Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013

944 views

Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013

  1. 1. ©2013 Check Point Software Technologies Ltd.“Sicuri nel Cloud”.A complete multi-layer approach.Paolo MarraffaChannel Managerpmarraffa@checkpoint.com
  2. 2. 2©2013 Check Point Software Technologies Ltd.3D Security - Check Point Multi-Layer Threat PreventionAgendaCheck Point Security Report 2013CHECK POINT: Your Trusted Security PartnerSecurity Management & 3D Security Analysis
  3. 3. 3©2013 Check Point Software Technologies Ltd.Security Focus and Leadership► $1.34 Billion (Revenue)2012 revenue, 15.17% CAGR 2006-2012Software Blades strategy fueling growth► 100% (Security)Pure focus on securityAll of Fortune 500 are Check Point customers► Network Security LeaderTop Ranked NGFW by NSS Labs, Gartner, SC Magazine“Leader” in Gartner Enterprise Firewall for 16th yearWho should you trust to secure your business?
  4. 4. 4©2013 Check Point Software Technologies Ltd.Award Winning Security ProductsBest IPS/IDS ProductReader TrustAward20132013Best IPS/IDS ProductReader TrustAward2013Leader, MagicQuadrant EnterpriseNetwork Firewall2004–20132004–2013Leader, MagicQuadrant EnterpriseNetwork Firewall2004–2013Leader, MagicQuadrant MobileData Protection2001–20122001–2012Leader, MagicQuadrant MobileData Protection2001–2012NGFW Earns“Recommend”Rating from NSS20132013NGFW Earns“Recommend”Rating from NSS2013IPS Earns“Recommend”Rating from NSS20122012IPS Earns“Recommend”Rating from NSS2012Leader, MagicQuadrant - UTM2010–20122010–2012Leader, MagicQuadrant - UTM2010–2012Computing SecurityAwards SecurityCompany of the Year20122012Computing SecurityAwards SecurityCompany of the Year2012Network SecurityVendor of the Year20122012Network SecurityVendor of the Year2012Firewall Earns“Recommend”Rating from NSS2013Best FirewallReader TrustAward20132013Best FirewallReader TrustAward2013
  5. 5. 5©2013 Check Point Software Technologies Ltd.World-Class Global SupportAward-winning, world-class supportAlways-on 24x7 coverageBest-in-class electronicsupport toolsWorldwide materialinventoryOnline support in 150countries and 1,000metropolitan areasDallasTACTel AvivTACTokyoTACOttawaTACStockholmEndpoint Escalation
  6. 6. 6©2013 Check Point Software Technologies Ltd.
  7. 7. 7©2013 Check Point Software Technologies Ltd.Multiple sources of dataSensorNet3DReportsThreatCloud
  8. 8. 8©2013 Check Point Software Technologies Ltd.A comprehensive survey888 companies1,494 gateways120,000 Monitoring hours112,000,000 security events
  9. 9. 9©2013 Check Point Software Technologies Ltd.40%40%20%39%14%10%7%4%26%A comprehensive survey% of companiesAmericasEMEAAPACIndustrialFinanceGovernmentTelcoConsultingOtherBy geography By sector
  10. 10. 10©2013 Check Point Software Technologies Ltd.We will talk about 3 issues…Threatsto theorganizationRiskyenterpriseapplicationsData lossincidents inthe network
  11. 11. 11©2013 Check Point Software Technologies Ltd.The 3 Steps of Modern AttacksSocialengineeringIdentify targetGather informationLaunch attackMalwareinjectionAttack arrivesUser clicksExploit executesMalware installedComputer controlledWaits for instructionRemotecontrol
  12. 12. 12©2013 Check Point Software Technologies Ltd.Another day, another major hack
  13. 13. 13©2013 Check Point Software Technologies Ltd.2012: the year of hacktivismArab SpringPolitical freedomFoxconWorking conditionsJustice DepartmentAnti-corruptionVaticanUnhealthy transmittersUN ITUInternet deep packet inspection
  14. 14. 14©2013 Check Point Software Technologies Ltd.This does not affect me, right?
