SlideShare a Scribd company logo
1 of 31
Download to read offline
1
©2021 Check Point Software Technologies Ltd.
Moti Sagey | Chief Evangelist & Head of Strategic Marketing
Why Check Point
THE CHECK POINT X-
FACTOR
2
©2020 Check Point Software Technologies Ltd.
We asked 826 customers…
WHY CHECK POINT?
[Protected] Distribution or modification is subject to approval 2
3
©2020 Check Point Software Technologies Ltd.
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
X-Factor
4
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
4
5
©2020 Check Point Software Technologies Ltd.
REAL TIME PREVENTION AS A PHILOSOPHY
MALWARE DNA
ZERO
PHISHING
FP-GUARD
PUBLIC-CLOUD
AUTO
PROVISION
MOBILE APP
SCANNING
MOBILE
CODE
ANALYSIS
MOBILE SMS
PHISHING
SS7 ATTACK
PREVENTION
MEMORY
ANALYSIS
THREAT EXTRACTION
HUMAN
INTERACTION
SIMULATION
ICON
SIMILARITY
MOBILE MAN
IN THE
MIDDLE
ATTACK
DOMAIN
PREDICTION
MACHINE LEARNING
CPU LEVEL SANDBOX
HYPERVISOR
LEVEL
SECURITY
ADVANCED
JAILBREAK
PROTECTION
CAMPAIGN
HUNTING
ENDPOINT
EXPLOITATION
DETECTION
FLASH
EMULATION
URL
REPUTATION
BLUETOOTH
ATTACK
DETECTION
INTRUSION
PREVENTION
Behavior
similarity
ANTI-RANSOMWARE
IMAGE FILE
SANITIZER
DECOYS &
TRAPS
OS-LEVEL
SANDBOX
DROPPED
FILES
EMULATION
TRANSPARENT
HTTPS
INSPECTION
ENDPOINT
FORENSICS
CPU EXPLOIT
DETECTOR
STATIC
ANALYZER
ACCOUNT TAKEOVER
PREVENTION
INTELLIGENCE
COLLABORATION
MACRO ANALYSIS
FILE
FEEDER
EMBEDDED OBJECTS
INSPECTION
BEHAVIORAL
BOT PROTECTION
SMEP Detector
TARGET LOCK
6
©2020 Check Point Software Technologies Ltd.
REAL-TIME PREVENTION IN ACTION
7
©2020 Check Point Software Technologies Ltd.
REAL-TIME PREVENTION IN ACTION
ZERO PHISHING WITH HARMONY BROWSE
8
©2020 Check Point Software Technologies Ltd.
Check Point gives us universal,
automatic protection that stops
threats every day—before we
even know they’re here.
TECHNOLOGY MANAGER IN A $30B+
ENTERPRISE SAID THAT…
8
[Protected] Distribution or modification is subject to approval
9
©2020 Check Point Software Technologies Ltd.
NOT ALL VENDORS PROVIDE
REAL-TIME PREVENTION
“SHUT DOWN THE NETWORK”?!
[Protected] Distribution or modification is subject to approval 9
10
©2020 Check Point Software Technologies Ltd.
NOT ALL VENDORS PROVIDE
REAL-TIME PREVENTION
DOES NOT BLOCK
[Protected] Distribution or modification is subject to approval 10
11
©2020 Check Point Software Technologies Ltd.
Highest
scores in
BPS test
#1 in NGFW
+ AEP
combined
reports
NSS LABS: THE BEST PROTECTION AND
VALUE TO OUR CUSTOMERS
Attractive
TCO
With
Infinity
0.0% False
Positives
100% block
rate
[Protected] Distribution or modification is subject to approval 11
12
©2020 Check Point Software Technologies Ltd.
14
1
4 2
4
13
9 9
CHECK POINT PROVEN TRACK RECORD OF SECURITY EXCELLENCE
Recommended:
14/15=93%
Recommended:
60%
Recommended:
60%
Recommended:
87%
Neutral Caution Recommended
Source: http://tiny.cc/nss_stats
NSS Labs Security tests (FW/NGFW/IPS/NGIPS/BDS/BPS/AEP)
Based on NSS Labs test all four vendors participated together
1
1
2
12
13
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
13
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
14
©2020 Check Point Software Technologies Ltd.
‘’We cut the time we spend on managing security
by 80%, thanks to the simplicity of the
Check Point solution!’’
IT MANAGER OF LARGE MANUFACTURING COMPANY
SAID….
[Protected] Distribution or modification is subject to approval 14
15
©2020 Check Point Software Technologies Ltd.
YOU HAVE TO
THINK LIKE
THE
END USER …
15
[Protected] Distribution or modification is subject to approval
16
©2020 Check Point Software Technologies Ltd.
IT'S NOT THE
LOAD THAT
BREAKS YOU
DOWN,
IT'S THE WAY AND
AGONY OF
CARRYING IT…
16
[Protected] Distribution or modification is subject to approval
17
©2020 Check Point Software Technologies Ltd.
AGONY METER
17
Full reference: http://tiny.cc/agonymeter
Palo Alto & Cisco with 5Xmore menus to operate network & cloud
Agony Meter
Task
Network
Security
Total Agony Score
6Menus
1 Menu
1 3.18 2.43 3.73
Cloud
Security
29 Menus
6 Menus
17 Menus
5 Menus
29 Menus
7 Menus
18
©2020 Check Point Software Technologies Ltd.
MOST LOVED CLOUD SECURITY SOLUTIONS
19
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
19
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
20
©2020 Check Point Software Technologies Ltd. 20
THE MOST COMPLETE SECURITY
21
©2020 Check Point Software Technologies Ltd.
25/25
21/25 22/25
16/25
19/25
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
NSA Top 25 CVEs 2020
misses 16%
misses 12%
misses 36%
Check Point customers are protected – NSA top 25 CVEs
misses 24%
100%
Protection
Validated as of Nov 2nd, 2020
22
©2020 Check Point Software Technologies Ltd.
MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED…
6
16
Mature SW Code
Swift response to
SW vulnerabilities
118
295
128
228
# Total of SW vulnerabilities (2016-2020)
Average fix time
(days)
Source: vendors security advisories web pages & http://tiny.cc/urgency
[Protected] Distribution or modification is subject to approval 22
23
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
OUR X-FACTOR
BE PROUD
23
24
©2020 Check Point Software Technologies Ltd.
ANATOMY
OF
A WIN
24
“We can’t change the past, but by remembering it, we
might just change the future.” Rabbi Lord Jonathan Sacks
©2021 Check Point Software Technologies Ltd.
ANATOMY OF A WIN
WHAT WINNERS DID THAT MOVED THE NEEDLE
Introduced
Infinity
Demoed Real Time
Prevention in action
Used
Competitive Intel.
Worked closely
with the Partner
Used a
Reference
Positioned
Maestro
HyperScale
25
26
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
27
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
#2
#3
#1 #4
28
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
29
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
Security architecture sales
offer template with a
consultative approach
Scan to download
30
©2020 Check Point Software Technologies Ltd.
PREVENT CONSOLIDATE
STEP UP TO
GEN V
CLOUD SECURITY
NETWORK SECURITY SECURE USERS & ACCESS
YOUR OPPORTUNITY TO BECOME A CYBER HERO
NEW WORLD, NEW OPPORTUNITIES
31
©2021 Check Point Software Technologies Ltd.
Thank You

