Principales tendencias a considerar para su estrategia de seguridad 3D

1,044 views

Published on

Estados Unidos, Chicago: Del 23 al 25 de mayo se realizó en The Palmer House Hilton, de la ciudad de Chicago - Illinois, la Expo CPX 2011 (Check Point Experience).

En esta segunda parte le acercamos la presentación desarrollada por John Vecchi, Head of Product Marketing en Check Point, sobre Principales tendencias a considerar para su estrategia de seguridad 3D.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,044
On SlideShare
0
From Embeds
0
Number of Embeds
15
Actions
Shares
0
Downloads
10
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Principales tendencias a considerar para su estrategia de seguridad 3D

  1. 1. Top Security Trendsand Strategies for 2011John VecchiHead of Global Product Marketing ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  2. 2. Top Trends of 2011 1 Virtualization & Cloud Computing 2 IT Consumerization 3 Threat Landscape 4 Consolidation & Complexity 5 Data Security and Loss 6 Web 2.0 & Social Media 7 Governance, Risk & Compliance (GRC) 8 Cost Reduction 9 Green IT ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2
  3. 3. 2011 Security Trends Virtualization &1 Cloud Computing ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3
  4. 4. On Data Center Consolidation Private cloud1 28% have one 30% plan one CIOs will virtualize 55% of production servers next year, up from 42% this year21 Information Week, June 20102 Morgan Stanley, June 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4
  5. 5. Enterprise Virtualization InitiativesTop Security Challenges for Server VirtualizationWhat are the biggest security challenges preventing server virtualization in yourenterprise?Lack of skills in security team 36%Cost of new information security solutions 28% Lack of knowledgeCan‟t port existing security tools from physical in security teams 26%to virtual world remains the biggest challengeLack of security best practices for servervirtualization 24% in moving to virtualizedRegulatory compliance issues 24% environments. Enterprise Strategy Group 2010 Survey of enterprise decision makers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5
  6. 6. On Cloud ComputingTop concerns with private cloudsWhat are your greatest concerns about deploying and managing them? Loss of control 80% Data security 76% Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Morgan Stanley 2010 CIO Cloud Survey ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6
  7. 7. On Cloud PrioritiesTop hardware / IT infrastructure prioritiesAre you considering building an internal or private cloud operated by IT(not a service provider) in next 12 months? Enterprise 45% 55% Mid-market 56% 44% Small Business 64% 36% Not currently planned On project listForrester Research2010 Enterprise and SMB Survey ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7
  8. 8. 2011 Security Trends2 IT Consumerization ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8
  9. 9. Consumers Leading the Enterprise Consumer hardware used for work Consumer services used for work ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9
  10. 10. On IT Consumerization Most of the conversations I have with Gartner clients are about how to securely enable use of employee- owned smartphones and laptops. John Pescatore VP Distinguished Analyst Gartner 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10
  11. 11. Mobile Workforce GrowthEnterprise Mobile Device PopulationMarket penetration over time 100 Mobile 80 Population % Penetration 60 40 Anchored 20 Desktop 0 2000 2005 2010 451 Group 2009/2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11
  12. 12. 2011 Security Trends3 Threat Landscape ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12
  13. 13. Today’s Threat Landscape Increasing Crime and Cyber-warfare Sophistication Profit-driven and Hactivists Zeus Stuxnet Aurora Botnets XSS Trojans Worms  Multi-vector  Cyber Crimeware  Cyber-warfare  Financial theft  Iran and Stuxnet  Polymorphic  Intellectual  Wikileaks  Blended and property  Cyber „Hactivists‟ multi-variant  Criminal networks ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13
  14. 14. On Top 2010 Threats… Most prevalent threat types SCAREWARE ROOTKIT ADWARE EXPLOIT TROJAN BOTNET ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14
