Your SlideShare is downloading. ×
  • Like
Endpoint Security Management R80 Customer Presentation
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Endpoint Security Management R80 Customer Presentation

  • 1,158 views
Published

Endpoint Security Management R80 Customer Presentation

Endpoint Security Management R80 Customer Presentation

Published in Technology , Business
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
1,158
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
79
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. Simplifying EndpointSecurity ManagementJordi Medina TorregrosaEndpoint BDM for Iberiajmedina@checkpoint.com ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  • 2. Endpoint Security Management Today Increasing Endpoints per user Assorted Endpoints per user Multiple Endpoint Security Products Multiple vendors Difficult to administrate, support and manage Limited visibility into security ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2
  • 3. Endpoint SecurityManagement Challenge IT Managers’ opposing objectives Multiple capabilities to Effectively manage protect endpoint and the complexity ensure compliance Protect end users and Maximize end-user corporate from threats productivity Visibility and control Mobile users on of policy multiple machines ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3
  • 4. Unified Security Endpoint ManagementCheck Point Simplifies Endpoint Security Management Unified Endpoint Security Management Unique Visibility and Control Manage Security of Users, Not Just Machines ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4
  • 5. Check Point Simplifies Endpoint Security Management Unified Endpoint Security management ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5
  • 6. Unified Endpoint Security Unify all endpoint security protection in a single management console and server Anti-Malware/ Firewall/ WebCheck Program Control Compliance Check Full Disk Media Remote Encryption Encryption Access ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6
  • 7. Comprehensive Securityon the Endpoint Automatically and transparently secure all information on endpoint hard drives Centrally enforceable encryption of removable media and port control Provide secure, seamless access to corporate networks remotely Protects your endpoint from unsecure, malicious and unwanted applications Protect against drive-by-downloads, phishing sites and zero-day attacks Stop unwanted traffic, prevent malware and block targeted attacks ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7
  • 8. Check Point Simplifies Endpoint Security Management Get Unique Visibility and Control ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8
  • 9. Unique Visibility and Control Monitor… Manage… Enforce……everything that’s …policy and exceptions …compliance before the important to you on the fly network is accessed ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9
  • 10. Unique Visibility and Control Monitor with customizable, at-a-glance dashboard View all endpoint connectivity Summarized infection reporting View all latest updates Filter compliance report by groups View all policies or networks in use ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10
  • 11. Unique Visibility and Control Manage all levels of the organization — down to users and machines My High-level view organization Finance Sales HR Engineering Organizations Adam Phillip Rose Users Rose’s laptop Rose’s Machines desktop Seamless Active Directory Integration ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11
  • 12. Unique Visibility and Control Enforce and remediate endpoint compliance Correct endpoint security modules? Verify Updated OS YES Allow service pack? Access Approved NO Restrict applications only? Access Updated anti- malware version? Remediate ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12
  • 13. Unique Visibility and Control Quickly deploy the right level of protection for the right group Finance HR ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13
  • 14. Check Point Simplifies Endpoint Security Management Manage Security of Users, Not Just Machines ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14
  • 15. Manage Security of Users,Not Just Machines Rose has many HR machines have machines many users Security policy follows the user ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15
  • 16. Manage Security of Users,Not Just Machines Drill down on groups, users and all their machines in a few clicks Quickly determine Rose’s status Find Rose’s Search or click AD to machines investigate group or quickly user statusView Rose’s policies ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16
  • 17. Manage Security of Users,Not Just Machines Easily modify security policy ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17 17
  • 18. Unified Security Endpoint ManagementCheck Point Simplifies Endpoint Security Management Unified Endpoint Security Management Unique Visibility and Control Manage Security of Users, Not Just Machines ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18
  • 19. Thank You! ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone