SlideShare a Scribd company logo
Securing Web 2.0
with Next Generation
Web Security

©2013 Check Point Software Technologies Ltd.
Let’s take a
minute…

©2013 Check Point Software Technologies Ltd.

2
In an Internet Minute:

1.9 Million
Likes

92,593 Hours
Viewed

694,444 Files
Uploaded
©2013 Check Point Software Technologies Ltd.

3
The Web Evolves as Attack Vector:
Sites compromised to spread malware

Applications might pose security risk

Sensitive data might be lost

Social networks used in attacks

©2013 Check Point Software Technologies Ltd.

4
A New Approach
Is Needed!

©2013 Check Point Software Technologies Ltd.

5
Multi-Layered
Web Security

©2013 Check Point Software Technologies Ltd.

6
Check Point’s
Next Generation
Secure Web
Gateway

Educate and
Engage Users
Block Use of
Dangerous Applications
Prevent Malicious
Downloads
Block Access
to Malicious
Sites

©2013 Check Point Software Technologies Ltd.

7
Legitimate Sites Compromised to Spread Malware

“NBC Websites Hacked To Serve Citadel
Financial Malware”
Information Week, February 22, 2013 09:50 AM

©2013 Check Point Software Technologies Ltd.

8
Does Your Secure Web Gateway Download
Protection Updates Once a Day?!

Sometimes old is fine…

…Not in security!
©2013 Check Point Software Technologies Ltd.

9
Check Point’s Next Gen Secure Web Gateway

Powered by Threat Intelligence

URL Filtering
constantly updated

Antivirus uses ThreatCloud—
a vast, collaborative threat
intelligence repository
©2013 Check Point Software Technologies Ltd.

10
But Web is More Than Just URLs…

In

61% of organizations,

a P2P file sharing application is used
Heavily used to spread malware

Open back doors to the network

Legal liability for illegal downloads
©2013 Check Point Software Technologies Ltd.

11
Anonymizers Used to Bypass the Security Policy

Some Applications are
Highly Evasive!

©2013 Check Point Software Technologies Ltd.

12
Does Your Secure Web Gateway
Look only at URLs?!

You Can’t
Afford
to Look Only
Under the
Lamppost!

©2013 Check Point Software Technologies Ltd.

13
Check Point’s Next Gen Secure Web Gateway

Control Thousands of Applications
Over 300 P2P file sharing apps

Over 90 anonymizers
Identify and control even
highly evasive applications

appwiki.checkpoint.com
©2013 Check Point Software Technologies Ltd.

14
Why Use Separate Solutions to Control
Applications and Sites?!

Websites

Applications
Not URL-based

www.hackthissite.org

www.fantasyfootball.com

Facebook Chat

Granularity
beyond URLs

©2013 Check Point Software Technologies Ltd.

15
Check Point’s Next Gen Secure Web Gateway

The Only Solution to Offer
Unified Security!

Unified control, analysis and reporting
over all aspects of Web.
©2013 Check Point Software Technologies Ltd.

16
Sharing is Not Always Caring…

80%

of organizations use file storage
and sharing applications

“Our investigation found that usernames and passwords
recently stolen were used to sign in to Dropbox accounts”
Dropbox blog, July 31, 2012

©2013 Check Point Software Technologies Ltd.

17
Check Point’s Next Gen Secure Web Gateway

Granularly Control Features
Within Applications

Add DLP for extended data protection!
©2013 Check Point Software Technologies Ltd.

18
Social Media Used as Attack Vector

Spread malware

Gather information to be
used in targeted attacks
©2013 Check Point Software Technologies Ltd.

19
Blocking Won’t Help…
I need
to stay in
touch with
customers, partners and
colleagues

Sales

I need
to get the
latest industry
news, articles and
reviews

Social media increasingly
used in the business!

Engineer

©2013 Check Point Software Technologies Ltd.

20
Does Your Secure Web Gateway Allow
Business Continuity While Maintaining Security?

Kids know not to take
candy from strangers…

…Education is key!
©2013 Check Point Software Technologies Ltd.

21
Check Point’s Next Gen Secure Web Gateway
Using Social Media Safely

Easily EducateSocial Networks
Stay safe on and
Engage End-Users
Dear John Smith,

Before proceeding to use Facebook, please
be aware:
•

•

Fake Rihanna videos are actually a virus don't click!
Cyber-criminals might use Social
Networks to gather information in
preparation for an attack - don't accept
friends you don't personally know!
OK, I Understand

Safe browsing,
Maintain business continuity
IT Department
without compromising security!

