1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
STEPPING UP TO GEN V OF
CYBER SECURITY
Gery Coronel
Country Manager SoLA
FINANCIAL SECURITY SUMMIT 2018
2©2018 Check Point Software Technologies Ltd.
WAS 2017 A CYBER-SECURITY
WAKE-UP CALL ?
WannaCry
Thousands of enterprises in over 99 countries
NotPetya
Completely shutting down an entire country and
impacting over 60 more
3©2018 Check Point Software Technologies Ltd.
The Global Risks Report 2018
©2018 Check Point Software Technologies Ltd.
LET’S LOOK AT THE
GENERATIONS OF
ATTACKS…
5©2018 Check Point Software Technologies Ltd. 5©2018 Check Point Software Technologies Ltd.
Generations of Attacks and Protections
Gen I
Late 1980s –
PC attacks - standalone
Virus
Gen II
Mid 1990s –
Attacks from the internet
Networks
Gen III
Early 2000s -
Exploiting vulnerabilities
in applications
Applications
The Anti Virus
The Firewall
Intrusion
Prevention (IPS)
Gen IV
2010 -
Polymorphic Content
Payload
SandBoxing
and Anti-Bot
6©2018 Check Point Software Technologies Ltd.
WE ARE AT AN
INFLECTION POINT !
1990 2000 2010 2017
THREATS
Networks
Gen II
Applications
Gen III
Payload
Gen IV
Virus
Gen I
Mega
Gen V
7©2018 Check Point Software Technologies Ltd.
Where are we ?
1990 2000 2010 2015 2017
THREATS
PROTECTIONSNetworks
Gen II
Applications
Gen III
Payload
Gen IV
GRADE I
GRADE II
GRADE III
GRADE V
GRADE IV
Virus
Gen I
Enterprises
are between
Gen 2-3
2.8
Mega
Gen V
©2018 Check Point Software Technologies Ltd.
WE MUST STEP
FORWARD !
9©2018 Check Point Software Technologies Ltd.
Introducing GEN 5 PROTECTION
Against MEGA ATTACKS
Complete Protection
Future Ready Simplified Administration
Real Time Protection
10©2018 Check Point Software Technologies Ltd. 10©2018 Check Point Software Technologies Ltd.
WHAT INGREDIENTS DO WE NEED ?
11©2018 Check Point Software Technologies Ltd.
SAAS SECURITY
ADAPTIVE
CLOUD
SECURITY
MOBILE APP
SCANNING
SDN MICRO-
SEGEMENTATION
CLOUD
SECURITY
AUTO-SCALE
ORCHESTRATION
ACCOUNT
TAKEOVER
PREVENTION
HYPERVISOR
LEVEL SECURITY
PUBLIC-CLOUD
AUTOPROVISION
MOBILE CODE
ANALYSIS
MOBILE AI AND
MACHINE
LEARNING
DISK
ENCRYPTION
MEDIA
ENCRYPTION
MOBILE SMS
PHISHING
MOBILE MAN
IN THE MIDDLE
ATTACK
BLUETOOTH
ATTACK
DETECTION
SS7 ATTACK
PREVENTION
ADVANCED
JAILBREAK
PROTECTION
MEMORY
ANALYSIS
THREAT
EXTRACTION
HUMAN
INTERACTION
SIMULATION
INTRUSION
PREVENTION
DOMAIN
PREDICTION
MACHINE
LEARNING
ANTI-
RANSOMWARE
CPU LEVEL
SANDBOX
ENDPOINT
FORENSICS
CAMPAIGN
HUNTING
IMAGE FILE
SANITIZER
ENDPOINT
EXPLOITATION
DETECTION
FLASH
EMULATION
INTRUSION
PREVENTION
DOMAIN
PREDICTION
DECOYS &
TRAPS
ANTI-
RANSOMWARE
CPU LEVEL
SANDBOX
CPU EXPLOIT
DETECTOR
MACRO
ANALYSIS
OS-LEVEL
SANDBOX
DROPPED FILES
EMULATION
TRANSPARENT
HTTPS
INSPECTION
STATIC
ANALYZER
LOW LATENCY
FIREWALL
INTEGRATED
PACKET
CAPTURE
SCALABLE
IDENTITY
ACCESS
VIRTUAL
SYSTEMS (VSX)
MULTICORE
VPN
SECURE-XL
SSL INSPECTION
NATIONWIDE
PROTECTION
VERTICAL
SCALING
ZONE-BASED
SECURITY
CONTENT
AWARENESS
NETWORK
ENCRYPTION
ICS/SCADA
PROTECTION
APPLICATION
CONTROL
USER-CHECK
URL FILTERING
HTTP 2.0
DLP
ICS/SCADA
PROTECTION
LARGE SCALE
MANAGEMENT
REST APIS
SECURITY
ADVISOR
SECURITY
MANAGEMENT
PORTAL
EVENT
CORRELATION
12©2018 Check Point Software Technologies Ltd.