  15. 15. 15©2013 Check Point Software Technologies Ltd.The majority of companies are infected100% = 888 companies63% of organizations are infectedwith bots63%
  16. 16. 16©2013 Check Point Software Technologies Ltd.Once in … always onCommunicatingwith command& control every21minutes
  17. 17. 17©2013 Check Point Software Technologies Ltd.Top 2012 Bots
  18. 18. 18©2013 Check Point Software Technologies Ltd.Exploit kits are easy to buyRental costsOne day – 50$Up to 1 month – 500$3 month – 700$Rental costsOne day – 50$Up to 1 month – 500$3 month – 700$Availableonline
  19. 19. 19©2013 Check Point Software Technologies Ltd.But there is more than Bots, right?MalwareINSIDEHow does malwareget to my network?
  20. 20. 20©2013 Check Point Software Technologies Ltd.75% of organizations, a host accessesa malicious websiteSource: Check Point 2013 Security ReportIn75%
  21. 21. 21©2013 Check Point Software Technologies Ltd.Going to the wrong places…
  22. 22. 22©2013 Check Point Software Technologies Ltd.Downloading malware all the time53%of organizations sawmalware downloads
  23. 23. 23©2013 Check Point Software Technologies Ltd.…and againThreatsto theorganizationRiskyenterpriseapplicationsData lossincidents inthe network
  24. 24. 24©2013 Check Point Software Technologies Ltd.No longer a game
  25. 25. 25©2013 Check Point Software Technologies Ltd.What are risky applications?Bypassing security orhiding identityDo harm withoutthe user knowing itP2P file sharingAnonymizersFile sharing / storageSocial networks
  26. 26. 26©2013 Check Point Software Technologies Ltd.The risk of anonymizersBypasses securityinfrastructureUsed by botnets tocommunicateHide criminal,illegal activity
  27. 27. 27©2013 Check Point Software Technologies Ltd.Anonymizers inside the corporation47%of organizationshad users ofAnonymizers(80% were not aware thattheir employees useAnonymizers)100% = 888 companies
  28. 28. 28©2013 Check Point Software Technologies Ltd.The risk of P2P ApplicationsDownloading thelatest “MasterChef”episode right now…Pirated content liabilityMalware downloads“Back door” network access
  29. 29. 29©2013 Check Point Software Technologies Ltd.P2P inside the corporation100% = 888 companies61% of organizations, a P2P filesharing application is used61%55%EMEA%APAC7262%Americas
  30. 30. 30©2013 Check Point Software Technologies Ltd.Main takeaways…61% of organizations had a P2Pfile sharing app in use47% of organizations had users ofanonymizers
  31. 31. 31©2013 Check Point Software Technologies Ltd.…last but not least!Threatsto theorganizationRiskyenterpriseapplicationsData lossincidents inthe network
  32. 32. 32©2013 Check Point Software Technologies Ltd.Many types of data leaked
  33. 33. 33©2013 Check Point Software Technologies Ltd.How common is it?54%of organizationsexperienced dataloss
  34. 34. 34©2013 Check Point Software Technologies Ltd.PCI compliance can be improvedOf financial organizations sent creditcard data outside the organization
  35. 35. 35©2013 Check Point Software Technologies Ltd.We have all had this problemError 552: sorry, that message exceedsmy maximum message size limitDropbox?YouSendIt?Windows Live?
