Defining your PrivateCloud BlueprintTom DavisonSE Manager, UK                 ©2011 Check Point Software Technologies Ltd....
Agenda    1    Market Landscape    2    Private Cloud Security    3    Public Cloud Security    4    Summary              ...
Virtualization vs. Cloud       Virtualizing efficiency is good       Virtualizing efficiency is good    But Cloud efficien...
The Cloud Evolution               On Premise                                                                       Off Pre...
Agenda    1    Market Landscape         Private Cloud Security           • VLAN Sprawl problem    2      • Secure Dynamic ...
On Cloud ComputingTop concerns with private cloudsWhat are your greatest concerns about deploying and managingthem?  Loss ...
Moving to Private Cloud  Legacy DatacenterCorpnet    DMZ                Extranet                                          ...
Moving to Private Cloud       Application      VirtualizationCorpnet    DMZ                Extranet                       ...
Moving to Private CloudNetworks VirtualizationCorpnet    DMZ                Extranet                                      ...
Moving to Private Cloud      Datacenter     ConsolidationCorpnet    DMZ                Extranet                           ...
The VLANs Sprawl ProblemCheap and                                          VMs Sprawl                                   Mo...
Private Cloud - Security Needs                                                         Protection from external           ...
Private Cloud - Security Needs                                                             Protection from external       ...
Private Cloud - Security Needs                                                         Protection from external           ...
Check Point Security Gateway Virtual Edition   Check Point Secures the Private Cloud    Check Point  Security Gateway   Vi...
Secure the Virtual Infrastructure          Protects Virtual Machines                                                      ...
Flexible Virtual Machine security      The Fast Path Agent configuration options                                      ► By...
Virtual Edition Features     Best Security                                                          Check Point           ...
Virtual Edition Features     Best Security               VMs Protection                                                   ...
Virtual Edition Features      Best Security              VMs Protection                            ►   Securing New VMs►  ...
Virtual Edition Features      Best Security              VMs Protection                                     Unified Manage...
Virtual Edition Features      Best Security              VMs Protection                                     Unified Manage...
Single security management   Unified administration of physical and virtualized                    environments           ...
Agenda    1    Market Landscape    2    Private Cloud Security         Public Cloud Security           • Public Cloud Pote...
©2011 Check Point Software Technologies Ltd.   |   [PROTECTED] – All rights reserved   26                                 ...
Public Cloud in 2011     Few Global Clouds                                              Many Regional Clouds27            ...
Cloud Providers – Security Needs  Multi-tenancy: Servicing Multiple Customers          From the Same Environment          ...
Check Point Cloud Security  Check Point Secures the Public Clouds              Use VSX for secure connectivity with the Pu...
VSX New Appliances              More Consolidation         With Stronger VSX Appliances12200 VSX Appliance                ...
Agenda    1    Market Landscape    2    Private Cloud Security    3    Public Cloud Security         Summary           • S...
Virtualized Security Scenarios    VE                                 Securing the Virtual Environment                     ...
VE Success Story - Private Cloud                                                                                 Approach ...
VE Success Story - VDI                                                                              Approach Financial Ser...
Cloud Security – Best PracticesUse Firewall to segment between Virtual MachinesUse IPS to secure VMs from External and Int...
SummaryCheck Point Pioneers the Cloud Security                             Virtual Security Gateway For Multi-            ...
Thank You            ©2011 Check Point Software Technologies Ltd.   |   [Highly Restricted] ONLY for designated individuals
YOUR YEAR-ROUND  IT RESOURCE – access to everything  you’ll need to know
THE WHOLETECHNOLOGY   STACKfrom start to finish
COMMENT &  ANALYSISInsights, interviews and the latest thinking on technology solutions
VIDEOYour source of live information – all the presentations from         our live events
TECHNOLOGY     LIBRARY   Over 3,000 whitepapers,case studies, product overviews and press releases from all the       lead...
EVENTS, WEBINARS &    PRESENTATIONS           Missed the event?   Download the presentations thatinterest you. Catch up wi...
DirectoryA comprehensive A-Z listing     providing in-depth    company overviews
ALL FREE TO ACCESS    24/7
online.ipexpo.co.uk
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Defining your Private Cloud Blueprint with Check Point Software
Upcoming SlideShare
Loading in...5
×

Defining your Private Cloud Blueprint with Check Point Software

1,058

Published on

Whether in a virtualised environment or on a physical network, there is a real need for security against all types of threat. This session will show how you can secure your virtual machines, applications and traffic, as well as meet critical regulatory compliance requirements, by segregating virtual systems from each other as well as from external threats. Check Point's VPN-1 VE is the only solution that can inspect inter-VM traffic, protecting against both internal and external threats with a single management interface to ensure consistent, efficient security management.

