SlideShare a Scribd company logo
1 of 37
Download to read offline
1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd.
Adaptive Security that drives
innovation in the cloud
Will Hargreaves
Cloud Security – Check Point UK
CLOUDGUARD IAAS
[Restricted] for designated teams ​
2©2017 Check Point Software Technologies Ltd.
0
20
40
60
80
100
120
2016 2017 2018 2019 2020
Revenue(US$Billion)
Worldwide Cloud Services Revenue Forecast
IaaS & PaaS
SaaS
$190B CLOUD MARKET BY 2020
3©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​
CLOUD IS TAKING OVER THE WORLD
CLOUD DIVERSITY
67% OF ENTERPRISES ARE IN HYBRID CLOUD.
MULTI CLOUD BECOMING THE NORM
RightScale
SECURITY
40% OF ENTERPRISES RATE CLOUD
SECURITY AS SIGNIFICANT CHALLENGE
RightScale
4©2017 Check Point Software Technologies Ltd.
CLOUD IS THE NEW NORMAL
MIGRATE TO CLOUD
Lift & shift applications to the cloud
INNOVATE WITH THE CLOUD
Develop new applications in the cloud
5©2017 Check Point Software Technologies Ltd.
Developers:
• Freedom
• Agility
INNOVATION IS THE KEY TO SUCCESS
IT Operators :
• Control
• Efficiency
DevOps
DevOps and App Owners hate Legacy Security!
It slows them down.
6©2017 Check Point Software Technologies Ltd.
• Hard to deploy legacy security
• Firewall tickets are a bottleneck
• Cloud is dynamic and legacy security is static
LEGACY SECURITY KILLS INNOVATION
7©2017 Check Point Software Technologies Ltd.
The customer is responsible for
security IN the cloud of their
data and applications
Cloud Provider is responsible for
security OF the cloud
Infrastructure
CLOUD = SHARED RESPONSIBILITY
8©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​
NO Threat Prevention in real time (L4-L7 protections)
NO Threat Extraction and Zero-day Sandboxing
NO Unified Management for all Clouds & Traditional Data Center
NO Identity based authentication access to applications
NO Application Control & URL Filtering
WHERE CLOUD NATIVE SECURITY FALLS SHORT
9©2017 Check Point Software Technologies Ltd.
UBER PAID HACKERS TO DELETE STOLEN
DATA ON 57 MILLION PEOPLE - 3 TOP UBER
MANAGERS RESIGN
10©2017 Check Point Software Technologies Ltd.
CURRENT STATE OF CLOUD SECURITY
NOT EVERY CLOUD HAS A SILVER LINING
11©2017 Check Point Software Technologies Ltd.
Security must be as agile as your cloud
YOU NEED CLOUD SECURITY
THAT ENABLES INNOVATION
AND PROTECTS YOU FROM MODERN ATTACKS
…..and it must be secure!
12©2018 Check Point Software Technologies Ltd.
INTRODUCING
CHECK POINT CLOUDGUARD
PROTECTING ANY CLOUD, ANY SERVICE, ANYWHERE
13©2017 Check Point Software Technologies Ltd.
COMPREHENSIVE SECURITY ARCHITECTURE
Private Cloud & SDN Public IAAS
14©2017 Check Point Software Technologies Ltd.
CLOUDGUARD
SECURITY AT THE SPEED OF DEVOPSs
Advanced Threat
Prevention
Adaptive Cloud
Security Operation Automated
Cloud Security
Blueprint
FROM WEEKS TO SECONDS WITH
CloudGuard Security
AUTOMATION
Connect a new IOT device
Scale up your application
Provision a new application
PERFORM THESE OPERATIONS…
CloudGuard SECURITY AUTOMATION USE CASES
Change an application’s networking
Virtual Patching
• Security is automatically provisioned
• Application is instantly secured
• Application admin never waits
• No tickets “overhead”
• Everything is auditable
KNOWING THAT….
Changing
Web VM IP
CHANGE APPLICATION NETWORKING
Legacy Way
Many Days / Manual process
App owner opens
ticket to FW Admin
to change policy
FW admin
changes the
policy
New policy is
published on the
weekend
Seconds / Dynamic Process
CloudGuard dynamically learns about this change from
vCenter and all virtual and physical GWs are instantly
updated
NewWay
SCALE UP YOUR APPLICATION
Many Days / Manual process
Open ticket to FW
Admin to change
policy
FW admin
changes the
policy
New policy is
published at the