  15. 15. On Top 2010 Threats… “…widely considered the most sophisticated computer threat created to date…Stuxnet exploited four previously unknownStuxnet vulnerabilities, at a time when exploiting a single one is a big deal.” SOFTPEDIA.com 2011“Hackers seeking source code from Google, Adobe and others used nearly 12 pieces of malware and levels of encryption to Operation burrow deeply into the bowels of company networks…” Aurora WIRED 2010 “Zeus…detected only 23 percent of the time…is the No. 1 financialZeus Trojan—representing 44 percent of all financial malware infectionsZbot today.” Darkreading.com 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15
  16. 16. Anatomy of the Threat • Single File Architecture • File containing all payloads • 2 un-patched MS vulnerabilities • 2 undisclosed privilege escalations Exploits • 2 stolen certificates • SCADA / PLC payloads • Anti-Virus evasion techniques Techniques • Peer-2-Peer network • Command & Control ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16
  17. 17. Infection Statistics This is not normal ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17
  18. 18. Mission Objectives: Introduce Threat to Target Propagate inside the network Infect Field PG machinesGoal: Reprogram ICS machines! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18
  19. 19. On Evolving Threats and AttacksAttack attempts in 2010Q2 2010 0.5 BillionQ3 2010 0.6 Billion These are 69 attacks the ones that per second we know about… ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19
  20. 20. 2011 Security Trends4 Consolidation and Complexity ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20
  21. 21. On Complexity and Point-product Sprawl Biggest IT Security Challenges Which of the following are the biggest information/network security challenges facing your company? Managing the complexity of security 51% Enforcing security policies 35% Preventing data breaches from outside attackers 29% The requirement to manage Preventing data theft by employees or other insiders 23% security complexity grows steadily each year. InformationWeek 2010 Survey of security decision makers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21
  22. 22. On Complexity and Point-product SprawlYour world: IPS FirewallTop network URLsecurity Filtering VPNtechnologies andpoint productsdeployed NAC ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22
  23. 23. On Complexity and Point-product SprawlYour world: IPSAnd don’t forget URL VPNendpoint—nearly Filteringdoubling thenumber of pointproducts… ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23
  24. 24. On Security Vendor Consolidation At $7.68 billion this is the biggest acquisition of a pure play security company ever. It is also the worst... Richard Stiennon, Chief Analyst IT-Harvest, LLC This acquisition has more potential to be disruptive than to deliver any near-term customer benefits. Gartner Research Note 20 August 2010 We expect that customers that have already been angling to jump ship will use this deal as an excuse to accelerate those plans. Andrew Jaquith, Senior Analyst Forrester Research ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24
  25. 25. 2011 Security Trends5 Data Security and Loss ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25
  26. 26. On Data Loss… Percentage of companies breached who81% were not PCI compliant. Percentage of outbound e-mail that contains content which poses a legal, financial or regulatory risk. 20% Percentage of customers who end their 31% relationship with a company if they are affected by a breach. ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26
  27. 27. On Data Proliferation… Estimated enterprise data 650% growth in the next five years.** Gartner 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27
  28. 28. On Top Sources of Data LossRisk channels: 30% 1Top five sources 25% 2of data loss 3across 20% USBs and Laptopsorganizations 4 5 Corporate Email 15% Public Webmail WiFi Networksand enterprises 10%worldwide CDs/DVDs 5% 0%InformationWeek 2010 Security Survey ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28
  29. 29. Data Loss in the News in 2010… Apple Shell McDonald’s exposed over Facebook Corporation loses an 100K high- looses user loses database „undisclosed‟ profile iPad data for 170M of 176K amount of customer subscribers employees customer data names February June July December 2010 Data Loss Events ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29
  30. 30. 2011 Security Trends6 Web 2.0 and Social Media ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 30
  31. 31. On Web 2.0 and Applications FACT: If Facebook were a country, it would be the 3rd largest in the world. Twitter would be the 7th largest. ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 31
  32. 32. On Web 2.0 and Applications FACT: 7% of all business network traffic is to Facebook. 44% of all online videos are being viewed at the workplace. ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 32
