11
COMPLETE SECURITY
2©2020 Check Point Software Technologies Ltd.
IoT
WORKLOADS
COMPLETE SECURITY
WE SECURE 50+ TYPES
OF ASSETS CLOUD
MOBILE
Android 4.0 & up
7-10 32/64-bit
x10.8- x10.12
NETWORKS
ENDPOINT
iOS 9.0 & up
TCPUDP IP
3
Python
Code scan
Terraform
Integration
Open
Source
Vulnerability
Scanning
1
2
3
4
5
Anti-
ransomware
Context
aware
detection
Zero
phishing
Account
takeover
Malware
evasion
resistance
Huntress
Domain
reputation
Anti
Phishing
Anti
Spam
URL
reputation
VPN
Firewall
URL
filtering
Application
Control
Cloud
Native
Access
Identity
Awareness
IP
reputationAnti-bot
Anti-virus
Intrusion
prevention
Campaign
hunting
Threat
emulation
Threat
extraction
Malware
DNA
CPU-level
inspection
Mobile
Apps
Security
SDN
Micro
Segmentation
DLP
Remote
access
DDoSSD-WAN
LAMBDA
Compliance
Cloud
Bot
remediation
WAAP
Dynamic
Code
Analysis
Binary
Vulnerability
scanning
Container
Zero Trust
IaaS
Compliance
Static
Code
Analysis
Vulnerability
management
Hidden
Attacks
One-line
API
Linux
UEBA
Linux
Hardening
Linux
Run-time
security
COMPLETE SECURITY
WITH 60+
SECURITY SERVICES
5Code & API Security
1Prevent Known
3Zero Trust Access
2Prevent Unknown
Prevent Known1
Prevent Unknown2
Zero Trust Access3
Hardening & Compliance4
Code & API Security5
GDPR
SOC
HIPA
4 Hardening &
Compliance
©2020 Check Point Software Technologies Ltd.
4
Python
Code scan
Terraform
Integration
Open
Source
Vulnerability
Scanning
1
2
3
4
5
Anti-
ransomware
Context
aware
detection
Zero
phishing
Account
takeover
Malware
evasion
resistance
Huntress
Domain
reputation
Anti
Phishing
Anti
Spam
URL
reputation
VPN
Firewall
URL
filtering
Application
Control
Cloud
Native
Access
Identity
Awareness
IP
reputationAnti-bot
Anti-virus
Intrusion
prevention
Campaign
hunting
Threat
emulation
Threat
extraction
Malware
DNA
CPU-level
inspection
Mobile
Apps
Security
SDN
Micro
Segmentation
DLP
Remote
access
DDoSSD-WAN
LAMBDA
Compliance
Cloud
Bot
remediation
WAAP
Dynamic
Code
Analysis
Binary
Vulnerability
scanning
Container
Zero Trust
IaaS
Compliance
Static
Code
Analysis
Vulnerability
management
Hidden
Attacks
One-line
API
Linux
UEBA
Linux
Hardening
Linux
Run-time
security
COMPLETE SECURITY
WITH 60+
SECURITY SERVICES
Prevent Known1
Prevent Unknown2
Zero Trust Access3
Hardening & Compliance4
Code & API Security5
GDPR
SOC
HIPAA
©2020 Check Point Software Technologies Ltd.
5
THE MOST COMPLETE SECURITY
OVER 60 SECURITY
SERVICES
PROTECTING 50+
TYPES OF ASSESTS
©2020 Check Point Software Technologies Ltd.
6
NETWORK
Shared
Threat Intelligence
Multi & Hybrid Cloud
Headquarters Branch
Access Control
Multi Layered Security
Advanced Threat Prevention
Data Protection
Access Control
Multi Layered Security
Advanced Threat Prevention
Wi-Fi, DSL, PPoE Ready
MOBILE
Network Protection
Device Protection
App Protection
Capsule
WorkSpace/Docs
Remote Access
Secure Business Data
Protect Docs Everywhere
ENDPOINT
Anti-Ransomware
Forensics
Threat Prevention
Access/Data Security
Access Control
Secure Media
Secure Documents
CLOUD
SaaS, Email Security
Consolidated
Security Management
SD-WAN
INTERNET of THINGS
Risk Analysis, Auto Segmentation, Threat Prevention
Runtime Workload Protection
Cloud Posture Management Network Traffic Analysis
Cloud Access Control, Prevention Branch Threat Prevention
THE MOST COMPLETE SECURITY
7©2020 Check Point Software Technologies Ltd.
MANAGEMENT
Consolidated
Security
Management
THREAT
INTELLIGENCE
MOBILE
Network Protection
Device Protection
App Protection
Capsule
WorkSpace/
Docs
Remote Access
Secure Business
data
Protect docs
everywhere
ENDPOINT
Anti-Ransomware
Forensics
Threat Prevention
Access/Data Security
Access Control
Secure
Media
Secure Documents
CLOUD
Headquarters Branch
Access Control
Multi Layered Security
Advanced Threat
Prevention
Access Control
Multi Layered Security
Advanced Threat
Prevention
Wi-Fi, DSL, PoE Ready
NETWORK
Email, Serverless, Workloads, Infrastructure, and Posture Management
Identity
Protection
Sensitive Data Protection
Zero-Day Threat Protection
End-to-end SaaS Security
Advanced
Threat Prevention
Adaptive Security
Automation and
Orchestration
Visibility, Cross
Environment Policies,
Remediation
Hybrid Cloud
Data Protection
SD-WAN
THE MOST COMPLETE SECURITY
8
MOBILE
CYBERSECURITY
ECOSYSTEM
Shared Threat Intelligence
MANAGEMENTNETWORK
CLOUD
9
UNIFIED SECURITY ACROSS ALL ASSETS
EndpointsMobile OSs
Serverless
Environments
PlatformsIoT
Data CentersBranches
Cloud accounts
Web
ApplicationsContainers
Mobile Apps
SaaS Apps
PaaS
services
©2020 Check Point Software Technologies Ltd.

Check point Infinity Overview

Editor's Notes

  • #2 As we strive to offer the best possible cyber security technology, we started researching and introducing AI-based engines across our Threat Prevention platform, in different capacities, and I’d like to tell you about a few of these engines and the success we are seeing with them
  • #9 Check Point provides a rich set of APIs to integrate third party security tools as part of the broader security infrastructure. Check Point enables you to build a single, cohesive security posture while making your security team more efficient and effective in their operations. Check Point delivers that comprehensive and timely threat intelligence across all of your enforcement points. Through Check Point ThreatCloud, all enforcement points in your network, cloud and mobile are armed with threat intelligence derived from multiple external feeds, internal research, and indicators from Check Point customers around the world. While ThreatCloud provides the foundation, we understand that any security infrastructure likely includes additional products and data sources.
  • #10 Data tube – baseline for all logs, registration process Sourceguard – CI/CD of GitLab on CVE vulnerabilities – Currently in POC Shift – CloudGuard IaaS – injection of IaaS into cloud