Published in: Technology, Business
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
1,058
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

Transcript of "Defining your Private Cloud Blueprint with Check Point Software"

  1. 1. Defining your PrivateCloud BlueprintTom DavisonSE Manager, UK ©2011 Check Point Software Technologies Ltd. | [[PROTECTED] – All rights reserved
  2. 2. Agenda 1 Market Landscape 2 Private Cloud Security 3 Public Cloud Security 4 Summary ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 2 2
  3. 3. Virtualization vs. Cloud Virtualizing efficiency is good Virtualizing efficiency is good But Cloud efficiency is much better! Cloud Virtualization ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 3 3
  4. 4. The Cloud Evolution On Premise Off Premise Hybrid Cloud Private Cloud Public CloudEfficiency Virtualization SaaS Legacy Datacenter Web Hosting $11.8 billion by 2014 $55 billion by 2014 ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 4 4
  5. 5. Agenda 1 Market Landscape Private Cloud Security • VLAN Sprawl problem 2 • Secure Dynamic Cloud • Security Gateway Virtual Edition 3 Public Cloud Security 4 Summary ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 5 5
  6. 6. On Cloud ComputingTop concerns with private cloudsWhat are your greatest concerns about deploying and managingthem? Loss of control 80% Data security 76% Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Morgan Stanley 2010 CIO Cloud Survey ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 6 6
  7. 7. Moving to Private Cloud Legacy DatacenterCorpnet DMZ Extranet 1:1 Server per Application 1:10 Security Zone (VLANs) per Server ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 8 8
  8. 8. Moving to Private Cloud Application VirtualizationCorpnet DMZ Extranet 1:5 Server per Application 1:1 Security Zone (VLANs) per Server ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 9 9
  9. 9. Moving to Private CloudNetworks VirtualizationCorpnet DMZ Extranet 1:20 Server per Application 5:1 Security Zone (VLANs) per Server ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 10 10
  10. 10. Moving to Private Cloud Datacenter ConsolidationCorpnet DMZ Extranet 1:100 Server per Application 20:1 Security Zone (VLANs) per Server ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 11 11
  11. 11. The VLANs Sprawl ProblemCheap and VMs Sprawl More VLANs to Everyone wantseasy to add How to secure? segment VMs more VMsapplications Hard to manage VLANs Lack of compliance Sprawl Problem Black spots Latency ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 12 12
  12. 12. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 13 13
  13. 13. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically VM VM VM Hypervisor ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 14 14
  14. 14. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically Ensure Security in dynamic environment ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 15 15
  15. 15. Check Point Security Gateway Virtual Edition Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 16 16
  16. 16. Secure the Virtual Infrastructure Protects Virtual Machines ► Hypervisor security VE VM VM ► Certified by VMWare ► Audit virtualization system Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 17 17
  17. 17. Flexible Virtual Machine security The Fast Path Agent configuration options ► Bypass: Pass the packet without inspection ► Secure: Forward the packet to security gateway ► Block: Drop the packet ► Monitor-only: Inspects and log packets that would have been dropped ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 18 18
  18. 18. Virtual Edition Features Best Security Check Point Security Gateway► All Software Blades Virtual Edition Firewall (VE) VPN► Flexible Security IPS Antivirus VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 19 19
  19. 19. Virtual Edition Features Best Security VMs Protection VM VM ► Securing New VMs► All Software Blades Automatically► Flexible Security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Inspecting Inter-VM Traffic Hypervisor ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 20 20
  20. 20. Virtual Edition Features Best Security VMs Protection ► Securing New VMs► All Software Blades Automatically► Flexible security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 21 21
  21. 21. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for► All Software Blades Automatically Physical and Virtual► Flexible security ► Secure Dynamic ► Virtualize the Environment Management ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 22 22
  22. 22. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for► All Software Blades Automatically Physical and Virtual► Flexible security ► Secure Dynamic ► Virtualize the Environment Management VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 23 23
