SlideShare a Scribd company logo
©2016 Check Point Software Technologies Ltd. All rights reserved. [Restricted] ONLY for designated groups and
individuals
Q3, 2016 | 1
ITEM 1: THIRD-PARTY FINDINGS
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS:
 Efficacy : Cisco quotes NSS-BDS 2016 results where it indeed scored 100% and Check Point Scored 99.4% (both great
results) , what is not mentioned that Cisco used 2 products to achieve that score (Firepower and AMP endpoint) where Check
Point used 1
 If comparing apples-to-apples NGFW solutions which is the scope of THEIR COMPARISON , if we take the latest NSS NGFW
test, check point scored 99.8% security efficacy where cisco missed 2900% more exploits than check point (see more here)
 Time to Detection: not clear why they represent it like this , in fact Check Point average response was ~50% faster than Cisco
(see more here)
WHAT
 CISCO PUBLISHED A COMPETITIVE COMPARISON OF ITS NGFW SOLUTION VS. OTHER VENDORS (PAN,
FORTINET, CHECK POINT) : http://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html
 THE COMPARISON CONTAINS SOME INACCURACIES ABOUT CHECK POINT
 THE BELOW CONTAINS FUD – FACTS, UNDERSTANDING AND DETAILS ABOUT CISCO COMPARISON IN
REGARDS TO CHECK POINT
CHECK POINT RESPONSE TO CISCO NGFW COMPETITIVE
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 2: SECURITY FEATURES
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate:
1. Continuous analysis and retrospective detection – supported (in Early Availability )
2. Network file trajectory – supported (SandBlast Agent)
3. Impact assessment – supported (SmartEvent, Sandblast)
4. Security automation – supported (R80)
5. Behavioral IOC – supported (Anti-bot)
6. User, network, endpoint awareness – supported (across all products)
7. NGIPS – supported , with the highest security effectiveness in the industry (according to NSS LABS)
8. Integrated ATP – supported (Sandblast suite)
9. Malware remediation – supported (SandBlast Agent)
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 3: OPERATIONAL CAPABILITIES
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate (except the claim that our management is excellent):
1. Scanning architecture: Check Point supports parallel processing (more info here 1:19)
2. Software-based segmentation : supported (actually with Cisco TrustSec & ACI , but also NSX, Azure, Aws,OpenStack and
more)
3. Automatic threat containment : supported (actually with the same Cisco ISE , but also with cooperative enforcement )
4. Operations and management : we agree it is indeed excellent
5. Different API’s : supported (REST API ,SANDBLAST API, similar to their proprietary ones)
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 4: ICS/SCADA
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate (except the first and last statement):
1. Base feature set : Check Point includes all relevant protections for SCADA
2. SCADA rules : rules meaning numbers of signatures and AVC , check point supports over 1,000 “rules” (more than 800
SCADA detectors , more than 300 IPS signatures)
For a more accurate comparison, read the “zero tolerance” report here) below a recap
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
ITEM 6: THREAT INTELLIGENCE
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are inaccurate:
Check Point ThreatCloud holds over 30M of IOC’s (files, hashes, domains, URL), with more than half a million unique samples per day
ITEM 7: SERVICE PROVIDER
CISCO CLAIM
CHECK POINT FACTS, UNDERSTANDING & DETAILS
Cisco claims are mostly accurate, though shows their weakness:
Cisco uses third-part stitching (mostly as a concept except Radware), where check point can provide best of breed in house solution
©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and
individuals
Q3, 2016 | 2
Competitive Cheat Sheet
THE CHECK POINT ADVANTAGE
Unbeatable security & best management efficiency with predictable performance in the real world
Strongest Protection with Multi-Layer Security
 Industry-leading security award winning Next Generation Firewall
- Leader in Gartner's 2016 Magic Quadrant of Enterprise Network Firewall (NGFW), since 1997
- Recommended rating in NSS Labs 2016 Breach Detection System test (BDS)
- Recommended in NSS Labs 2016 Next-Gen Firewall test (NGFW)
Best management and visibility
 Easily control over 7,270 apps, 264,256 internet widgets and 200M websites by user, group, or OU
 Protect clear and encrypted traffic against data breaches with strong DLP
 Provide simple and secure corporate access from all mobile and fixed endpoints
Most efficient security consolidation while keeping predictable real world performance
 Predictable real-world performance with Security Power (SPU)
 Lowest management labor time according to NSS
 Industry’s only true unified management and reporting solution covering all aspects of security
CISCO FACTS
Security: with its integrated Sourcefire solution, Cisco provides partial security solution
 Cisco ASA equipment affected by severe vulnerability – (Read more: http://goo.gl/B6IVKR)
 Vulnerable to a full inspection bypass, allowing an attacker to bypass malware detection mechanisms (https://goo.gl/VwCELc)
 Cisco Botnet filter lacks core components to detect network behavioral anomalies
 Cisco has limited visibility of risk with 68 P2P/File sharing types vs. Check Points 342+
 The APP Gap: Cisco has limited application awareness with ~4,366 apps vs. Check Point over 7,270
 Cisco management has multiple vulnerabilities (CSRF - http://goo.gl/I9ukZP) and (Cross-Site Scripting http://goo.gl/cRXw0n)
 Cisco new unified image Firepower Threat Defense (FTD) has many limitations and missing features such as High
Availability, remote access VPN, multiple context, QoS, PBR, etc.
 Cisco has 3 separate images (ASA, FirePOWER and FTD) for different appliances lines and different managements which adds
to deployment complexity and increase admin labor time
Management: with its Sourcefire integrations, Cisco solution requires two separate management Interfaces
 Cisco needs 3 separate management consoles to properly manage Threat Prevention, Content Security, and 3
rd
party event
analysis (Splunk, Logrythm) (vs. 1 from Checkpoint). In some cases with cisco CSM (core FW) is also needed
 Cisco needs an added Security Administrator headcount compared to Check Point due to cumbersome management
interface (according to 3rd party analysts)
 Cisco lacks an Event Analysis solution—no correlation of security events leads to lack of visibility & added management time
 Cisco troubleshooting with FirePOWER management, requires an admin to look at seven different categories for threat
prevention and Next-Gen logs
 Cisco central management lacks some basic multi-domain tasks such as Global IPS, Global services, Global VPN
Performance: Cisco very high price performance makes it a less attractive solution
 Cisco is limited in regards to VPN setup rate with 95% less tunnels comparing Check Point
 Cisco fastest appliance performs only 225Gbps of Firewall throughput (Check Point’s is 400Gbps)
 Cisco shows very high cost performance (x3 times more than Check Point )
 Cisco-FirePOWER SSP20,40,60 with FirePOWER services and 4000 series show very low performance throughputs
compared to Check Point parallel appliances
FOR MORE FACTS SEE “WINNING AGAINST“SLIDE DECK IN
COMPETITIVE WIKI OR PARTNERMAP