SS7 ATTACK
PREVENTION
LARGE SCALE
MANAGEMENT
MOBILE MAN
IN THE MIDDLE
ATTACK
MEMORY
ANALYSIS
PUBLIC-CLOUD
AUTOPROVISION
THREAT
EXTRACTION
NETWORK
ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL
SANDBOX
ADAPTIVE
CLOUD
SECURITY
CLOUD
SECURITY
AUTO-SCALE
13©2018 Check Point Software Technologies Ltd. 13©2018 Check Point Software Technologies Ltd.
MAKING GEN V POSSIBLE
SS7 ATTACK
PREVENTION
LARGE SCALE
MANAGEMENT
MOBILE MAN
IN THE
MIDDLE
ATTACK
MEMORY
ANALYSIS
PUBLIC-CLOUD
AUTOPROVISION
THREAT
EXTRACTION
NETWORK
ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL
SANDBOX
ADAPTIVE
CLOUD
SECURITY
CLOUD
SECURITY
AUTO-SCALE
©2018 Check Point Software Technologies Ltd.
HOW DO WE MOVE
TO GEN V OF
SECURITY?
15©2018 Check Point Software Technologies Ltd.
You Need a Small Army of Security Technologies
16©2018 Check Point Software Technologies Ltd. 16©2018 Check Point Software Technologies Ltd.
THIS WORKS !
YOU CAN MAKE IT POSSIBLE
Machine
Learning
CPU-Level
Sandboxing
Threat
Extraction
Virtual
Firewall
Endpoint
Detection
& Response
Human
Behavioral
Analytics
Data
Encryption
Data Leak
Prevention
Anti-Bot Flash
Detonation
URL
Filtering
Firewall
ICS/ SCADA
Protection
Machine
Learning
Proxy
Network
Encryption
Anti-
Ransomware
Zero
Phishing
Mobile Threat
Prevention
CPU-Level
Sandboxing
HTTPS
Inspection
Intrusion
Prevention
Anti-Virus DDOS
Hypervisor
Level Security
Application
Control
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
17©2018 Check Point Software Technologies Ltd.
AND WHAT IS COMING UP IN 2018 ?
SOFTWARE,
HARDWARE,
SERVICES, ALL
INCLUSIVE
SECURITY
CONSUMPTION
MODEL
POWERING THE
5TH GENERATION
OF CYBER
SECURITY
STATE OF THE
ART THREAT
PREVENTION
FOR SAAS APPS
SECURITY
PLATFORMS
CHECK POINT
CLOUDGUARD
©2018 Check Point Software Technologies Ltd.
AND WHAT SHOULD
WE EXPECT NEXT?
19©2018 Check Point Software Technologies Ltd.
Transportation
Manufacturing
Smart cities
Smart buildings
Banking
Utilities
Healthcare
Telecom
Automotive
Energy
Smart homes
cloud
age of
THINGS
Not just dealing with “computer
networks”
Everything is interconnected,
everything is a target
20©2018 Check Point Software Technologies Ltd.
Introducing GEN VI - NANO-SECURITY
1990 2000 2010 2015 2017 2020
THREATS
Networks
Gen II
Applications
Gen III
Payload
Gen IV
Virus
Gen I
Mega
Gen V
Nano
Gen VI
21©2018 Check Point Software Technologies Ltd.
Transportation
Manufacturing
Smart cities
Smart buildings
Banking
Utilities
Healthcare
Telecom
Automotive
Energy
Smart homes
cloud
age of
THINGS
22©2018 Check Point Software Technologies Ltd.
Transportation
Manufacturing
Smart cities
Smart buildings
Banking
Utilities
Healthcare
Telecom
Automotive
Energy
Smart homes
cloud
AI ADAPTIVE
SECURITY CONTROLS
©2018 Check Point Software Technologies Ltd.
WITH BEST
SECURITY, REAL
TIME PREVENTION
We must step
up to….
©2018 Check Point Software Technologies Ltd.