  23. 23. Single security management Unified administration of physical and virtualized environments Single console for Single console to IPS manage all firewall rules ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 24 24
  24. 24. Agenda 1 Market Landscape 2 Private Cloud Security Public Cloud Security • Public Cloud Potential 3 • Multi-tenancy Security • Check Point Solution 4 Summary ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 25 25
  25. 25. ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 26 26
  26. 26. Public Cloud in 2011 Few Global Clouds Many Regional Clouds27 ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 27 27
  27. 27. Cloud Providers – Security Needs Multi-tenancy: Servicing Multiple Customers From the Same Environment Secure connection to the Cloud Cloud Security of the Cloud Security within the Cloud ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 28 28
  28. 28. Check Point Cloud Security Check Point Secures the Public Clouds Use VSX for secure connectivity with the Public Cloud Secure VMs and Inter-VMs connection with Security Gateway Virtual Edition Offer Multi-tenancy management and customized policy via Multi-Domain Management ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 29 29
  29. 29. VSX New Appliances More Consolidation With Stronger VSX Appliances12200 VSX Appliance Consolidate 250 security gateways12400 VSX Appliance Combine firewall, VPN, IPS and URL filtering12600 VSX Appliance Secure more networks leveraging the 37-port density 21400 VSX Appliance ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 31 31
  30. 30. Agenda 1 Market Landscape 2 Private Cloud Security 3 Public Cloud Security Summary • Success Stories 4 • Best Practices • Summary ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 32 32
  31. 31. Virtualized Security Scenarios VE Securing the Virtual Environment Use the new Virtualization Software Blade to apply Virtualization Blade granular Firewall and IPC policy on traffic between virtual machines. Hypervisor VE Office in a Box Use the Security Gateway VE with FW, IPS, VPN Hypervisor and any other software blade to secure your office networks and assets VE VE VE Enterprise Security Gateways Hypervisor Consolidate your Security Gateways deployment into a virtualized environment. ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 33 33
  32. 32. VE Success Story - Private Cloud Approach European Financial Group  Deployed VE Hypervisor in Monitor mode Background  Slowly but surely started to enforce FW & IPS policy on more and more VMs and ports Wanted to cut cost and groups virtualize their data center Consolidating hundreds of Apps from DMZ, Internal and Results Extranet on one ESX cluster Looking for a solution to  VE secures a mission critical production environment secure this dynamic and growing environment  Both the Physical and Virtual security are managed centrally ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 34 34
  33. 33. VE Success Story - VDI Approach Financial Service Provide  Deployed VE Hypervisor mode  Using Firewall policy between Background remote terminals and VDIs  Using Firewall, IPS and AV to Servicing hundreds of secure VDI external traffic remote users of different customers Using VDI deployment over Results one ESX cluster Looking for efficient  VE is used to secure multi- solution to secure these tenant VDI environment VDIs ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 35 35
  34. 34. Cloud Security – Best PracticesUse Firewall to segment between Virtual MachinesUse IPS to secure VMs from External and Internal threatsLet the same security Admin manage both physical andvirtual policy from a single consoleEnsure full security with zero downtown-time during VMVM live migrationLog and audit all Virtualization events and VM traffic ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 36 36
  35. 35. SummaryCheck Point Pioneers the Cloud Security Virtual Security Gateway For Multi- Tenant Cloud Environments Best Hypervisor security for Virtual Machines The only solution with unified management for Physical and Virtual ©2011 Check Point Software Technologies Ltd. | [PROTECTED] – All rights reserved 37 37
  36. 36. Thank You ©2011 Check Point Software Technologies Ltd. | [Highly Restricted] ONLY for designated individuals
  37. 37. YOUR YEAR-ROUND IT RESOURCE – access to everything you’ll need to know
  38. 38. THE WHOLETECHNOLOGY STACKfrom start to finish
  39. 39. COMMENT & ANALYSISInsights, interviews and the latest thinking on technology solutions
  40. 40. VIDEOYour source of live information – all the presentations from our live events
  41. 41. TECHNOLOGY LIBRARY Over 3,000 whitepapers,case studies, product overviews and press releases from all the leading IT vendors
  42. 42. EVENTS, WEBINARS & PRESENTATIONS Missed the event? Download the presentations thatinterest you. Catch up with convenient webinars. Plan your next visit.
  43. 43. DirectoryA comprehensive A-Z listing providing in-depth company overviews
  44. 44. ALL FREE TO ACCESS 24/7
  45. 45. online.ipexpo.co.uk

×