More Related Content

What's hot

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
Cisco Canada
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
Cisco Canada
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
Check Point Software Technologies
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
Check Point Software Technologies
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
Moti Sagey מוטי שגיא
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
Cisco Canada
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Check Point Software Technologies
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
Moti Sagey מוטי שגיא
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
Heather Axworthy
 

What's hot (20)

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
 

Similar to Check point response to Cisco NGFW competitive

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
Kai Wähner
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
EnergySec
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
PROIDEA
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
Usman Arif
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Russia
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
Rony Melo
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
Splunk
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
AlgoSec
 
A Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecurityA Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive Security
Sébastien Tandel
 
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRTSplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
Splunk
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
Alexander Kravchenko
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
Real-Time Innovations (RTI)
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
Cisco Canada
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasSpring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour Dallas
VMware Tanzu
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
solarisyougood
 

Similar to Check point response to Cisco NGFW competitive (20)

Log Analytics for Distributed Microservices
Log Analytics for Distributed MicroservicesLog Analytics for Distributed Microservices
Log Analytics for Distributed Microservices
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
[CONFidence 2016] Gaweł Mikołajczyk - Making sense out of the Security Operat...
 
Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics Splunk for Enterprise Security Featuring User Behavior Analytics
Splunk for Enterprise Security Featuring User Behavior Analytics
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated DesignCisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
Cisco Cyber Threat Defense for the Data Center Solution: Cisco Validated Design
 
Firepower ngfw internet
Firepower ngfw internetFirepower ngfw internet
Firepower ngfw internet
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
A Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive SecurityA Tale of Software-Defined & Adaptive Security
A Tale of Software-Defined & Adaptive Security
 
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRTSplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
SplunkLive! Zurich 2018: Splunk for Security at Swisscom CSIRT
 
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
CHECK POINT 3100 NEXT GENERATION SECURITY GATEWAY FOR THE BRANCH AND SMALL OF...
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
ASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment ScenariosASA Firepower NGFW Update and Deployment Scenarios
ASA Firepower NGFW Update and Deployment Scenarios
 
Spring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour DallasSpring and Pivotal Application Service - SpringOne Tour Dallas
Spring and Pivotal Application Service - SpringOne Tour Dallas
 
Nsx security deep dive
Nsx security deep diveNsx security deep dive
Nsx security deep dive
 

More from Moti Sagey מוטי שגיא

CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Moti Sagey מוטי שגיא
 
Why Check Point - Top 4 Facts
Why Check Point  - Top 4 FactsWhy Check Point  - Top 4 Facts
Why Check Point - Top 4 Facts
Moti Sagey מוטי שגיא
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
Moti Sagey מוטי שגיא
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
Moti Sagey מוטי שגיא
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
Moti Sagey מוטי שגיא
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
Moti Sagey מוטי שגיא
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
Moti Sagey מוטי שגיא
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
Moti Sagey מוטי שגיא
 

More from Moti Sagey מוטי שגיא (10)

CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
 
Why Check Point - Top 4 Facts
Why Check Point  - Top 4 FactsWhy Check Point  - Top 4 Facts
Why Check Point - Top 4 Facts
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 