More Related Content

What's hot

Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey מוטי שגיא
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint e-Xpert Solutions SA
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0Happiest Minds Technologies
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examInfosec
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)Carla Nadin
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010simongreaves
 
5 things about os sharon webinar final
5 things about os   sharon webinar final5 things about os   sharon webinar final
5 things about os sharon webinar finalDevOps.com
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfawish11
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!DevOps.com
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides SlideTeam
 

What's hot (20)

Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
 
CompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
 
Escrow Presentation2010
Escrow Presentation2010Escrow Presentation2010
Escrow Presentation2010
 
5 things about os sharon webinar final
5 things about os   sharon webinar final5 things about os   sharon webinar final
5 things about os sharon webinar final
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!Security & DevOps - What We Have Here Is a Failure to Communicate!
Security & DevOps - What We Have Here Is a Failure to Communicate!
 
Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides Cybersecurity PowerPoint Presentation Slides
Cybersecurity PowerPoint Presentation Slides
 
Webinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at ScaleWebinar–Best Practices for DevSecOps at Scale
Webinar–Best Practices for DevSecOps at Scale
 

Similar to Why Check Point - Moti Sagey

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Benvira Deck
Benvira Deck Benvira Deck
Benvira Deck brand44
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastDiana Frolova
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?SecPod
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021VMware Tanzu
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayHussein Khazaal
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...SolarWinds
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV ReadyThousandEyes
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptxControlCase
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesControlCase
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesVMware Tanzu
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
roomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptxroomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptxThousandEyes
 
Continuous Verification in a Serverless World
Continuous Verification in a Serverless WorldContinuous Verification in a Serverless World
Continuous Verification in a Serverless WorldLeon Stigter
 
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVirtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVMware
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodaySymantec
 
Iveda sept general investor presentation 092614
Iveda sept general investor presentation 092614Iveda sept general investor presentation 092614
Iveda sept general investor presentation 092614RedChip Companies, Inc.
 