  33. 33. On Web 2.0 and Applications 23% of the average user’s day at work is spent doing something on the Web. 45% of the 100 most popular web sites support user-generated content and 60% are infected with malware. 42% are prepared to deal with the risks of Web 2.0 in order to capitalize on potential business benefits. ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 33
  34. 34. Insecure Application Web SitesThe Weakest LinkPercentage of Web Application Vulnerabilities with No Vendor Supplied Patches Patches Available Web Others 26% Applications 45% No Patch 55% Available 74% Gartner 2010 Cyber Threat Landscape ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 34
  35. 35. 2011 Security Trends7 Governance, Risk and Compliance ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 35
  36. 36. Regulatory Overload E.U. Data Privacy Directive HIPAA-HITECH STATE LAWS BASEL II PCI DSS GLBA SEC SOX Prevalent IT GRC Standards ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 36
  37. 37. On Governance, Risk and ComplianceMost Influential Factors On Security ProgramWhich of the following factors have the greatest influence on yourinformation security program? Industry and/or government compliance mandates 60% Our security group‟s assessment of threats and risks 42% the company faces Information security best practices 37% Threats and risks associated with 26% business models or processes “Compliance has the greatest influence on information security costs” InformationWeek 2010 Survey of security decision makers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 37
  38. 38. Gartner on Virtualization… [virtualization] will be a hot spot for auditors, given the greater risk of misconfiguration and lower visibility of policy violation. Through year-end 2011, auditors will challenge virtualized deployments… Neil MacDonald VP Distinguished Analyst Gartner 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 38
  39. 39. 2011 Security Trends8 Cost Reduction ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 39
  40. 40. On Cost Reduction and Doing Morewith Less CIOs I‟ve talked to expect dramatic >30% cuts in infrastructure and operations costs. Mark McDonald Group Vice President, Gartner November 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 40
  41. 41. 2011 Security Trends9 Green IT ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 41
  42. 42. On Green IT…Environmental MotivationsWhat are your organization‟s top three motivations for pursuing greener IToperations? Reduce energy-related operating expenses 70% Reduce other IT operating expenses 38% Improve brand image with the public 35% Global Green IT Online Surveys April 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 42
  43. 43. Why Go Green? Despite the weak economy, organizations will accelerate Green IT Plans. Why? Savvy IT leaders use Green IT to marry ecological aspirations with financial reality. Forrester Research, 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 43
  44. 44. Gartner’s top strategic technologies for 2011 1 Cloud Computing Mobile Applications and 2 Media Tablets Web 2.0 Social Technologies 3 and Communications ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 44
  45. 45. ‘To Do’ list for IT security leaders: Meet IT governance, risk and compliance requirements Prevent the loss of sensitive data Secure and manage Web 2.0 applications Secure all fixed and mobile endpoints Protect against attacks and evolving threats Secure virtualized and cloud environments Reduce IT security spending ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 45
  46. 46. The case for: Eliminating ComplexityCheck Point 3D Multi-Function,Next-Generation Firewall Solution. DLP IPS URL Filtering The world’s first, best, and only fully integrated appliance delivering consolidation, simplicityEnterprise VPN Application and killer security Firewall Control ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 46
  47. 47. Check Point 3D Next-Gen Firewall Application Identity Antivirus & FW & VPN IPS Control Awareness Anti-Malware URL Filtering DLPSoftware Blades Software Blade Software Blade Software Blade Software Blade Software Blade Software Blade Power-1 SmartEvent Software Blade SmartWorkflow Software Blade Unified Event Analysis Policy Change Management Smart-1 Check Point Unified Security Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 47
  48. 48. Unified Control of All Security Layers IPS Mobile Granular Visibility Access DLP SmartEventApplication Control IdentityAwareness ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 48
