Whats new in Check Point Security E80.40
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
953
On Slideshare
948
From Embeds
5
Number of Embeds
2

Actions

Shares
Downloads
23
Comments
0
Likes
0

Embeds 5

http://192.168.6.184 4
http://www.linkedin.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. What’s New in Check PointEndpoint Security E80.40Jordi Medina TorregrosaData Security BDM for Spain & Portugaljmedina@checkpoint.com [Protected] For public distribution ©2012 Check Point Software Technologies Ltd.
  • 2. Unprotected Data Lossendpoints - Business data on hardput the entire drives & storage devices - Public file storage appsbusiness at RISK Unauthorized Access - Accept network connections from anyone - Remote connection apps Threat Infection - Download infected content from vulnerable programs & OS [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 2
  • 3. Addressing Security Risks on Endpoints [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 3
  • 4. Introducing Check PointEndpoint Security E80.40 Single Security Solution Across Windows & Mac Best Security Control & Visibility Integrated with Check Point Management Architecture [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 4
  • 5. Unified Security for EndpointsFirewall & Compliance Full Disk Encryption Media Encryption Anti Malware Secures  Encrypt local  Encrypt  Stops  Connect endpoint hard drives business data infected Securely to connections  Controls copied to files & data business Verify users access removable  Control resources security to device devices apps install compliance & launch Check Point Endpoint Software Blades [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 5
  • 6. The ONLY unified And Now --Client for PC For Mac As Well !All Blades are Windows 8 ReadyMedia Encryption and Anti Malware for Mac - 2013 [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 6
  • 7. Best Security Control & Visibility ©2012 Check Point For public distribution [Protected] Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 7
  • 8. First, Define A Security Policy An Example for an Organizational PolicyEncrypt All Encrypt business Allow connections Scan filesDrives on data copied to only from upon access &PC & Mac storage devices trusted sources delete infected files [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 8
  • 9. A Unified, Simple to Understand Security Policy With E80.40 [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 9
  • 10. Visibility to organizational security picture [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 10
  • 11. Security Forensics & Analysiswith Endpoint Security SmartEvent 5 [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 11
  • 12. Check Point Endpoint Compliance Analysis Understand endpoint security risks Simple to read and understand Run on ANY PC – regardless installed endpoint product [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 12
  • 13. Analyze from one device – to the entire organization Local device analysis Organizational Analysis WWW- Download the analysis tool - Run on targeted devices- View report in <1 minute - Unified report in SmartConsole [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 13
  • 14. Integrated with Check Point Management Architecture ©2012 Check Point For public distribution [Protected] Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 14
  • 15. Manage endpoint security policies with Check Point SMART-1 AlongsideEndpoint Endpoint Policy Network Policy with NetworkSecurity SecurityManagement managementE80.40 R75.40 SMART-1 Security Management [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 15
  • 16. Cooperative Security Enforcement Verify Security Compliance Upon Connect Remote access Security GatewayProtected Device [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 16
  • 17. Unified Security Intelligence Real time security visibility with SmartLog – Across network and endpointAnother Example: Strategy Plans 2012John tries to copy data outside theorganization John_st@yahoo.com Strategy Plans 2012 Corporate Strategy – backup [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 17
  • 18. Unified Security Intelligence Real time security visibility with SmartLog – Across network and endpoint Strategy Plans 2012 Full visibility of John’s attempts to copy data outside [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 18
  • 19. More in Endpoint Security E80.40 ©2012 Check Point For public distribution [Protected] Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 19
  • 20. Separate and protect business datafrom personal data on storage devices Personal Data  Data is not encrypted  Access to any user/device Business Data  Data is encrypted  Transparent access only to approved users and devices [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 20
  • 21. Engage and educated users whilekeeping business continuity with UserCheck X Need to provide this presentation to our partner [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 21
  • 22. And even more… Additional features in Endpoint Security E80.40 Manage Configure & Scan 80,000 seats Getting-Started preview user Multiple Wizard messages AD trees Web-remote Custom image Set alerts & Send alerts help to remediate in full disk notifications in email passwords Encryption [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 22
  • 23. SummaryCheck Point Endpoint Security E80.40 Integrated with One Endpoint Best Control & Check Point Solution Visibility Management architecture [Protected] For public distribution ©2012 Check Point Software Technologies Ltd. 23
  • 24. Thank You! [Protected] For public distribution ©2012 Check Point Software Technologies Ltd.