  36. 36. 36©2013 Check Point Software Technologies Ltd.Storing and Sharing applications80%of organizationsuse file storageand sharingapplications100% = 888 companies
  37. 37. 37©2013 Check Point Software Technologies Ltd.Top sharing and storage apps705125221310DropboxWindows LiveCurlYouSendItSugarsyncPutLocker% of organizationsBut sharing is notalways caring…
  38. 38. 38©2013 Check Point Software Technologies Ltd.We talked about three issuesThreatsto theorganizationRiskyenterpriseapplicationsData lossincidents inthe network
  39. 39. 39©2013 Check Point Software Technologies Ltd.BLOCKING external threatsFW AVIPSAntiBotURLFEmulation
  40. 40. 40©2013 Check Point Software Technologies Ltd.ENABLING secure application useURLFilteringAntivirusApplicationControlEndpoint
  41. 41. 41©2013 Check Point Software Technologies Ltd.PREVENTING data lossDocumentSecurityDLPDataEndPoint/EncryptionApplicationControlUsercheck
  42. 42. 42©2013 Check Point Software Technologies Ltd.MANAGING incidents and protectionsSmartEventSmartLogSmartDashboard
  43. 43. 43©2013 Check Point Software Technologies Ltd.EnforcementMulti-layer controls for strong and effectivesecurityDifferent People – Different needsInvolve & Engage users in the securityprocessPeoplePractical and relevant to your business anddaily operationsPoliciesThe Secret on How to Be #1 NGFW:3D Security framework
  44. 44. 44©2013 Check Point Software Technologies Ltd.Check Point Security SolutionsIAS andOpen server2012 AppliancesAllDeploymentsAllPlatformsAllProtections Software Blades
  45. 45. 45©2013 Check Point Software Technologies Ltd.What is a Software Blade?It’s a Security Building Block That Is:Independent ModularCentrallyManaged
  46. 46. 46©2013 Check Point Software Technologies Ltd.Check Point Software BladesIntegratedEnd-to-EndSecurityFlexible andSimpleProtect ExistingInvestmentThe Architecture That Revolutionizesthe Way You Do IT SecurityIndependentModularCentrallyManaged
  47. 47. 47©2013 Check Point Software Technologies Ltd.Easy DeploymentApplication ControlIdentify and control usage ofthousands of applications based onuser and machine identity.One-click activation of software bladesFrom the central management console
  48. 48. 48©2013 Check Point Software Technologies Ltd.Check Point Security Appliance LineUltra High-EndDatacenter GradeEnterprise GradeSmall Office /DesktopSECURITY FORENTIRE RANGE12000 Appliances4000 Appliances2200 Appliance61000 System and21000 Appliances
  49. 49. 49©2013 Check Point Software Technologies Ltd.Virtualized Security ScenariosOffice in a BoxUse Security Gateway Virtual Edition (VE) withfirewall, IPS, VPN and other Software Blades tosecure your office networks and assetsVEHypervisorEnterprise Security GatewaysConsolidate your Security Gateways deploymentinto a virtualized environmentVEHypervisorVE VESecure the Virtual EnvironmentUse Security Gateway Virtual Edition to apply,for example, granular firewall, IPS and AV policiesfor inter-VM trafficHypervisorHypervisor ConnectorVE
  50. 50. 50©2013 Check Point Software Technologies Ltd.Highest Ranked SecurityFor Firewall, Next Gen Firewall and IPSProfile basedCentral ManagementSimplified Web basedLocal ManagementNew Check Point 1100 Appliance10x1GbEPort densityWireless AccessSecured Wireless Access & Guest AccessOffering BIG SECURITY for small branchesOffering BIG SECURITY for small branches
  51. 51. 51©2013 Check Point Software Technologies Ltd.New Check Point 600 SMB ApplianceSmall Size. BIG Security.Small Size. BIG Security.
  52. 52. 52©2013 Check Point Software Technologies Ltd.Security PolicyConfiguration and updates…and Cloud-based Management Service…and Cloud-based Management Service
  53. 53. 53©2013 Check Point Software Technologies Ltd.More Security, Additional PowerThe Security You WantThe Performance You NeedDLPApplicationControlIPSURLFilteringIdentityAwarenessAnti-Spam& EmailSecuritySoftware BladesAnti-BotThreatEmulationAntivirus &Anti-MalwareFirewall &VPN
  54. 54. 54©2013 Check Point Software Technologies Ltd.What about your Security Spending?Source: ISC(2), 2013According to 12,396 security professionals,spending on security during 2013 will:
  55. 55. 55©2013 Check Point Software Technologies Ltd.Security Consolidation =Tighter controlComprehensivevisibilityEasier to manageCost effectiveBetter Security
  56. 56. 56©2013 Check Point Software Technologies Ltd.Today’s Security NeedsDiscover and block threats in real timeSecure use of Web 2.0 tools and dataComprehensive understanding of security eventsLook beyond IP – define security by user identity
  57. 57. 57©2013 Check Point Software Technologies Ltd.Define Security by user identityGranular securityper user,Security following the user !user-group and machine
  58. 58. 58©2013 Check Point Software Technologies Ltd.Multi Layered Threat Prevention - IPSProtect Against Exploit of Vulnerabilities in:Word, Excel, PDF, Browsers, Operating Systems...Stop attacksexploitingvulnerabilities
  59. 59. 59©2013 Check Point Software Technologies Ltd.Block Malware File Download andAccess to Malware Containing SitesBlock MalwareDownloadMulti Layered Threat Prevention - AV
  60. 60. 60©2013 Check Point Software Technologies Ltd.Post Infection Solution toStop Data Theft and Targeted APT AttacksDiscover and stopBot AttacksMulti Layered Threat Prevention –Anti-BOT
  61. 61. 61©2013 Check Point Software Technologies Ltd.Check Point Anti-Bot Software BladePrevent botdamagesDiscoverinfectedmachinesIntegratedThreatPreventionAnti-BotSoftware BladeCommandand Control
  62. 62. 62©2013 Check Point Software Technologies Ltd.Prevent exploit ofknown vulnerabilitiesBlock download ofknown malwareUnknown ThreatsBlock BotCommunicationReal Time Security CollaborationPowered by ThreatCloudIPSAnti-BotAntivirus? Fighting UnknownThreats??ThreatEmulation…and what about Zero-Day attacks?
