Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Proč nativní bezpečnostní nástroje nestačí

702 views

Published on

Prezentace Check Point z konference Virtualization Forum 2018
Clarion Congress Hotel Prague, 25.10.2018

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Proč nativní bezpečnostní nástroje nestačí

  1. 1. 1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Petr Kadrmas | SE Eastern Europe pkadrmas@checkpoint.com PROČ NATIVNÍ BEZPEČNOSTNÍ NÁSTROJE NESTAČÍ ADVANCED THREAT PREVENTION FOR YOUR CLOUD
  2. 2. 2©2018 Check Point Software Technologies Ltd. CLOUD = SHARED RESPONSIBILITY Customer responsible for security in the cloud Customer Data Platform, Applications, IAM Operating System, Network and FW Configs Client-side Data Encryption & Data Integrity Authentication Server-side Encryption (File System / Data) Network Traffic Protection (Encryption, Integrity, Identity) Cloud vendor responsible for security of the cloud Cloud Global Infrastructure Regions Availability Zones Edge Locations Compute Storage Database Networking
  3. 3. 3©2018 Check Point Software Technologies Ltd. CloudGuard IaaS • All the Advanced Threat Prevention features of Check Point Security Gateways and R80 Management plus: • For all these clouds ACI Automation and Orchestration Cross Environment Dynamic Policies Adaptive Security
  4. 4. 4©2018 Check Point Software Technologies Ltd. CloudGuard Advanced Protection Access Rule Next Generation Firewall Application and Data Security Advanced Threat Prevention Forensic Analysis Cloud Vendor
  5. 5. 5©2018 Check Point Software Technologies Ltd. PREVENT LATERAL THREATS BETWEEN APPLICATIONS Application Control Threat Emulation IPS Antivirus Firewall Identity Awareness DLP Networking and Clustering Anti-Bot
  6. 6. 6©2018 Check Point Software Technologies Ltd. CLOUDGUARD ADAPTIVE SECURITY Check Point Access Policy Rule From To Application Action 3 Web_SecurityGroup Object DB_VM Object MSSQL Allow 4 CRM_SecurityGroup Object SAP_SecurityGroup Object CRM Allow 5 AWS_VPC Object Azure_VNET Object ADFS Allow Drag & Drop dynamic policy with cloud objects
  7. 7. 7©2018 Check Point Software Technologies Ltd. Check Point is the only security that is designed for cloud orchestration: 1. Policy with granular delegation privileges (per rule) 2. Policy that allows simultaneous changes TRUSTED ORCHESTRATION WITH R80 APIs
  8. 8. 8©2018 Check Point Software Technologies Ltd. DEMO
  9. 9. 9©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. THANK YOU

×