weekend
Legacy Way
CloudGuard dynamically
learns about the change and
instantly update GW policy
Seconds / Dynamic Process
VM is automatically added
to web SDN Group
New Way
Add a new Web
VM cluster
VIRTUAL PATCHING
It takes days to test, approve and deploy a
new security patch
Meanwhile, vulnerability is known and
applications are exposed
Legacy Way
CloudGuard will allow the implementation of
IPS , before the security patch is announced
New Way
PROVISION A NEW APPLICATION
Many hours / Manual process
Develop a manual procedure
for new Database
Manually configure the FW to
secure the new Database
Legacy Way
Develop an orchestration recipe
for new Database with security
Seconds / Automation Process
CloudGuard Recipe is
executed and provisions the
FW policy
New Way
CONNECT A NEW IOT DEVICE
CloudGuard Portal for IOT Admin
Enter the new IOT name
Add
Connect IOT
to the network
New rule is created
to IOT and all GWs are
instantly updated
30 Secs Manual
(avoid opening a ticket)
Seconds / Automation
Process
New Way
22©2017 Check Point Software Technologies Ltd.
CLOUDGUARD - SECURITY
Advanced
Threat
Prevention
23©2017 Check Point Software Technologies Ltd.
CLOUDGUARD – ADVANCED PROTECTION
Access Rule
Next Generation Firewall
Application and Data Security
Advanced Threat Prevention
Forensic Analysis
Cloud
Vendor
24©2017 Check Point Software Technologies Ltd.
CLOUDGUARD – MICRO SEGMENTATION
CISCO ACI
Micro segment the Cloud with
advanced protection between
applications with tight
Integration to SDN
App App
App App
25©2017 Check Point Software Technologies Ltd.
CLOUDGUARD – BLUEPRINT
Agile Cloud
Architecture
26©2017 Check Point Software Technologies Ltd.
CLOUD SECURITY BLUEPRINT
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
VPN
27©2017 Check Point Software Technologies Ltd.
Northbound
Hub
Southbound Hub
Spoke 1 Spoke 2 Spoke 3 Spoke N…
VPN
CLOUD SECURITY BLUEPRINT
28©2017 Check Point Software Technologies Ltd.
MULTI-CLOUD SECURITY BLUEPRINT
29©2017 Check Point Software Technologies Ltd.
• Agile
New spokes created by DevOps are automatically protected
• Architecture Auto-Provision
̶ Via AWS CloudFormation
̶ Via Azure solution templates
• Control:
Security admin gain visibility for east-west and north-south traffic
CLOUD SECURITY BLUEPRINT
30©2017 Check Point Software Technologies Ltd.
CLOUDGUARD – ADAPTIVE SECURITY
Security at
the speed of
DevOps
31©2017 Check Point Software Technologies Ltd.
APPLICATION-AWARE POLICY
TIED TO CLOUD MANAGEMENT AND SDN
32©2017 Check Point Software Technologies Ltd.
CLOUDGUARD ADAPTIVE SECURITY
Check Point Access Policy
Rule From To Application Action
3
Web_SecurityGroup
AWS Object
DB_VM
vCenter Object
MSSQL Allow
4
CRM_SecurityGroup
Azure Object
SAP_SecurityGroup
NSX Object
CRM Allow
Drag & Drop dynamic policy with cloud objects
5
AWS_VPC
AWS Object
Azure_VNET
Azure Object
ADFS Allow
33©2017 Check Point Software Technologies Ltd.
ADAPTIVE SECURITY THAT
ENABLES INNOVATION
Easy to secure and connect
Multi-cloud applications
Applications are protected
with the best security
DevOps and IT Security
speak the same language
Policy is updated when
application is deleted
Application owner
never waits
Reduce security tickets
by 60%
34©2017 Check Point Software Technologies Ltd.
SUMMARY
35©2017 Check Point Software Technologies Ltd.
SUCCESS
More than 3,500 customers use Check Point to secure their cloud
35©2017 Check Point Software Technologies Ltd.
36©2017 Check Point Software Technologies Ltd.
Innovate with Check Point Cloud Security
• Best protection against modern attacks
• Security that adapts to application changes
• Unified security that connects all your clouds
SECURITY
AT THE SPEED OF DEVOPS
37©2018 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd.
THANK YOU

