Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Check Point Mobile Security

1,185 views

Published on

The Mobile Organization
Bridging the consumer and enterprise worlds

Published in: Technology, Business
  • Be the first to comment

Check Point Mobile Security

  1. 1. The Mobile Organization Bridging the consumer and enterprise worlds Eyal Manor emanor@checkpoint.com ©2013 Check Point Software Technologies Ltd.
  2. 2. Organizational Boundaries Disappear ©2013 Check Point Software Technologies Ltd. 2
  3. 3. I need to continue to work tonight… …I’ll send this data via email ©2013 Check Point Software Technologies Ltd. 3
  4. 4. Error 552: Sorry, this message exceeds your maximum size limit. Dropbox YouSendIt Windows Live ©2013 Check Point Software Technologies Ltd. 4
  5. 5. This doesn’t affect me… right? ©2013 Check Point Software Technologies Ltd. 5
  6. 6. Let’s Have a Closer Look at your Network 900 Businesses 120,000 Hours of Inspected Traffic ©2013 Check Point Software Technologies Ltd. 6
  7. 7. Storing and Sharing Applications 70 Dropbox 51 Windows Live 25 Curl 22 YouSendIt Sugarsync PutLocker 13 10 80% of Organizations Use File Storage and Sharing Apps Source: Check Point Security Report 2013, 900 companies, 120,000 of traffic monitored ©2013 Check Point Software Technologies Ltd. 7
  8. 8. Data Loss at Organizations 54% of Organizations Experienced Data Loss Source: Check Point Security Report 2013, 900 companies, 120,000 of traffic monitored [Restricted] ONLY for designated groups and individuals ©2013 Check Point Software Technologies Ltd. 8
  9. 9. …And Where All This Data Goes To? 93% of Organizations Allow Mobile Devices into the Business Source: Check Point Mobile Survey, March 2013, 790 IT professionals ©2013 Check Point Software Technologies Ltd. 9
  10. 10. Organizational Boundaries Disappear Smartphones and Tablets USB Devices Data Collaboration Email Data Leaves to Uncontrolled Environments ©2013 Check Point Software Technologies Ltd. 10
  11. 11. The Risks Device Lost or Stolen Data Uploaded to the web Sharing Data with External Parties ©2013 Check Point Software Technologies Ltd. 11
  12. 12. The Risks Device Lost Data Uploaded A new version Stolen for or of Zeus malware designed to the web mobile devices has stolen 36 million euros from more than 30,000 customers. Sharing Data with External Parties Malware on Mobile Devices ©2013 Check Point Software Technologies Ltd. 12
  13. 13. Conventional Security Thinking Protect the Device at All Costs (even if it blocks the business…) Manage ALL Devices Block Is that Realistic? File-Sharing Apps Contain Everything in the Perimeter ©2013 Check Point Software Technologies Ltd. 13
  14. 14. Protect Business Data Wherever Its Used Available anywhere Meet All User Needs Multi Layered Solution ©2013 Check Point Software Technologies Ltd. 14
  15. 15. Control the Access and Usage of Business Data USB Devices Smartphones and Tablets Available anywhere Data Collaboration Encrypt Data in Uncontrolled Environments Set Authentication & Access Rights to Data Look for Exceptions in the “Trail of Data” Be Able to Revoke Access to Data if Needed ©2013 Check Point Software Technologies Ltd. 15
  16. 16. On Mobile Devices Use Business Data within a Secure Business Application ***** Only Authenticated Users Access the Business Container ©2013 Check Point Software Technologies Ltd. 16
  17. 17. On Mobile Devices Use Business Data within a Secure Business Application Use Emails Securely Use Documents Securely ©2013 Check Point Software Technologies Ltd. 17
  18. 18. On USB Drives Use Business Data Within a Secure Folder Personal Data  Data is not encrypted  Access to any user/device Business Data  Data is encrypted  Transparent access only to approved users and devices ©2013 Check Point Software Technologies Ltd. 18
  19. 19. Sharing Documents Use and Share Documents Securely with Anyone Data is Encrypted Upon Creation Access to Authorized Users Only Authorized Non Authorized ©2013 Check Point Software Technologies Ltd. 19
  20. 20. Sharing Documents Transparent Access to Documents from any Device ©2013 Check Point Software Technologies Ltd. 20
  21. 21. Engage People and Allow Them to Work Enable BYOD – Manage only Business Data Engage and Educate End-users Meet All User Needs ©2013 Check Point Software Technologies Ltd. 21
  22. 22. Bring Your Own Device - BYOD Personal data & apps Business information NOT MANAGED Use Personal Devices for Business Data MANAGED Only Business Data is Managed Remotely Wipe Business Data ©2013 Check Point Software Technologies Ltd. 22
  23. 23. Engage and Educate End Users Salaries Simple to Understand the Problem & Resolution ©2013 Check Point Software Technologies Ltd. 23
  24. 24. Protect Data with a Multi Layered Solution Orchestrated Together Simple to Manage Policy and Incidents Multi Layered Solution ©2013 Check Point Software Technologies Ltd. 24
  25. 25. Mobile Information Protection – A Multi Layer Solution Mobile Security Enables Secure BYOD Document Security Enables Secure Document Sharing DLP Keeps Data Away from Wrong Hands Endpoint Security Protects Data on PCs and USBs ©2013 Check Point Software Technologies Ltd. 25
  26. 26. Summary Protect Business Information Wherever it is Used Meets End Users Needs – Enables BYOD & Information Sharing Multi Layer Solution Protect Data on Mobile Devices, Documents & Endpoints ©2013 Check Point Software Technologies Ltd. 26

×