Similar to Why Check Point - Moti Sagey (20)

CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Benvira Deck
Benvira Deck Benvira Deck
Benvira Deck
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021Aaron Swain at VMware Tanzu Public Sector Connect 2021
Aaron Swain at VMware Tanzu Public Sector Connect 2021
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
 
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...Government and Education Webinar: How the New Normal Could Improve your IT Op...
Government and Education Webinar: How the New Normal Could Improve your IT Op...
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Getting Demo & POV Ready
Getting Demo & POV ReadyGetting Demo & POV Ready
Getting Demo & POV Ready
 
Webinar-MSP+ Cyber Insurance Fina.pptx
Webinar-MSP+  Cyber Insurance Fina.pptxWebinar-MSP+  Cyber Insurance Fina.pptx
Webinar-MSP+ Cyber Insurance Fina.pptx
 
Managing Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust PrinciplesManaging Multiple Assessments Using Zero Trust Principles
Managing Multiple Assessments Using Zero Trust Principles
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
roomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptxroomos_webinar_280923_v2.pptx
roomos_webinar_280923_v2.pptx
 
Continuous Verification in a Serverless World
Continuous Verification in a Serverless WorldContinuous Verification in a Serverless World
Continuous Verification in a Serverless World
 
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service ProvisioningVirtualization to Cloud with SDDC Operations Management and Service Provisioning
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
 
Backup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, TodayBackup Exec 15: Designing Protection for the Future, Today
Backup Exec 15: Designing Protection for the Future, Today
 
Iveda sept general investor presentation 092614
Iveda sept general investor presentation 092614Iveda sept general investor presentation 092614
Iveda sept general investor presentation 092614
 

More from Moti Sagey מוטי שגיא

More from Moti Sagey מוטי שגיא (7)

CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
 
Why Check Point - Top 4 Facts
Why Check Point  - Top 4 FactsWhy Check Point  - Top 4 Facts
Why Check Point - Top 4 Facts
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 

Recently uploaded

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 

Recently uploaded (20)