THANK YOU
Gery Coronel
Country Manager SoLA
FINANCIAL SECURITY SUMMIT 2018

Generación V de ciberataques

  • 1.
    1©2018 Check PointSoftware Technologies Ltd.©2018 Check Point Software Technologies Ltd. STEPPING UP TO GEN V OF CYBER SECURITY Gery Coronel Country Manager SoLA FINANCIAL SECURITY SUMMIT 2018
  • 2.
    2©2018 Check PointSoftware Technologies Ltd. WAS 2017 A CYBER-SECURITY WAKE-UP CALL ? WannaCry Thousands of enterprises in over 99 countries NotPetya Completely shutting down an entire country and impacting over 60 more
  • 3.
    3©2018 Check PointSoftware Technologies Ltd. The Global Risks Report 2018
  • 4.
    ©2018 Check PointSoftware Technologies Ltd. LET’S LOOK AT THE GENERATIONS OF ATTACKS…
  • 5.
    5©2018 Check PointSoftware Technologies Ltd. 5©2018 Check Point Software Technologies Ltd. Generations of Attacks and Protections Gen I Late 1980s – PC attacks - standalone Virus Gen II Mid 1990s – Attacks from the internet Networks Gen III Early 2000s - Exploiting vulnerabilities in applications Applications The Anti Virus The Firewall Intrusion Prevention (IPS) Gen IV 2010 - Polymorphic Content Payload SandBoxing and Anti-Bot
  • 6.
    6©2018 Check PointSoftware Technologies Ltd. WE ARE AT AN INFLECTION POINT ! 1990 2000 2010 2017 THREATS Networks Gen II Applications Gen III Payload Gen IV Virus Gen I Mega Gen V
  • 7.
    7©2018 Check PointSoftware Technologies Ltd. Where are we ? 1990 2000 2010 2015 2017 THREATS PROTECTIONSNetworks Gen II Applications Gen III Payload Gen IV GRADE I GRADE II GRADE III GRADE V GRADE IV Virus Gen I Enterprises are between Gen 2-3 2.8 Mega Gen V
  • 8.
    ©2018 Check PointSoftware Technologies Ltd. WE MUST STEP FORWARD !
  • 9.
    9©2018 Check PointSoftware Technologies Ltd. Introducing GEN 5 PROTECTION Against MEGA ATTACKS Complete Protection Future Ready Simplified Administration Real Time Protection
  • 10.
    10©2018 Check PointSoftware Technologies Ltd. 10©2018 Check Point Software Technologies Ltd. WHAT INGREDIENTS DO WE NEED ?
  • 11.
    11©2018 Check PointSoftware Technologies Ltd. SAAS SECURITY ADAPTIVE CLOUD SECURITY MOBILE APP SCANNING SDN MICRO- SEGEMENTATION CLOUD SECURITY AUTO-SCALE ORCHESTRATION ACCOUNT TAKEOVER PREVENTION HYPERVISOR LEVEL SECURITY PUBLIC-CLOUD AUTOPROVISION MOBILE CODE ANALYSIS MOBILE AI AND MACHINE LEARNING DISK ENCRYPTION MEDIA ENCRYPTION MOBILE SMS PHISHING MOBILE MAN IN THE MIDDLE ATTACK BLUETOOTH ATTACK DETECTION SS7 ATTACK PREVENTION ADVANCED JAILBREAK PROTECTION MEMORY ANALYSIS THREAT EXTRACTION HUMAN INTERACTION SIMULATION INTRUSION PREVENTION DOMAIN PREDICTION MACHINE LEARNING ANTI- RANSOMWARE CPU LEVEL SANDBOX ENDPOINT FORENSICS CAMPAIGN HUNTING IMAGE FILE SANITIZER ENDPOINT EXPLOITATION DETECTION FLASH EMULATION INTRUSION PREVENTION DOMAIN PREDICTION DECOYS & TRAPS ANTI- RANSOMWARE CPU LEVEL SANDBOX CPU EXPLOIT DETECTOR MACRO ANALYSIS OS-LEVEL SANDBOX DROPPED FILES EMULATION TRANSPARENT HTTPS INSPECTION STATIC ANALYZER LOW LATENCY FIREWALL INTEGRATED PACKET CAPTURE SCALABLE IDENTITY ACCESS VIRTUAL SYSTEMS (VSX) MULTICORE VPN SECURE-XL SSL INSPECTION NATIONWIDE PROTECTION VERTICAL SCALING ZONE-BASED SECURITY CONTENT AWARENESS NETWORK ENCRYPTION ICS/SCADA PROTECTION APPLICATION CONTROL USER-CHECK URL FILTERING HTTP 2.0 DLP ICS/SCADA PROTECTION LARGE SCALE MANAGEMENT REST APIS SECURITY ADVISOR SECURITY MANAGEMENT PORTAL EVENT CORRELATION
  • 12.