©2013 Check Point Software Technologies Ltd.

22
Elementary…

Monitoring, analysis and reporting—
a critical part of Web security
©2013 Check Point Software Technologies Ltd.

23
Check Point’s Next Gen Secure Web Gateway

©2013 Check Point Software Technologies Ltd.

24
Check Point’s Next Gen Secure Web Gateway
Executive Summary Reports:

©2013 Check Point Software Technologies Ltd.

25
Check Point’s Next Gen Secure Web Gateway

Detailed user and group activity reports:

©2013 Check Point Software Technologies Ltd.

26
Last But Not Least…

Web security doesn’t have to cost a fortune!
©2013 Check Point Software Technologies Ltd.

27
Check Point’s Next Gen Secure Web Gateway
Example: Web Security for 1,000 users, 1st Year Cost
Traditional
Secure Web Gateway

Check Point
SWG 4800

Only
Subscription Renewal:
$38,990
(street price)

First year – HW+SW:
$31,100
(list price)

©2013 Check Point Software Technologies Ltd.

28
Check Point’s Next Gen Secure Web Gateway
Example: Web Security for 1,000 users, 3 Years’ Cost
Traditional
Secure Web Gateway

Check Point
SWG 4800

HW + SW:
$99,760
(street price)

HW+SW:
$42,150
(list price)

More security—for 57% less!
©2013 Check Point Software Technologies Ltd.

29
Check Point Secure Web Gateway
is Your Safety Net

Enabling you to leverage the power of Web
in your business!
©2013 Check Point Software Technologies Ltd.

30
Educate and Engage
Users

Check Point’s
Next Generation
Secure Web
Gateway

Block Use of
Dangerous Applications
Prevent Malicious
Downloads
Block Access to
Malicious Sites

©2013 Check Point Software Technologies Ltd.

31
Check Point’s
Next Generation
Secure Web
Gateway

Educate and
Engage Users
Block Use of
Dangerous Applications
Prevent Malicious
Downloads
Block Access
to Malicious
Sites

©2013 Check Point Software Technologies Ltd.

32
Thank You

©2013 Check Point Software Technologies Ltd.

More Related Content

What's hot

NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
Moti Sagey מוטי שגיא
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
Moti Sagey מוטי שגיא
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
Group of company MUK
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
Rahul Neel Mani
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
Cristian Garcia G.
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
Moti Sagey מוטי שגיא
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
Moti Sagey מוטי שגיא
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
NetEnrich, Inc.
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Cristian Garcia G.
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
Kaspersky
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
Moti Sagey מוטי שגיא
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
Virginia Fernandez
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
Infosec
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
centralohioissa
 

What's hot (19)

NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 

Viewers also liked

10 consigli per farsi imprenditore 4. Disponibilità
10 consigli per farsi imprenditore  4. Disponibilità10 consigli per farsi imprenditore  4. Disponibilità
10 consigli per farsi imprenditore 4. Disponibilità
Manager.it
 
Mdd 4-5
Mdd 4-5 Mdd 4-5
Nuevo presentación de microsoft power point olga uapa
Nuevo presentación de microsoft power point olga uapaNuevo presentación de microsoft power point olga uapa
Nuevo presentación de microsoft power point olga uapa
Olga Candelier
 
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazioneSegmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Manager.it
 
NGIPS: Market Drivers, Architecture, and NSS Test Results
NGIPS: Market Drivers, Architecture, and NSS Test ResultsNGIPS: Market Drivers, Architecture, and NSS Test Results
NGIPS: Market Drivers, Architecture, and NSS Test Results
NSS Labs
 
Lehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HUG- Marketing and Sales Technology LandscapeLehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HubSpot User Group
 
10 consigli per farsi imprenditore 1. Così vuoi diventare imprenditore?
10 consigli per farsi imprenditore  1. Così vuoi diventare imprenditore?10 consigli per farsi imprenditore  1. Così vuoi diventare imprenditore?
10 consigli per farsi imprenditore 1. Così vuoi diventare imprenditore?
Manager.it
 
Time Management
Time ManagementTime Management
Time Management
Andrea Baioni
 
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategiaEsecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Manager.it
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
Group of company MUK
 
PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)
Miz Malinz
 
Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)
Miz Malinz
 
Tips & Techniques of Answering PT3 English Paper 2015
Tips & Techniques of Answering PT3 English Paper 2015Tips & Techniques of Answering PT3 English Paper 2015
Tips & Techniques of Answering PT3 English Paper 2015
Su Qee
 