More Related Content

What's hot

A worldwide journey to build a secure development environment
A worldwide journey to build a secure development environmentA worldwide journey to build a secure development environment
A worldwide journey to build a secure development environmentPriyanka Aash
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagenwebwinkelvakdag
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container EnvironmentsTwistlock
 
Agile Testing for Embedded and IoT Software Development
Agile Testing for Embedded and IoT Software DevelopmentAgile Testing for Embedded and IoT Software Development
Agile Testing for Embedded and IoT Software DevelopmentTechWell
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Eturnti Consulting Pvt Ltd
 
10 Tips for Better BusinessEvents Monitoring
10 Tips for Better BusinessEvents Monitoring10 Tips for Better BusinessEvents Monitoring
10 Tips for Better BusinessEvents MonitoringSL Corporation
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security peoplePriyanka Aash
 
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceDev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceYi-Feng Tzeng
 
Collaborative security : Securing open source software
Collaborative security : Securing open source softwareCollaborative security : Securing open source software
Collaborative security : Securing open source softwarePriyanka Aash
 
Tackling the Container Iceberg:How to approach security when most of your sof...
Tackling the Container Iceberg:How to approach security when most of your sof...Tackling the Container Iceberg:How to approach security when most of your sof...
Tackling the Container Iceberg:How to approach security when most of your sof...WhiteSource
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConTom Stiehm
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityKevin Fealey
 
Empowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceEmpowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceWhiteSource
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsDeborah Schalm
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogStefan Streichsbier
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsStefan Streichsbier
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Vince Garr
 
Securing Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsSecuring Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsWhiteSource
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Software Integrity Group
 
CloudFormationを使用したシームレスな開発の話
CloudFormationを使用したシームレスな開発の話CloudFormationを使用したシームレスな開発の話
CloudFormationを使用したシームレスな開発の話祐一郎 塚本
 

What's hot (20)

A worldwide journey to build a secure development environment
A worldwide journey to build a secure development environmentA worldwide journey to build a secure development environment
A worldwide journey to build a secure development environment
 
BitSensor Webwinkel Vakdagen
BitSensor Webwinkel VakdagenBitSensor Webwinkel Vakdagen
BitSensor Webwinkel Vakdagen
 
Managing Compliance in Container Environments
Managing Compliance in Container EnvironmentsManaging Compliance in Container Environments
Managing Compliance in Container Environments
 
Agile Testing for Embedded and IoT Software Development
Agile Testing for Embedded and IoT Software DevelopmentAgile Testing for Embedded and IoT Software Development
Agile Testing for Embedded and IoT Software Development
 
Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....Agile Relevance in the age of Continuous Everything ....
Agile Relevance in the age of Continuous Everything ....
 
10 Tips for Better BusinessEvents Monitoring
10 Tips for Better BusinessEvents Monitoring10 Tips for Better BusinessEvents Monitoring
10 Tips for Better BusinessEvents Monitoring
 
How to transform developers into security people
How to transform developers into security peopleHow to transform developers into security people
How to transform developers into security people
 
Dev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and ComplianceDev(Sec)Ops - Architecture for Security and Compliance
Dev(Sec)Ops - Architecture for Security and Compliance
 
Collaborative security : Securing open source software
Collaborative security : Securing open source softwareCollaborative security : Securing open source software
Collaborative security : Securing open source software
 
Tackling the Container Iceberg:How to approach security when most of your sof...
Tackling the Container Iceberg:How to approach security when most of your sof...Tackling the Container Iceberg:How to approach security when most of your sof...
Tackling the Container Iceberg:How to approach security when most of your sof...
 