  63. 63. 63©2013 Check Point Software Technologies Ltd.Check Point Threat Emulation SW BladeFight AgainstUnknown Threats !Stop Targeted Zero-day Attacks
  64. 64. 64©2013 Check Point Software Technologies Ltd.Threat Emulation – Step by StepSecurityGatewayInternetDownload filesent to ThreatEmulationFile Inspectedin virtualsandboxNew malwaresignature sentto ThreatCloudNew attackdiscoveredMalware isblocked onthe gatewayMonitor unexpected behavior:Network activityFile system & registrychangesProcess activity
  65. 65. 65©2013 Check Point Software Technologies Ltd.Multi Layered Threat Prevention –ThreatCloud™Powering Threat Prevention Software Bladeswith Real-time Security IntelligenceGlobal collaborationto fight new threats
  66. 66. 66©2013 Check Point Software Technologies Ltd.Check Point DDoS Protector™Customized multi-layered DDoS protectionProtects against attacks within secondsIntegrated security management and expert support
  67. 67. 67©2013 Check Point Software Technologies Ltd.Check Point Multi LayeredThreat Prevention
  68. 68. 68©2013 Check Point Software Technologies Ltd.Control all aspects of Web (2.0)Websites ApplicationsFacebook ChatGranularitybeyond URLsNot URL-basedwww.hackthissite.orgwww.hackthissite.orgwww.fantasyfootball.comwww.fantasyfootball.com Application Controlwww.poker.comwww.poker.comwww.playboy.comwww.playboy.comURL Filtering
  69. 69. 69©2013 Check Point Software Technologies Ltd.Application Control Software BladeApplication Control Software Bladeappwiki.checkpoint.comDetect and ControlOver 4,900 ApplicationsOver 240,000 Social Network WidgetsOver 130 CategoriesUser-defined applicationsUser and user-group granularity
  70. 70. 70©2013 Check Point Software Technologies Ltd.URL Filtering Software BladeURL Filtering Software BladeOver 200 million URLsConstantly updatedCloud-based categorizationUser-defined Sites/CategoriesUser and user-group granularity
  71. 71. 71©2013 Check Point Software Technologies Ltd.Unified URL Filtering and AppControlWebsites ‒URL FilteringApplications ‒ApplicationControlUser CheckActionsUser/GroupGranularity!