Summary of Learning
Summary of Learning Summary of Learning
Summary of Learning
Sheri Schlosser
 

Viewers also liked (15)

10 consigli per farsi imprenditore 4. Disponibilità
10 consigli per farsi imprenditore  4. Disponibilità10 consigli per farsi imprenditore  4. Disponibilità
10 consigli per farsi imprenditore 4. Disponibilità
 
Mdd 4-5
Mdd 4-5 Mdd 4-5
Mdd 4-5
 
Nuevo presentación de microsoft power point olga uapa
Nuevo presentación de microsoft power point olga uapaNuevo presentación de microsoft power point olga uapa
Nuevo presentación de microsoft power point olga uapa
 
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazioneSegmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
 
NGIPS: Market Drivers, Architecture, and NSS Test Results
NGIPS: Market Drivers, Architecture, and NSS Test ResultsNGIPS: Market Drivers, Architecture, and NSS Test Results
NGIPS: Market Drivers, Architecture, and NSS Test Results
 
Lehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HUG- Marketing and Sales Technology LandscapeLehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HUG- Marketing and Sales Technology Landscape
 
10 consigli per farsi imprenditore 1. Così vuoi diventare imprenditore?
10 consigli per farsi imprenditore  1. Così vuoi diventare imprenditore?10 consigli per farsi imprenditore  1. Così vuoi diventare imprenditore?
10 consigli per farsi imprenditore 1. Così vuoi diventare imprenditore?
 
Resume Velez
Resume VelezResume Velez
Resume Velez
 
Time Management
Time ManagementTime Management
Time Management
 
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategiaEsecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)
 
Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)
 
Tips & Techniques of Answering PT3 English Paper 2015
Tips & Techniques of Answering PT3 English Paper 2015Tips & Techniques of Answering PT3 English Paper 2015
Tips & Techniques of Answering PT3 English Paper 2015
 
Summary of Learning
Summary of Learning Summary of Learning
Summary of Learning
 

Similar to Check Point: Securing Web 2.0

19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
KunjJoshi14
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Rachel Wandishin
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
CSA Argentina
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
Osei Fortune
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
Alexander Kravchenko
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
Skycure
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Securitycrussell79
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014David Berkelmans
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
NovellaJohns
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Felipe Prado
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
e-Xpert Solutions SA
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
SylCotter
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
EBERTE
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
MarketingArrowECS_CZ
 

Similar to Check Point: Securing Web 2.0 (20)

19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
Research Paper
Research PaperResearch Paper
Research Paper
 

More from Group of company MUK

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
Group of company MUK
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
Group of company MUK
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
Group of company MUK
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
Group of company MUK
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
Group of company MUK
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
Group of company MUK
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
Group of company MUK
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
Group of company MUK
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
Group of company MUK
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
Group of company MUK
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
Group of company MUK
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
Group of company MUK
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
Group of company MUK
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
Group of company MUK
 

More from Group of company MUK (15)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Check Point: Securing Web 2.0