  49. 49. Industry-Leading IPS CHECK POINT SETS A NEW STANDARD IN LATEST NSS GROUP IPS TEST The Check Point IPS Software Blade outperformed nearly every vendor in overall accuracy and blocking:  97.3% security effectiveness  Multi-gigabit rated throughput of 2.4Gbps  100% anti-evasion coverage ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 49
  50. 50. The case for: Total Data SecurityEnd-to-end protection of data in-use, in-motionand at-rest to stop data theft and loss. Full Disk Port Network DLP Encryption Protection Prevent data loss, educate users and enforce data policies across Web, mobile Media Abra UserCheck and emailEncryption Technology ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 50
  51. 51. The case for: Cloud Computing and Virtualization Plug-and-play security for public / private clouds and dynamic virtual environments. Security Unified VMSafe Integration Gateway VE Management Comprehensive cloud and virtualization security and unified management for both Inter-VM 5G Next-Gen VSX Virtual physical and virtualTraffic Protection Firewall Security Gateway ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 51
  52. 52. The case for: Web 2.0 and Application Control Detect and control application usage, while educating users on corporate policies. Simple, 50,000 Identity Awareness Granular Widgets Comprehensive Policies security control andvisibility of over 50,000 Web 2.0 applications and widgets Application 5,000 UserCheck™ Control Applications Technology ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 52
  53. 53. The case for: StreamlinedGovernance, Risk and Compliance Integrated threat prevention and compliance management for greater control, automation and measurement. HIPAA Threat SOX Compliance Compliance PreventionProven complianceARTIFACTS for risk management and mitigation and IT Define, 100% State and governance Measure PCI DSS Federal and Control Compliance Regulations ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 53
  54. 54. IT GRC Value to the EnterpriseCheck Point Federal / PCI DSS HIPAA SEC SOX GLBA5G Solutions StateDLPIDS / IPSApplicationControlAntivirus /Anti-SpamVPNFirewall ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 54
  55. 55. IT GRC Value to the Enterprise Check Point Endpoint PCI DSS HIPAA SEC SOX Federal State SolutionsAntivirus /Anti-SpywareVPNFirewallEncryption ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 55
  56. 56. The case for: Mobile Device Security Securely enable both corporate and employee owned smartphones, laptops and tablets. Clientless Check Point Check Point Abra Browser Mobile Access Support Software Blade The most comprehensive choice of enterprise-grade Remote Check Point Check Point solutions to secure the Access VPN Endpoint Mobile for iPhone Consumerization of ITSoftware Blade Security and iPad ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 56
  57. 57. The case for: Operational Efficiencyand 360° ControlThe world‟s first, best and only fully integratedsecurity management solution. Monitoring Physical andUnified Workflow and Virtual Reporting Manage everything simply and easily on a ‘single pane Unified of glass’Centralized 3D Unified Risk Event Policies Mitigation Appliance Analysis ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 57
  58. 58. The case for: Lowered Costof Ownership Lower the cost of your IT security spend. Detailed Reduced Continual Operational Security Compliance Metrics Skill Gaps vs. Cyclic Audits A fully integratedsolution that drives down IT security costs by 25% Complete Custom Pre-Configured Security Integration Next-Gen Firewall Architecture ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 58
  59. 59. The case for: End-to-End Security Every device, every location, every threat. One security architecture. Cloud Comprehensive Networks Computing Endpoint and Data and Critical and Security Virtualization Infrastructure One integrated, best-of-suite security infrastructure and Unified Web 2.0 Employee-owned solution from the Management and Social Smartphones, LEADER in IT securityand Event Analysis Networking Laptops and Tablets ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 59
  60. 60. Now there’s a unified solution:Eliminate complexity with unified IPS & 3D multi-function gatewaySecure vital data and assets with proactive threat prevention & DLPDemonstrate and streamline governance and complianceSafely embrace and enable Web 2.0 technologyProtect your investment with unrivaled flexibility & extensibilityDramatically lower IT security costs and TCO ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 60
  61. 61. Thank You! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 61

×