Recently uploaded (16)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 

Check point response to Cisco NGFW competitive

  • 1. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Restricted] ONLY for designated groups and individuals Q3, 2016 | 1 ITEM 1: THIRD-PARTY FINDINGS CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS:  Efficacy : Cisco quotes NSS-BDS 2016 results where it indeed scored 100% and Check Point Scored 99.4% (both great results) , what is not mentioned that Cisco used 2 products to achieve that score (Firepower and AMP endpoint) where Check Point used 1  If comparing apples-to-apples NGFW solutions which is the scope of THEIR COMPARISON , if we take the latest NSS NGFW test, check point scored 99.8% security efficacy where cisco missed 2900% more exploits than check point (see more here)  Time to Detection: not clear why they represent it like this , in fact Check Point average response was ~50% faster than Cisco (see more here) WHAT  CISCO PUBLISHED A COMPETITIVE COMPARISON OF ITS NGFW SOLUTION VS. OTHER VENDORS (PAN, FORTINET, CHECK POINT) : http://www.cisco.com/c/m/en_us/products/security/firewalls/competitive-comparison.html  THE COMPARISON CONTAINS SOME INACCURACIES ABOUT CHECK POINT  THE BELOW CONTAINS FUD – FACTS, UNDERSTANDING AND DETAILS ABOUT CISCO COMPARISON IN REGARDS TO CHECK POINT CHECK POINT RESPONSE TO CISCO NGFW COMPETITIVE
  • 2. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 2: SECURITY FEATURES CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate: 1. Continuous analysis and retrospective detection – supported (in Early Availability ) 2. Network file trajectory – supported (SandBlast Agent) 3. Impact assessment – supported (SmartEvent, Sandblast) 4. Security automation – supported (R80) 5. Behavioral IOC – supported (Anti-bot) 6. User, network, endpoint awareness – supported (across all products) 7. NGIPS – supported , with the highest security effectiveness in the industry (according to NSS LABS) 8. Integrated ATP – supported (Sandblast suite) 9. Malware remediation – supported (SandBlast Agent)
  • 3. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 3: OPERATIONAL CAPABILITIES CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate (except the claim that our management is excellent): 1. Scanning architecture: Check Point supports parallel processing (more info here 1:19) 2. Software-based segmentation : supported (actually with Cisco TrustSec & ACI , but also NSX, Azure, Aws,OpenStack and more) 3. Automatic threat containment : supported (actually with the same Cisco ISE , but also with cooperative enforcement ) 4. Operations and management : we agree it is indeed excellent 5. Different API’s : supported (REST API ,SANDBLAST API, similar to their proprietary ones)
  • 4. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 4: ICS/SCADA CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate (except the first and last statement): 1. Base feature set : Check Point includes all relevant protections for SCADA 2. SCADA rules : rules meaning numbers of signatures and AVC , check point supports over 1,000 “rules” (more than 800 SCADA detectors , more than 300 IPS signatures) For a more accurate comparison, read the “zero tolerance” report here) below a recap
  • 5. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet ITEM 6: THREAT INTELLIGENCE CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are inaccurate: Check Point ThreatCloud holds over 30M of IOC’s (files, hashes, domains, URL), with more than half a million unique samples per day ITEM 7: SERVICE PROVIDER CISCO CLAIM CHECK POINT FACTS, UNDERSTANDING & DETAILS Cisco claims are mostly accurate, though shows their weakness: Cisco uses third-part stitching (mostly as a concept except Radware), where check point can provide best of breed in house solution
