Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Moti Sagey CPX keynote _Are All security products created equal

1,532 views

Published on

Moti Sagey CPX keynote _Are All security products created equal

Published in: Internet
  • Be the first to comment

  • Be the first to like this

Moti Sagey CPX keynote _Are All security products created equal

  1. 1. 11 MOTI SAGEY | HEAD OF STRATEGIC MARKETING & INTELLIGENCE CREATED EQUAL ARE ALL SECURITY PRODUCTS ? [Protected] Distribution is subject to approval ​
  2. 2. 2 FOR THE IMAGINATION OF MAN'S HEART IS EVIL FROM HIS YOUTH THE STATE OF CYBER SECURITY TODAY Mostly Gen I-III Deployed (AV, FW, IPS) Genesis 8:21 Gen I security - AV Gen II,III security - FW + IPS
  3. 3. 3©2018 Check Point Software Technologies Ltd. GEN IV – THE ERA OF POINT SOLUTIONS
  4. 4. 4 THE CHALLENGE EVERY VENDOR WILL TELL YOU THEY HAVE THE BEST SECURITY WHAT IS THE BEST SECURITY ? HOW DO WE TEST IT? IN GOD WE TRUST, ALL OTHERS MUST BRING DATA” “ W.H DEMING
  5. 5. 5 WHAT IS THE BEST SECURITY ? GEN V SECURITY THAT IS : effective efficient everywhere
  6. 6. 6 “EFFECTIVE SECURITY”, WHAT DOES IT MEAN? IT ALL STARTS WITH THE RIGHT FOCUS
  7. 7. 7 TO KEEP YOUR BUSINESS PROTECTED 1402R&D ENGINEERS 31% OF EMPLOYEES 16% OF TOTAL 25% OF TOTAL 31% OF TOTALCHECK POINT FORTINET PALO ALTO 1402 1225 787 Source: SEC Data: Palo Alto Form 10-Q | Fortinet 10-K | Check Point 20-F
  8. 8. 8 “EFFECTIVE SECURITY”, WHAT DOES IT MEAN? WITH THE RIGHT PHILOSOPHY: REAL-TIMEPREVENTION
  9. 9. 9 HENRY FORD “IF I HAD ASKED PEOPLE WHAT THEY WANTED, THEY WOULD HAVE SAID FASTER HORSES” CHECK POINT REAL-TIME PREVENTION INNOVATIONS
  10. 10. 10 CHECK POINT REAL-TIME PREVENTION INNOVATIONS “IF I HAD ASKED PEOPLE WHAT THEY WANTED, THEY WOULD HAVE SAID FASTER HORSES” “Check Point has gained ground from an innovation standpoint and can boast one of the most complete offerings in the network security market today. “Perhaps the most impressive element of Check Point’s malware analysis approach is the ability to capture an email attachment, analyze it, and render the content for the end user or security team while the malware is mitigated.
  11. 11. 11 FIVE MINUTES NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  12. 12. 12 1MB SIZE LIMIT NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  13. 13. 13 DOES NOT BLOCK NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  14. 14. 14 “WE CAN’T HOLD ON TO A FILE “ CISCO “DETECTION NOT BLOCKING/PREVENTION” FIREEYE NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  15. 15. 15 “EFFECTIVE SECURITY”, WHAT DOES IT MEAN? WITHANUNPARALLELEDSENSEOF URGENCY
  16. 16. 16 TO MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED… 1.02 Mature SW Code Swift response to SW vulnerabilities 221.3 62 183.6 93 48.2 99 # Total of SW vulnerabilities(2016,2017) Average fix time (days) Source: vendors security advisories web pages & http://tiny.cc/urgency
