Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Check Point: From Branch to Data Center

1,751 views

Published on

From Branch to Data Center: Securing the Next Generation Enterprise

Published in: Technology
  • Be the first to comment

Check Point: From Branch to Data Center

  1. 1. From Branch to Data Center: Securing the Next Generation Enterprise April 2013 Ofer Or ©2013 Check Point Software Technologies Ltd.
  2. 2. Let’s think about Security… ©2013 Check Point Software Technologies Ltd. 2
  3. 3. My Enterprise Security [Restricted] ONLY for designated groups and individuals ©2013 Check Point Software Technologies Ltd. 3
  4. 4. …and what about the castle’s keep? ©2013 Check Point Software Technologies Ltd. 4
  5. 5. Is your Data Center Secured? Can you support the security and performance requirements of your data center? ©2013 Check Point Software Technologies Ltd. 5
  6. 6. More Security, Additional Power FW & VPN Software Blades Application IPS Control Software Blade Software Blade Identity Awareness Software Blade Antivirus Software Blade Email Security URL Filtering Software Blade Software Blade Anti-Bot Software Blade* The Security You Want The Performance You Need ©2013 Check Point Software Technologies Ltd. 6
  7. 7. Best Security with Highest Scores For Firewall, Next Gen Firewall and IPS Firewall Next Generation Firewall IPS Threat Prevention ©2013 Check Point Software Technologies Ltd. 7
  8. 8. Check Point 61000 Appliance Industry’s Fastest Next Generation Firewall New Software Blades Support NEW Mobile Access NEW Anti-Bot NEW DLP* ©2013 Check Point Software Technologies Ltd. 8
  9. 9. Check Point 61000 Appliance …and Now Also with Next Generation Virtual Systems Scalability & Robustness Customized Security ©2013 Check Point Software Technologies Ltd. 9
  10. 10. Scalability and Robustness Robust Load Sharing VS traffic evenly balanced across the entire chassis Easy Scale-Up By adding MORE Virtual Systems and MORE HW blades ©2013 Check Point Software Technologies Ltd. 10
  11. 11. Customized Security Tailored Security per Network Segment Any Software Blade(s) with Any security policy on Any Virtual System IPS VPN IPS AV Anti-Bot IA APCL URLF AV ©2013 Check Point Software Technologies Ltd. 11
  12. 12. 61000 Special Promotion Get 10 Virtual Systems for Free with your New 61000! VS License VSs x10 * Promotion is valid until end of 2013 ©2013 Check Point Software Technologies Ltd. 12
  13. 13. Check Point 21000 Appliances Best Performance in a Compact 2U Chassis Low Latency for Time-Sensitive Applications ©2013 Check Point Software Technologies Ltd. 13
  14. 14. Best Performance in a 2U Chassis 21700 Appliance 21400 Appliance 21600 Appliance Security Power 2003/2900* 2501/3300* 17% 2922/3551* Max Firewall Throughput 17/50 Gbps 21/75 Gbps 20% 25/78 Gbps Max VPN Throughput 7 Gbps 8.5 Gbps 30% 11 Gbps Max IPS Throughput 2.7/6.0 Gbps 3.5/6.8 Gbps 18% 4.1/8.0 Gbps (Production Performance / 1518 byte UDP) (Production Performance / Recommended profile) * With Security Acceleration Module ©2013 Check Point Software Technologies Ltd. 14
  15. 15. Security Acceleration Module Fastest Performance in a 2U Appliance for latency sensitive applications  Sub 5 µs Firewall latency  110 Gbps Firewall throughput  50 Gbps VPN throughput  60 Million Packets per Second  300,000 Connections per Second ©2013 Check Point Software Technologies Ltd. 15
  16. 16. ©2013 Check Point Software Technologies Ltd. 16
  17. 17. …and what about your branch security? ©2013 Check Point Software Technologies Ltd. 17
  18. 18. Are Your Branches Secured? Do you run the same Security Do you have the same Security Policy at the Enterprise Network and at the Remote Branches? ©2013 Check Point Software Technologies Ltd. 18
  19. 19. Introducing N e w C h e c k P o i n t 11 0 0 ©2013 Check Point Software Technologies Ltd. 19
  20. 20. More Security – Now for the Branch Extended Industry Leading Security Across Entire Corporate Network FW & VPN IPS Application Identity Antivirus Control Awareness URL Filtering Email Security Anti-Bot Corporate Headquarter Branch / Remote office * Anti-Bot blade will be available on 1100 Appliance in H2 2013 ©2013 Check Point Software Technologies Ltd. 20
  21. 21. 1100 Appliance Management Central Local Powered by Check Point Leading Security Management ©2013 Check Point Software Technologies Ltd. 21
  22. 22. Easy and Intuitive Local Management Web-based UI Simplified Management Local Maintenance ©2013 Check Point Software Technologies Ltd. 22
  23. 23. 1100 Appliances Family 1120 Appliance 1140 Appliance 1180 Appliance Target Customer Small branch Up to 10 users Small branch Up to 25 users Small branch Up to 50 users Security Power 28 SPU 34 SPU 37 SPU Max Firewall Throughput 750 Mbps 1 Gbps 1.5 Gbps Max VPN Throughput 140 Mbps 175 Mbps 220 Mbps Price Starting at $599 Starting at $899 Starting at $1699 4 Hardware Models Available per Appliance 1. Wired 2. Wired + Wireless 3. ADSL 4. ADSL + Wireless ©2013 Check Point Software Technologies Ltd. 23
  24. 24. …and finally, don’t forget the Towers! ©2013 Check Point Software Technologies Ltd. 24
  25. 25. Do you have Security Visibility? Do you have full visibility to your Security Posture? ©2013 Check Point Software Technologies Ltd. 25
  26. 26. Majority of Organizations Use Internal Audits to Monitor their Security How does your organization assess the efficiency and effectiveness of information security? Assessments performed by internal audit function Internal self-assessments by IT or information security function Monitoring and evaluation of security incidents and events 68% 64% 48% Source: Ernst & Young’s 2012 Global Information Security Survey ©2013 Check Point Software Technologies Ltd. 26
  27. 27. Check Point Compliance Blade Check Point Compliance Software Blade Reduces Audit Time & Costs Compliance Security Monitoring based on Industry Best Practices In Depth Visibility to Security Status Practical Recommendations to Improve Compliance ©2013 Check Point Software Technologies Ltd. 27
  28. 28. Check Point Compliance Blade Security Monitoring Based on Industry Best Practices ©2013 Check Point Software Technologies Ltd. 28
  29. 29. Check Point Compliance Blade In Depth Visibility to Security Status ©2013 Check Point Software Technologies Ltd. 29
  30. 30. Check Point Compliance Blade With Practical Recommendations to Improve Compliance ©2013 Check Point Software Technologies Ltd. 30
  31. 31. And Let’s Not Forget… and more… Top Statistics Events Timelines Rule Hit Count SmartLog The Best Monitoring and Security Incident Evaluation Tools ©2013 Check Point Software Technologies Ltd. 31
  32. 32. Summary Check Point Helps You Secure the Next Generation Enterprise The Security You Want. The Performance You Need. Offering BIG Security for Small Branches. Unmatched Security Visibility. ©2013 Check Point Software Technologies Ltd. 32
  33. 33. Thank You! ©2013 Check Point Software Technologies Ltd.

×