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechConShifting Security Left - The Innovation of DevSecOps - ValleyTechCon
Shifting Security Left - The Innovation of DevSecOps - ValleyTechCon
 
DevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just SecurityDevSecOps without DevOps is Just Security
DevSecOps without DevOps is Just Security
 
Empowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With ConfidenceEmpowering Financial Institutions to Use Open Source With Confidence
Empowering Financial Institutions to Use Open Source With Confidence
 
Top 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management TeamsTop 10 Practices of Highly Successful DevOps Incident Management Teams
Top 10 Practices of Highly Successful DevOps Incident Management Teams
 
DevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together LogDevSecOps in 2031: How robots and humans will secure apps together Log
DevSecOps in 2031: How robots and humans will secure apps together Log
 
SCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOpsSCS DevSecOps Seminar - State of DevSecOps
SCS DevSecOps Seminar - State of DevSecOps
 
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
Securing Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOpsSecuring Container-Based Applications at the Speed of DevOps
Securing Container-Based Applications at the Speed of DevOps
 
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
Synopsys Security Event Israel Presentation: Keynote: Securing Your Software,...
 
CloudFormationを使用したシームレスな開発の話
CloudFormationを使用したシームレスな開発の話CloudFormationを使用したシームレスな開発の話
CloudFormationを使用したシームレスな開発の話
 

Similar to Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected

vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdfThousandEyes
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...AlgoSec
 
Realise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesRealise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesThousandEyes
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesVMware Tanzu
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud worldLew Tucker
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2Bitglass
 
Simplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFSimplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFAmazon Web Services
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesThousandEyes
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxAvi Networks
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforcePerimeter 81
 

Similar to Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected (20)

vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Realise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyesRealise True Business Value With ThousandEyes
Realise True Business Value With ThousandEyes
 
OPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu SlidesOPS Executive insights Webinar - Tanzu Slides
OPS Executive insights Webinar - Tanzu Slides
 
Welcome to the Multi-cloud world
Welcome to the Multi-cloud worldWelcome to the Multi-cloud world
Welcome to the Multi-cloud world
 
Webinar bitglass - complete deck-2
Webinar   bitglass - complete deck-2Webinar   bitglass - complete deck-2
Webinar bitglass - complete deck-2
 
Simplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFSimplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAF
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
One And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptxOne And Done Multi-Cloud Load Balancing Done Right.pptx
One And Done Multi-Cloud Load Balancing Done Right.pptx
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 

More from Digital Transformation EXPO Event Series

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingDigital Transformation EXPO Event Series
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Digital Transformation EXPO Event Series
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Digital Transformation EXPO Event Series
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningDigital Transformation EXPO Event Series
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Digital Transformation EXPO Event Series
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryDigital Transformation EXPO Event Series
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerDigital Transformation EXPO Event Series
 

More from Digital Transformation EXPO Event Series (20)

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
 
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile EraThe Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
 
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
 
Lean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science teamLean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science team
 
Top 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real WorldTop 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real World
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
 
Data Science Is More Than Just Statistics
Data Science Is More Than Just StatisticsData Science Is More Than Just Statistics
Data Science Is More Than Just Statistics
 
Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform
 
The convergence of Data Science and Software Development
The convergence of Data Science and Software DevelopmentThe convergence of Data Science and Software Development
The convergence of Data Science and Software Development
 
The future impact of AI in cybercrime
The future impact of AI in cybercrimeThe future impact of AI in cybercrime
The future impact of AI in cybercrime
 
Digital Innovation in Medical Gases
Digital Innovation in Medical GasesDigital Innovation in Medical Gases
Digital Innovation in Medical Gases
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industry
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

Head in the Clouds? Let’s get serious about how to benefit from Cloud platforms whilst staying protected