  17. 17. 17 AVERAGE RESPONSE TIME FOR TOP VULNERABILITIES(IPS) IN 2017 Source: vendors security advisories web pages & http://tiny.cc/urgency
  18. 18. 18 EFFECTIVE SECURITY MUST HAVE 3RD PARTY PROVEN TRACK RECORD OF SECURITY EXCELLENCE Source: http://tiny.cc/nss_stats NSS Labs Network Security tests (FW/NGFW/IPS/NGIPS/DCIPS/BDS) * PAN NGFW solution have not been recommended since 2013 Neutral Caution Recommended
  19. 19. 19 EFFECTIVE SECURITY MUST NOT HAVE SECURITY SHORTCUTS FORWARD SEGMENTS EXCEEDING TCP CONTENT INSPECTION QUEUE INTELLIGENT-MODE :ENABLE HTTP CLIENT BODY EXTRACTION DEPTH 4000
  20. 20. 20 VULNERABLE (BYPASSED MORE THAN 100 DIFFERENT WAYS WITH VENDOR BEST PRACTICES CONFIGURATION) GOOGLE “HTTP EVADER” AND TEST FOR YOURSELF http://tiny.cc/httpevader
  21. 21. 21 EFFECTIVE SECURITY MUST NOT HAVE SECURITY SHORTCUTS PROTECTED. PERIOD. http://tiny.cc/httpevader
  22. 22. 22 WHAT IS THE BEST SECURITY ? GEN V SECURITY THAT IS : effective efficient everywhere
  23. 23. 23
  24. 24. 24
  25. 25. 25
  26. 26. 26
  27. 27. 27 CHECK POINT SOFTWARE BASED ARCHITECTURE MEANS EVERYWHERE AGILE SECURITY
  28. 28. 28 1040 9.4 Lowest Application Latency 4410 3.4 930 208.5 SOFTWARE BASED ARCHITECTURE MEANS BETTER & FASTER USER EXPERIENCE 22031.7 2140 121 UDP Latency (64 Bytes) no inspection (μsec) Application Latency (10 KB) NGFW inspection (μsec) Source: Shadow Peak INC.
  29. 29. 29 160+TECHNOLOGY PARTNERS CHECK POINT PROVIDES ITS CUSTOMERS THE BEST SECURITY EVERYWHERE WITH THE INDUSTRY’S LARGEST SECURITY ECOSYSTEM
  30. 30. 30 WHAT IS THE BEST SECURITY ? GEN V SECURITY THAT IS : effective efficient everywhere
  31. 31. 31 OPERATIONAL EFFICIENCY MAN HOURS REQUIRED FOR YEARLY MANAGEMENT OF 50 GATEWAYS PER SITE “The Check Point management remains the de facto “GOLD STANDARD” against which other consoles are measured” Gartner 1000 1500 1500 2000 2000 Source: Shadow Peak INC.
  32. 32. 32 THE WHY - UNMATCHED UNIFIED ACCESS POLICY ONECONSOLE.ONEUNIFIEDPOLICY.
  33. 33. 33©2018 Check Point Software Technologies Ltd. FIGHTING OBJECTIONS AND FUD (Fear, Uncertainty & Doubt) [Confidential] ONLY for designated groups and individuals​
  34. 34. 34©2018 Check Point Software Technologies Ltd. FIGHTING OBJECTIONS AND FUD (Fear, Uncertainty & Doubt) [Confidential] ONLY for designated groups and individuals​
  35. 35. 35©2018 Check Point Software Technologies Ltd. FIGHT OBJECTIONS AND FUD (Fear, Uncertainty & Doubt) WITH FUD = FACTS, UNDERSTANDING AND DETAILS [Confidential] ONLY for designated groups and individuals​ To be bigger than your peer, there is no need to pull him down. Simply elevate yourself!” Maharash
  36. 36. 36
  37. 37. 37 THE PEOPLE WHO WILL GET YOU THERE 1402R&D ENGINEERS 31% OF EMPLOYEES 1402 1225 787PALO ALTO FORTINET CHECK POINT 31% OF TOTAL 25% OF TOTAL 16% OF TOTAL Source: SEC Data: Palo Alto Form 10-Q | Fortinet 10-K | Check Point 20-F
  38. 38. 3838 THANK YOU http://tiny.cc/genv

×