  72. 72. 72©2013 Check Point Software Technologies Ltd.Check Point UserCheck™ TechnologyUnderstand usage needs,while enforcing policyMakes Webcontrol morepracticalAsks users toconfirm usage inreal-timeAskhttp://www.youtube.comNeed to watch product demohttp://www.youtube.comInternet Access PolicyJohn Smith,According to the company policy, access toYouTube is intended for work-related use only.This is work related. Reason below:Need to watch product demoCancel OK
  73. 73. 73©2013 Check Point Software Technologies Ltd.Mobile Access Software BladeSecure communicationto the organizationUnified managementand reportingSimply connect from anymobile deviceSimple and Secure Corporate AccessFrom Mobile Devices
  74. 74. 74©2013 Check Point Software Technologies Ltd.Flexible, Secure Connectivity fromAny Mobile DeviceBusinessMobile Device:Web portal to business applicationsBest for: Intranet, Outlook Web Access (OWA),SharePoint, WikiMobile Device:Secure communication running local appsBest for: Expense reports, remote IT server management,CRM, HR, remote desktop, file server accessLaptop:Simple portal interface from browser forinternal Web accessBest for: Intranet, Outlook Web Access (OWA),SharePoint, Wiki
  75. 75. 75©2013 Check Point Software Technologies Ltd.Check Point Mobile for iOS andAndroidCheck PointMobilePortal for business Web appsSingle sign onEncrypted communicationSecure Business MailDoc Security & Sandbox protection
  76. 76. 76©2013 Check Point Software Technologies Ltd.Secureaccess fromsmartphonesSecureaccess fromPC & MacCheck Point Mobile AccessSecureMailVPN AppWeb Portalfor BusinessApplicationsVPN ClientMobile AccessSoftware Blade on aCheck Point Gateway
  77. 77. 77©2013 Check Point Software Technologies Ltd.Check Point Security Management• Better Operational efficiency• Greater Security consistency• Higher visibility
  78. 78. 78©2013 Check Point Software Technologies Ltd.Check Point Simplified 1-StepPolicy CreationCheck Point Provides 1-Step Policy Creation
  79. 79. 79©2013 Check Point Software Technologies Ltd.Let’s see some of it in Action…
  80. 80. 80©2013 Check Point Software Technologies Ltd.Check Point SmartLog - Simple LogSearchesSimple Log Analysis with 360o VisibilityCheck PointSmartLog providessimple, intuitivesearchCheck Point split-second search results provideinstant visibility into billions of log recordsJohn Smith yesterdayu1
  81. 81. Slide 80u1 Need to fix product name Etude on this slide in two places.username; 28/09/2012
  82. 82. 81©2013 Check Point Software Technologies Ltd.Granular Control of All Security LayersGranularVisibilityMobileAccessIdentityAwarenessDLPIPSec VPNSmartEventThreatEmulationIPSAnti-BotAntivirusAnti-Spam& EmailSecurityApplicationControlURLFWebSecurity
  83. 83. 82©2013 Check Point Software Technologies Ltd.SmartEventUnified view of all security eventsGeo-location views and analysis of security eventsHistorical views with timeline analysisCorrelations and forensics activitiesReports…and more!SmartEventTranslates SecurityInformation into Action!Complemented by SmartEvent for Overall SecurityAnalysis and Forensics
  84. 84. 83©2013 Check Point Software Technologies Ltd.Consolidated Visibility: SmartEventUnified event analysis with 360° visibility across Software BladesHigh-level view with drill down to policy
  85. 85. 84©2013 Check Point Software Technologies Ltd.…not just the right logs!Translate Security Information into Action!
  86. 86. 85©2013 Check Point Software Technologies Ltd.ComplianceCompliance Software BladeCheck Point Presents:Check Point Presents:The first integrated and fully automatedsecurity and compliance monitoringThe first integrated and fully automatedsecurity and compliance monitoring
  87. 87. 86©2013 Check Point Software Technologies Ltd.Library of Security Best Practices
  88. 88. 87©2013 Check Point Software Technologies Ltd.360° Visibility of compliance statusDetailed Compliance Analysis
  89. 89. 88©2013 Check Point Software Technologies Ltd.Detailed Compliance Analysis
  90. 90. 89©2013 Check Point Software Technologies Ltd.Out of the Box Audit Preparation
  91. 91. 90©2013 Check Point Software Technologies Ltd.Real-Time Assessmentof major regulations across Check Point Software BladesRegulatory Compliance Monitoring
  92. 92. 91©2013 Check Point Software Technologies Ltd.ISO27001PCI-DSSGLBANIST800-41HIPAAISO27002Cobit4.1Complex Regulatory RequirementsFrom Regulations to Security Best Practices
  93. 93. 92©2013 Check Point Software Technologies Ltd.Real Time Compliance Alerts
  94. 94. 93©2013 Check Point Software Technologies Ltd.Actionable Management
  95. 95. 94©2013 Check Point Software Technologies Ltd.Other VendorsSo why Check Point?
  96. 96. 95©2013 Check Point Software Technologies Ltd.
  97. 97. 96©2013 Check Point Software Technologies Ltd.3D Security Analysis Report tool
  98. 98. ©2013 Check Point Software Technologies Ltd.Thank you!Paolo MarraffaChannel Managerpmarraffa@checkpoint.comMob: +39 334 8879772

×