定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 

Why Check Point - Moti Sagey

  • 1. 1 ©2021 Check Point Software Technologies Ltd. Moti Sagey | Chief Evangelist & Head of Strategic Marketing Why Check Point THE CHECK POINT X- FACTOR
  • 2. 2 ©2020 Check Point Software Technologies Ltd. We asked 826 customers… WHY CHECK POINT? [Protected] Distribution or modification is subject to approval 2
  • 3. 3 ©2020 Check Point Software Technologies Ltd. WE ASKED 826 CUSTOMERS… WHY CHECK POINT? 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY X-Factor
  • 4. 4 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY WE ASKED 826 CUSTOMERS… WHY CHECK POINT? 4
  • 5. 5 ©2020 Check Point Software Technologies Ltd. REAL TIME PREVENTION AS A PHILOSOPHY MALWARE DNA ZERO PHISHING FP-GUARD PUBLIC-CLOUD AUTO PROVISION MOBILE APP SCANNING MOBILE CODE ANALYSIS MOBILE SMS PHISHING SS7 ATTACK PREVENTION MEMORY ANALYSIS THREAT EXTRACTION HUMAN INTERACTION SIMULATION ICON SIMILARITY MOBILE MAN IN THE MIDDLE ATTACK DOMAIN PREDICTION MACHINE LEARNING CPU LEVEL SANDBOX HYPERVISOR LEVEL SECURITY ADVANCED JAILBREAK PROTECTION CAMPAIGN HUNTING ENDPOINT EXPLOITATION DETECTION FLASH EMULATION URL REPUTATION BLUETOOTH ATTACK DETECTION INTRUSION PREVENTION Behavior similarity ANTI-RANSOMWARE IMAGE FILE SANITIZER DECOYS & TRAPS OS-LEVEL SANDBOX DROPPED FILES EMULATION TRANSPARENT HTTPS INSPECTION ENDPOINT FORENSICS CPU EXPLOIT DETECTOR STATIC ANALYZER ACCOUNT TAKEOVER PREVENTION INTELLIGENCE COLLABORATION MACRO ANALYSIS FILE FEEDER EMBEDDED OBJECTS INSPECTION BEHAVIORAL BOT PROTECTION SMEP Detector TARGET LOCK
  • 6. 6 ©2020 Check Point Software Technologies Ltd. REAL-TIME PREVENTION IN ACTION
  • 7. 7 ©2020 Check Point Software Technologies Ltd. REAL-TIME PREVENTION IN ACTION ZERO PHISHING WITH HARMONY BROWSE
  • 8. 8 ©2020 Check Point Software Technologies Ltd. Check Point gives us universal, automatic protection that stops threats every day—before we even know they’re here. TECHNOLOGY MANAGER IN A $30B+ ENTERPRISE SAID THAT… 8 [Protected] Distribution or modification is subject to approval
  • 9. 9 ©2020 Check Point Software Technologies Ltd. NOT ALL VENDORS PROVIDE REAL-TIME PREVENTION “SHUT DOWN THE NETWORK”?! [Protected] Distribution or modification is subject to approval 9
  • 10. 10 ©2020 Check Point Software Technologies Ltd. NOT ALL VENDORS PROVIDE REAL-TIME PREVENTION DOES NOT BLOCK [Protected] Distribution or modification is subject to approval 10
  • 11. 11 ©2020 Check Point Software Technologies Ltd. Highest scores in BPS test #1 in NGFW + AEP combined reports NSS LABS: THE BEST PROTECTION AND VALUE TO OUR CUSTOMERS Attractive TCO With Infinity 0.0% False Positives 100% block rate [Protected] Distribution or modification is subject to approval 11
  • 12. 12 ©2020 Check Point Software Technologies Ltd. 14 1 4 2 4 13 9 9 CHECK POINT PROVEN TRACK RECORD OF SECURITY EXCELLENCE Recommended: 14/15=93% Recommended: 60% Recommended: 60% Recommended: 87% Neutral Caution Recommended Source: http://tiny.cc/nss_stats NSS Labs Security tests (FW/NGFW/IPS/NGIPS/BDS/BPS/AEP) Based on NSS Labs test all four vendors participated together 1 1 2 12
  • 13. 13 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY 13 WE ASKED 826 CUSTOMERS… WHY CHECK POINT?
  • 14. 14 ©2020 Check Point Software Technologies Ltd. ‘’We cut the time we spend on managing security by 80%, thanks to the simplicity of the Check Point solution!’’ IT MANAGER OF LARGE MANUFACTURING COMPANY SAID…. [Protected] Distribution or modification is subject to approval 14
  • 15. 15 ©2020 Check Point Software Technologies Ltd. YOU HAVE TO THINK LIKE THE END USER … 15 [Protected] Distribution or modification is subject to approval
  • 16. 16 ©2020 Check Point Software Technologies Ltd. IT'S NOT THE LOAD THAT BREAKS YOU DOWN, IT'S THE WAY AND AGONY OF CARRYING IT… 16 [Protected] Distribution or modification is subject to approval
  • 17. 17 ©2020 Check Point Software Technologies Ltd. AGONY METER 17 Full reference: http://tiny.cc/agonymeter Palo Alto & Cisco with 5Xmore menus to operate network & cloud Agony Meter Task Network Security Total Agony Score 6Menus 1 Menu 1 3.18 2.43 3.73 Cloud Security 29 Menus 6 Menus 17 Menus 5 Menus 29 Menus 7 Menus
  • 18. 18 ©2020 Check Point Software Technologies Ltd. MOST LOVED CLOUD SECURITY SOLUTIONS
  • 19. 19 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY 19 WE ASKED 826 CUSTOMERS… WHY CHECK POINT?
  • 20. 20 ©2020 Check Point Software Technologies Ltd. 20 THE MOST COMPLETE SECURITY
  • 21. 21 ©2020 Check Point Software Technologies Ltd. 25/25 21/25 22/25 16/25 19/25 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% NSA Top 25 CVEs 2020 misses 16% misses 12% misses 36% Check Point customers are protected – NSA top 25 CVEs misses 24% 100% Protection Validated as of Nov 2nd, 2020
  • 22. 22 ©2020 Check Point Software Technologies Ltd. MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED… 6 16 Mature SW Code Swift response to SW vulnerabilities 118 295 128 228 # Total of SW vulnerabilities (2016-2020) Average fix time (days) Source: vendors security advisories web pages & http://tiny.cc/urgency [Protected] Distribution or modification is subject to approval 22
  • 23. 23 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY OUR X-FACTOR BE PROUD 23
  • 24. 24 ©2020 Check Point Software Technologies Ltd. ANATOMY OF A WIN 24 “We can’t change the past, but by remembering it, we might just change the future.” Rabbi Lord Jonathan Sacks
  • 25. ©2021 Check Point Software Technologies Ltd. ANATOMY OF A WIN WHAT WINNERS DID THAT MOVED THE NEEDLE Introduced Infinity Demoed Real Time Prevention in action Used Competitive Intel. Worked closely with the Partner Used a Reference Positioned Maestro HyperScale 25
  • 26. 26 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN
  • 27. 27 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN #2 #3 #1 #4
  • 28. 28 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN
  • 29. 29 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN Security architecture sales offer template with a consultative approach Scan to download
  • 30. 30 ©2020 Check Point Software Technologies Ltd. PREVENT CONSOLIDATE STEP UP TO GEN V CLOUD SECURITY NETWORK SECURITY SECURE USERS & ACCESS YOUR OPPORTUNITY TO BECOME A CYBER HERO NEW WORLD, NEW OPPORTUNITIES
  • 31. 31 ©2021 Check Point Software Technologies Ltd. Thank You