  • 6. ©2016 Check Point Software Technologies Ltd. All rights reserved. [Confidential] ONLY for designated groups and individuals Q3, 2016 | 2 Competitive Cheat Sheet THE CHECK POINT ADVANTAGE Unbeatable security & best management efficiency with predictable performance in the real world Strongest Protection with Multi-Layer Security  Industry-leading security award winning Next Generation Firewall - Leader in Gartner's 2016 Magic Quadrant of Enterprise Network Firewall (NGFW), since 1997 - Recommended rating in NSS Labs 2016 Breach Detection System test (BDS) - Recommended in NSS Labs 2016 Next-Gen Firewall test (NGFW) Best management and visibility  Easily control over 7,270 apps, 264,256 internet widgets and 200M websites by user, group, or OU  Protect clear and encrypted traffic against data breaches with strong DLP  Provide simple and secure corporate access from all mobile and fixed endpoints Most efficient security consolidation while keeping predictable real world performance  Predictable real-world performance with Security Power (SPU)  Lowest management labor time according to NSS  Industry’s only true unified management and reporting solution covering all aspects of security CISCO FACTS Security: with its integrated Sourcefire solution, Cisco provides partial security solution  Cisco ASA equipment affected by severe vulnerability – (Read more: http://goo.gl/B6IVKR)  Vulnerable to a full inspection bypass, allowing an attacker to bypass malware detection mechanisms (https://goo.gl/VwCELc)  Cisco Botnet filter lacks core components to detect network behavioral anomalies  Cisco has limited visibility of risk with 68 P2P/File sharing types vs. Check Points 342+  The APP Gap: Cisco has limited application awareness with ~4,366 apps vs. Check Point over 7,270  Cisco management has multiple vulnerabilities (CSRF - http://goo.gl/I9ukZP) and (Cross-Site Scripting http://goo.gl/cRXw0n)  Cisco new unified image Firepower Threat Defense (FTD) has many limitations and missing features such as High Availability, remote access VPN, multiple context, QoS, PBR, etc.  Cisco has 3 separate images (ASA, FirePOWER and FTD) for different appliances lines and different managements which adds to deployment complexity and increase admin labor time Management: with its Sourcefire integrations, Cisco solution requires two separate management Interfaces  Cisco needs 3 separate management consoles to properly manage Threat Prevention, Content Security, and 3 rd party event analysis (Splunk, Logrythm) (vs. 1 from Checkpoint). In some cases with cisco CSM (core FW) is also needed  Cisco needs an added Security Administrator headcount compared to Check Point due to cumbersome management interface (according to 3rd party analysts)  Cisco lacks an Event Analysis solution—no correlation of security events leads to lack of visibility & added management time  Cisco troubleshooting with FirePOWER management, requires an admin to look at seven different categories for threat prevention and Next-Gen logs  Cisco central management lacks some basic multi-domain tasks such as Global IPS, Global services, Global VPN Performance: Cisco very high price performance makes it a less attractive solution  Cisco is limited in regards to VPN setup rate with 95% less tunnels comparing Check Point  Cisco fastest appliance performs only 225Gbps of Firewall throughput (Check Point’s is 400Gbps)  Cisco shows very high cost performance (x3 times more than Check Point )  Cisco-FirePOWER SSP20,40,60 with FirePOWER services and 4000 series show very low performance throughputs compared to Check Point parallel appliances FOR MORE FACTS SEE “WINNING AGAINST“SLIDE DECK IN COMPETITIVE WIKI OR PARTNERMAP