    12©2018 Check PointSoftware Technologies Ltd. SS7 ATTACK PREVENTION LARGE SCALE MANAGEMENT MOBILE MAN IN THE MIDDLE ATTACK MEMORY ANALYSIS PUBLIC-CLOUD AUTOPROVISION THREAT EXTRACTION NETWORK ENCRYPTION REST APIs ORCHESTRATION CPU LEVEL SANDBOX ADAPTIVE CLOUD SECURITY CLOUD SECURITY AUTO-SCALE
  • 13.
    13©2018 Check PointSoftware Technologies Ltd. 13©2018 Check Point Software Technologies Ltd. MAKING GEN V POSSIBLE SS7 ATTACK PREVENTION LARGE SCALE MANAGEMENT MOBILE MAN IN THE MIDDLE ATTACK MEMORY ANALYSIS PUBLIC-CLOUD AUTOPROVISION THREAT EXTRACTION NETWORK ENCRYPTION REST APIs ORCHESTRATION CPU LEVEL SANDBOX ADAPTIVE CLOUD SECURITY CLOUD SECURITY AUTO-SCALE
  • 14.
    ©2018 Check PointSoftware Technologies Ltd. HOW DO WE MOVE TO GEN V OF SECURITY?
  • 15.
    15©2018 Check PointSoftware Technologies Ltd. You Need a Small Army of Security Technologies
  • 16.
    16©2018 Check PointSoftware Technologies Ltd. 16©2018 Check Point Software Technologies Ltd. THIS WORKS ! YOU CAN MAKE IT POSSIBLE Machine Learning CPU-Level Sandboxing Threat Extraction Virtual Firewall Endpoint Detection & Response Human Behavioral Analytics Data Encryption Data Leak Prevention Anti-Bot Flash Detonation URL Filtering Firewall ICS/ SCADA Protection Machine Learning Proxy Network Encryption Anti- Ransomware Zero Phishing Mobile Threat Prevention CPU-Level Sandboxing HTTPS Inspection Intrusion Prevention Anti-Virus DDOS Hypervisor Level Security Application Control THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
  • 17.
    17©2018 Check PointSoftware Technologies Ltd. AND WHAT IS COMING UP IN 2018 ? SOFTWARE, HARDWARE, SERVICES, ALL INCLUSIVE SECURITY CONSUMPTION MODEL POWERING THE 5TH GENERATION OF CYBER SECURITY STATE OF THE ART THREAT PREVENTION FOR SAAS APPS SECURITY PLATFORMS CHECK POINT CLOUDGUARD
  • 18.
    ©2018 Check PointSoftware Technologies Ltd. AND WHAT SHOULD WE EXPECT NEXT?
  • 19.
    19©2018 Check PointSoftware Technologies Ltd. Transportation Manufacturing Smart cities Smart buildings Banking Utilities Healthcare Telecom Automotive Energy Smart homes cloud age of THINGS Not just dealing with “computer networks” Everything is interconnected, everything is a target
  • 20.
    20©2018 Check PointSoftware Technologies Ltd. Introducing GEN VI - NANO-SECURITY 1990 2000 2010 2015 2017 2020 THREATS Networks Gen II Applications Gen III Payload Gen IV Virus Gen I Mega Gen V Nano Gen VI
  • 21.
    21©2018 Check PointSoftware Technologies Ltd. Transportation Manufacturing Smart cities Smart buildings Banking Utilities Healthcare Telecom Automotive Energy Smart homes cloud age of THINGS
  • 22.
    22©2018 Check PointSoftware Technologies Ltd. Transportation Manufacturing Smart cities Smart buildings Banking Utilities Healthcare Telecom Automotive Energy Smart homes cloud AI ADAPTIVE SECURITY CONTROLS
  • 23.
    ©2018 Check PointSoftware Technologies Ltd. WITH BEST SECURITY, REAL TIME PREVENTION We must step up to….
  • 24.
    ©2018 Check PointSoftware Technologies Ltd. THANK YOU Gery Coronel Country Manager SoLA FINANCIAL SECURITY SUMMIT 2018