • 19. Essential Security Tools for SMBs 1 Network Firewall ©2013 Check Point Software Technologies Ltd. 19
    • 20. Essential Security Tools for SMBs 2 Threat Prevention & Anti-Malware Solutions ©2013 Check Point Software Technologies Ltd. 20
    • 21. Essential Security Tools for SMBs 3 Educate & Involve the End User ©2013 Check Point Software Technologies Ltd. 21
    • 22. New Check Point 600 C o m i n g S o o n t o T h e a t e r s N e a r Yo u ©2013 Check Point Software Technologies Ltd. 22
    • 23. Network Firewall A Firewall is only as good as its Security Configuration Simple activation of security policy Easily see what security functions are in use ©2013 Check Point Software Technologies Ltd. 23
    • 24. Threat Prevention & Anti-Malware Threat Prevention setup by non-experts in seconds Add exceptions if needed Default policies based on best practices for easy setup ©2013 Check Point Software Technologies Ltd. 24
    • 25. User Education & Involvement Security needs to educate and engage end-users www.flickr.com Educate users on risk and Internet usage policies Make control more practical ©2013 Check Point Software Technologies Ltd. 25
    • 26. and also featuring… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
    • 27. Secured Guest Wireless Network ©2013 Check Point Software Technologies Ltd. 27
    • 28. 3G Modem Support (USB/ExpressCard) ©2013 Check Point Software Technologies Ltd. 28
    • 29. …and Cloud-based Management Service Security Policy Configuration and updates ©2013 Check Point Software Technologies Ltd. 29
    • 30. Check Point 600 Appliance Small Size. BIG Security. ©2013 Check Point Software Technologies Ltd. 30
    • 31. C O M I N G SOON SOON COMING ©2013 Check Point Software Technologies Ltd. 31
    • 32. Thank you! ©2013 Check Point Software Technologies Ltd.
    • 33. Introducing New Check Point 600 ©2013 Check Point Software Technologies Ltd. 33
    • 34. New Check Point 600 ©2013 Check Point Software Technologies Ltd. 34
    • 35. ©2013 Check Point Software Technologies Ltd. 35
    • 36. Easy & Intuitive Local Management Blade Activation Policy Configuration Event Monitoring ©2013 Check Point Software Technologies Ltd. 36
    • 37. ©2013 Check Point Software Technologies Ltd. 37
    • 38. Network Firewall A Firewall is only as good as its Security Configuration ©2013 Check Point Software Technologies Ltd. 38
    • 39. User Education & Involvement Security needs to educate and engage end-users www.netflix.com Educate users on risk and Internet usage policies Make control more practical ©2013 Check Point Software Technologies Ltd. 39

    ×