  • 1. 1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd. Adaptive Security that drives innovation in the cloud Will Hargreaves Cloud Security – Check Point UK CLOUDGUARD IAAS [Restricted] for designated teams ​
  • 2. 2©2017 Check Point Software Technologies Ltd. 0 20 40 60 80 100 120 2016 2017 2018 2019 2020 Revenue(US$Billion) Worldwide Cloud Services Revenue Forecast IaaS & PaaS SaaS $190B CLOUD MARKET BY 2020
  • 3. 3©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ CLOUD IS TAKING OVER THE WORLD CLOUD DIVERSITY 67% OF ENTERPRISES ARE IN HYBRID CLOUD. MULTI CLOUD BECOMING THE NORM RightScale SECURITY 40% OF ENTERPRISES RATE CLOUD SECURITY AS SIGNIFICANT CHALLENGE RightScale
  • 4. 4©2017 Check Point Software Technologies Ltd. CLOUD IS THE NEW NORMAL MIGRATE TO CLOUD Lift & shift applications to the cloud INNOVATE WITH THE CLOUD Develop new applications in the cloud
  • 5. 5©2017 Check Point Software Technologies Ltd. Developers: • Freedom • Agility INNOVATION IS THE KEY TO SUCCESS IT Operators : • Control • Efficiency DevOps DevOps and App Owners hate Legacy Security! It slows them down.
  • 6. 6©2017 Check Point Software Technologies Ltd. • Hard to deploy legacy security • Firewall tickets are a bottleneck • Cloud is dynamic and legacy security is static LEGACY SECURITY KILLS INNOVATION
  • 7. 7©2017 Check Point Software Technologies Ltd. The customer is responsible for security IN the cloud of their data and applications Cloud Provider is responsible for security OF the cloud Infrastructure CLOUD = SHARED RESPONSIBILITY
  • 8. 8©2017 Check Point Software Technologies Ltd. [Restricted] for designated teams ​ NO Threat Prevention in real time (L4-L7 protections) NO Threat Extraction and Zero-day Sandboxing NO Unified Management for all Clouds & Traditional Data Center NO Identity based authentication access to applications NO Application Control & URL Filtering WHERE CLOUD NATIVE SECURITY FALLS SHORT
  • 9. 9©2017 Check Point Software Technologies Ltd. UBER PAID HACKERS TO DELETE STOLEN DATA ON 57 MILLION PEOPLE - 3 TOP UBER MANAGERS RESIGN
  • 10. 10©2017 Check Point Software Technologies Ltd. CURRENT STATE OF CLOUD SECURITY NOT EVERY CLOUD HAS A SILVER LINING
  • 11. 11©2017 Check Point Software Technologies Ltd. Security must be as agile as your cloud YOU NEED CLOUD SECURITY THAT ENABLES INNOVATION AND PROTECTS YOU FROM MODERN ATTACKS …..and it must be secure!
  • 12. 12©2018 Check Point Software Technologies Ltd. INTRODUCING CHECK POINT CLOUDGUARD PROTECTING ANY CLOUD, ANY SERVICE, ANYWHERE
  • 13. 13©2017 Check Point Software Technologies Ltd. COMPREHENSIVE SECURITY ARCHITECTURE Private Cloud & SDN Public IAAS
  • 14. 14©2017 Check Point Software Technologies Ltd. CLOUDGUARD SECURITY AT THE SPEED OF DEVOPSs Advanced Threat Prevention Adaptive Cloud Security Operation Automated Cloud Security Blueprint
  • 15. FROM WEEKS TO SECONDS WITH CloudGuard Security AUTOMATION
  • 16. Connect a new IOT device Scale up your application Provision a new application PERFORM THESE OPERATIONS… CloudGuard SECURITY AUTOMATION USE CASES Change an application’s networking Virtual Patching • Security is automatically provisioned • Application is instantly secured • Application admin never waits • No tickets “overhead” • Everything is auditable KNOWING THAT….
  • 17. Changing Web VM IP CHANGE APPLICATION NETWORKING Legacy Way Many Days / Manual process App owner opens ticket to FW Admin to change policy FW admin changes the policy New policy is published on the weekend Seconds / Dynamic Process CloudGuard dynamically learns about this change from vCenter and all virtual and physical GWs are instantly updated NewWay
  • 18. SCALE UP YOUR APPLICATION Many Days / Manual process Open ticket to FW Admin to change policy FW admin changes the policy New policy is published at the weekend Legacy Way CloudGuard dynamically learns about the change and instantly update GW policy Seconds / Dynamic Process VM is automatically added to web SDN Group New Way Add a new Web VM cluster