  • 1. Securing Web 2.0 with Next Generation Web Security ©2013 Check Point Software Technologies Ltd.
  • 2. Let’s take a minute… ©2013 Check Point Software Technologies Ltd. 2
  • 3. In an Internet Minute: 1.9 Million Likes 92,593 Hours Viewed 694,444 Files Uploaded ©2013 Check Point Software Technologies Ltd. 3
  • 4. The Web Evolves as Attack Vector: Sites compromised to spread malware Applications might pose security risk Sensitive data might be lost Social networks used in attacks ©2013 Check Point Software Technologies Ltd. 4
  • 5. A New Approach Is Needed! ©2013 Check Point Software Technologies Ltd. 5
  • 6. Multi-Layered Web Security ©2013 Check Point Software Technologies Ltd. 6
  • 7. Check Point’s Next Generation Secure Web Gateway Educate and Engage Users Block Use of Dangerous Applications Prevent Malicious Downloads Block Access to Malicious Sites ©2013 Check Point Software Technologies Ltd. 7
  • 8. Legitimate Sites Compromised to Spread Malware “NBC Websites Hacked To Serve Citadel Financial Malware” Information Week, February 22, 2013 09:50 AM ©2013 Check Point Software Technologies Ltd. 8
  • 9. Does Your Secure Web Gateway Download Protection Updates Once a Day?! Sometimes old is fine… …Not in security! ©2013 Check Point Software Technologies Ltd. 9
  • 10. Check Point’s Next Gen Secure Web Gateway Powered by Threat Intelligence URL Filtering constantly updated Antivirus uses ThreatCloud— a vast, collaborative threat intelligence repository ©2013 Check Point Software Technologies Ltd. 10
  • 11. But Web is More Than Just URLs… In 61% of organizations, a P2P file sharing application is used Heavily used to spread malware Open back doors to the network Legal liability for illegal downloads ©2013 Check Point Software Technologies Ltd. 11
  • 12. Anonymizers Used to Bypass the Security Policy Some Applications are Highly Evasive! ©2013 Check Point Software Technologies Ltd. 12
  • 13. Does Your Secure Web Gateway Look only at URLs?! You Can’t Afford to Look Only Under the Lamppost! ©2013 Check Point Software Technologies Ltd. 13
  • 14. Check Point’s Next Gen Secure Web Gateway Control Thousands of Applications Over 300 P2P file sharing apps Over 90 anonymizers Identify and control even highly evasive applications appwiki.checkpoint.com ©2013 Check Point Software Technologies Ltd. 14
  • 15. Why Use Separate Solutions to Control Applications and Sites?! Websites Applications Not URL-based www.hackthissite.org www.fantasyfootball.com Facebook Chat Granularity beyond URLs ©2013 Check Point Software Technologies Ltd. 15
  • 16. Check Point’s Next Gen Secure Web Gateway The Only Solution to Offer Unified Security! Unified control, analysis and reporting over all aspects of Web. ©2013 Check Point Software Technologies Ltd. 16
  • 17. Sharing is Not Always Caring… 80% of organizations use file storage and sharing applications “Our investigation found that usernames and passwords recently stolen were used to sign in to Dropbox accounts” Dropbox blog, July 31, 2012 ©2013 Check Point Software Technologies Ltd. 17
  • 18. Check Point’s Next Gen Secure Web Gateway Granularly Control Features Within Applications Add DLP for extended data protection! ©2013 Check Point Software Technologies Ltd. 18
  • 19. Social Media Used as Attack Vector Spread malware Gather information to be used in targeted attacks ©2013 Check Point Software Technologies Ltd. 19
  • 20. Blocking Won’t Help… I need to stay in touch with customers, partners and colleagues Sales I need to get the latest industry news, articles and reviews Social media increasingly used in the business! Engineer ©2013 Check Point Software Technologies Ltd. 20
  • 21. Does Your Secure Web Gateway Allow Business Continuity While Maintaining Security? Kids know not to take candy from strangers… …Education is key! ©2013 Check Point Software Technologies Ltd. 21
  • 22. Check Point’s Next Gen Secure Web Gateway Using Social Media Safely Easily EducateSocial Networks Stay safe on and Engage End-Users Dear John Smith, Before proceeding to use Facebook, please be aware: • • Fake Rihanna videos are actually a virus don't click! Cyber-criminals might use Social Networks to gather information in preparation for an attack - don't accept friends you don't personally know! OK, I Understand Safe browsing, Maintain business continuity IT Department without compromising security! ©2013 Check Point Software Technologies Ltd. 22
  • 23. Elementary… Monitoring, analysis and reporting— a critical part of Web security ©2013 Check Point Software Technologies Ltd. 23
  • 24. Check Point’s Next Gen Secure Web Gateway ©2013 Check Point Software Technologies Ltd. 24
  • 25. Check Point’s Next Gen Secure Web Gateway Executive Summary Reports: ©2013 Check Point Software Technologies Ltd. 25
  • 26. Check Point’s Next Gen Secure Web Gateway Detailed user and group activity reports: ©2013 Check Point Software Technologies Ltd. 26
  • 27. Last But Not Least… Web security doesn’t have to cost a fortune! ©2013 Check Point Software Technologies Ltd. 27
  • 28. Check Point’s Next Gen Secure Web Gateway Example: Web Security for 1,000 users, 1st Year Cost Traditional Secure Web Gateway Check Point SWG 4800 Only Subscription Renewal: $38,990 (street price) First year – HW+SW: $31,100 (list price) ©2013 Check Point Software Technologies Ltd. 28
  • 29. Check Point’s Next Gen Secure Web Gateway Example: Web Security for 1,000 users, 3 Years’ Cost Traditional Secure Web Gateway Check Point SWG 4800 HW + SW: $99,760 (street price) HW+SW: $42,150 (list price) More security—for 57% less! ©2013 Check Point Software Technologies Ltd. 29
  • 30. Check Point Secure Web Gateway is Your Safety Net Enabling you to leverage the power of Web in your business! ©2013 Check Point Software Technologies Ltd. 30
  • 31. Educate and Engage Users Check Point’s Next Generation Secure Web Gateway Block Use of Dangerous Applications Prevent Malicious Downloads Block Access to Malicious Sites ©2013 Check Point Software Technologies Ltd. 31
  • 32. Check Point’s Next Generation Secure Web Gateway Educate and Engage Users Block Use of Dangerous Applications Prevent Malicious Downloads Block Access to Malicious Sites ©2013 Check Point Software Technologies Ltd. 32
  • 33. Thank You ©2013 Check Point Software Technologies Ltd.