  • 19. VIRTUAL PATCHING It takes days to test, approve and deploy a new security patch Meanwhile, vulnerability is known and applications are exposed Legacy Way CloudGuard will allow the implementation of IPS , before the security patch is announced New Way
  • 20. PROVISION A NEW APPLICATION Many hours / Manual process Develop a manual procedure for new Database Manually configure the FW to secure the new Database Legacy Way Develop an orchestration recipe for new Database with security Seconds / Automation Process CloudGuard Recipe is executed and provisions the FW policy New Way
  • 21. CONNECT A NEW IOT DEVICE CloudGuard Portal for IOT Admin Enter the new IOT name Add Connect IOT to the network New rule is created to IOT and all GWs are instantly updated 30 Secs Manual (avoid opening a ticket) Seconds / Automation Process New Way
  • 22. 22©2017 Check Point Software Technologies Ltd. CLOUDGUARD - SECURITY Advanced Threat Prevention
  • 23. 23©2017 Check Point Software Technologies Ltd. CLOUDGUARD – ADVANCED PROTECTION Access Rule Next Generation Firewall Application and Data Security Advanced Threat Prevention Forensic Analysis Cloud Vendor
  • 24. 24©2017 Check Point Software Technologies Ltd. CLOUDGUARD – MICRO SEGMENTATION CISCO ACI Micro segment the Cloud with advanced protection between applications with tight Integration to SDN App App App App
  • 25. 25©2017 Check Point Software Technologies Ltd. CLOUDGUARD – BLUEPRINT Agile Cloud Architecture
  • 26. 26©2017 Check Point Software Technologies Ltd. CLOUD SECURITY BLUEPRINT Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… VPN
  • 27. 27©2017 Check Point Software Technologies Ltd. Northbound Hub Southbound Hub Spoke 1 Spoke 2 Spoke 3 Spoke N… VPN CLOUD SECURITY BLUEPRINT
  • 28. 28©2017 Check Point Software Technologies Ltd. MULTI-CLOUD SECURITY BLUEPRINT
  • 29. 29©2017 Check Point Software Technologies Ltd. • Agile New spokes created by DevOps are automatically protected • Architecture Auto-Provision ̶ Via AWS CloudFormation ̶ Via Azure solution templates • Control: Security admin gain visibility for east-west and north-south traffic CLOUD SECURITY BLUEPRINT
  • 30. 30©2017 Check Point Software Technologies Ltd. CLOUDGUARD – ADAPTIVE SECURITY Security at the speed of DevOps
  • 31. 31©2017 Check Point Software Technologies Ltd. APPLICATION-AWARE POLICY TIED TO CLOUD MANAGEMENT AND SDN
  • 32. 32©2017 Check Point Software Technologies Ltd. CLOUDGUARD ADAPTIVE SECURITY Check Point Access Policy Rule From To Application Action 3 Web_SecurityGroup AWS Object DB_VM vCenter Object MSSQL Allow 4 CRM_SecurityGroup Azure Object SAP_SecurityGroup NSX Object CRM Allow Drag & Drop dynamic policy with cloud objects 5 AWS_VPC AWS Object Azure_VNET Azure Object ADFS Allow
  • 33. 33©2017 Check Point Software Technologies Ltd. ADAPTIVE SECURITY THAT ENABLES INNOVATION Easy to secure and connect Multi-cloud applications Applications are protected with the best security DevOps and IT Security speak the same language Policy is updated when application is deleted Application owner never waits Reduce security tickets by 60%
  • 34. 34©2017 Check Point Software Technologies Ltd. SUMMARY
  • 35. 35©2017 Check Point Software Technologies Ltd. SUCCESS More than 3,500 customers use Check Point to secure their cloud 35©2017 Check Point Software Technologies Ltd.
  • 36. 36©2017 Check Point Software Technologies Ltd. Innovate with Check Point Cloud Security • Best protection against modern attacks • Security that adapts to application changes • Unified security that connects all your clouds SECURITY AT THE SPEED OF DEVOPS
  • 37. 37©2018 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd. THANK YOU