Editor's Notes

  1. http://www.istockphoto.com/stock-photo-3675907-analogue-stop-watch-isolated-on-white.php
  2. http://www.istockphoto.com/stock-photo-4020428-five-seconds.php?st=d78456bhttp://www.businessweek.com/articles/2012-10-04/facebook-the-making-of-1-billion-users#p2 - Each day, Facebook processes 2.7 billion “Likes”, 2.5 billion content items sharedHours of Video watched on YouTube 4,000,000,000 a month 133,333,333 a day 5,555,556 an hour 92,593 a minutehttp://www.youtube.com/yt/press/statistics.html – Over 4 billion hours of video are watched each month on YouTubehttp://youtube-global.blogspot.ca/2013/03/onebillionstrong.html – March 20, 2013: YouTube Hits a Billion Monthly Usershttp://thenextweb.com/insider/2013/02/27/1-billion-files-are-now-being-uploaded-to-dropbox-every-day/ - Dropbox: 1 billion files are now being uploaded every day
  3. http://www.istockphoto.com/stock-photo-3844961-top-secret-file.php?st=1fe26daTwitter: It’s you on photo http://www.zdnet.com/twitter-malware-warning-its-you-on-photo-or-its-about-you-7000001736/
  4. http://www.istockphoto.com/stock-photo-5091675-light-bulb.php?st=9bb1045Threats are coming from different direction – a new approach is needed: multi-layered Web Security
  5. http://www.istockphoto.com/stock-photo-19905144-brushed-metal-shield.php?st=24b2fc0
  6. http://www.istockphoto.com/stock-photo-19905144-brushed-metal-shield.php?st=24b2fc0
  7. How does Ultrasurf Anonymizer Work?Ultrasurf is a very sophisticated anonymizer that worksas a proxy client, creating an encrypted HTTP tunnelbetween the user’s computer and a central pool of proxyservers, enabling users to bypass firewalls and censorship.Ultrasurf has a very resilient design for discovering proxyservers including a cache file of proxy server IPs, DNSrequests, which return encoded IPs of proxy servers,encrypted documents on Google Docs and a hard codedlist of proxy server IPs built into the program. Thesetechniques make it even more difficult to be detected bysecurity devices.
  8. Security 1.0 can’t handle these applications –Can block websites providing proxy avoidance services, but what about Vtunnel, UltraSurf…?“Block UDP on the FW, turn on SSL inspection – all non-standard SSL traffic will be blocked”Not practical…
  9. collect personal information in preparing for a spear phishing attack
  10. Or: Social Media is now an essential business tool
  11. http://www.istockphoto.com/stock-photo-21037762-sherlock-holmes-silhouette-computing.php?st=b5274ebAlternative: http://www.istockphoto.com/stock-illustration-11975852-detective-holding-a-magnifier-and-showing-something.php?st=b5274eb
  12. http://www.istockphoto.com/stock-photo-2765246-money-bags.php?st=e063e67
  13. http://www.istockphoto.com/stock-photo-17147167-scales-of-justice.php?st=0b6931bhttp://www.istockphoto.com/stock-photo-17147227-scales-of-justice.php?st=0b6931b
  14. http://www.istockphoto.com/stock-photo-17147167-scales-of-justice.php?st=0b6931bhttp://www.istockphoto.com/stock-photo-17147227-scales-of-justice.php?st=0b6931b
  15. This safety net can only be achieved by incorporating multiple lines of defense, a multi-layered approach to Web Security
  16. http://www.istockphoto.com/stock-photo-19905144-brushed-metal-shield.php?st=24b2fc0