SlideShare a Scribd company logo
1
©2022 Check Point Software Technologies Ltd.
QUANTUM SD-WAN
UNIFYING THE BEST SECURITY WITH
OPTIMIZED CONNECTIVITY
2
©2022 Check Point Software Technologies Ltd.
Fast internet connectivity requires SD-WAN
DATA
CENTER
BROADBAND, 4G/5G, etc.
SD-WAN
BRANCH
OFFICE
SD-WAN
ANY LINK:
• BROADBAND
• 4G/5G/LTE
• MPLS
• Etc.
• Organizations are connecting
directly to the internet, adopting
SD-WAN
• SD-WAN optimizes Internet
connectivity with better service
levels and lower costs
3
©2022 Check Point Software Technologies Ltd.
SD-WAN reduces networking costs by 80%
MPLS Solution Broadband +
SD-WAN
Solution
Reduce monthly expenses
by 80% compared with
MPLS solutions
Resilient
and faster
connectivity
Autonomous SD-WAN
steering policies for
10,000+ applications
$185
Total per site/month
$1,000
Total per site/month
• ISP1 – 1 Gbps broadband
internet for $80/mo.
• ISP2 – 1 Gbps broadband
internet for $80/mo.
• SD-WAN service for
$14.8/mo. (1535 Spark)
• MPLS Ethernet
(100Mbps) at
$1000/mo.
4
©2022 Check Point Software Technologies Ltd.
Direct connectivity via SD-WAN bypasses enterprise security
Exposing branches to Gen V attacks
Increased Risk of Cyber Attacks
Requires a New Approach
to Branch Security DATA
CENTER
BRANCH
OFFICE
SD-WAN
Direct connections
bypass the
enterprise firewall
5
©2022 Check Point Software Technologies Ltd.
INTRODUCING
New software blade in Quantum Gateways
Unifying best security with optimized internet
and network connectivity
NOW AVAILABLE
6
©2022 Check Point Software Technologies Ltd.
Activate SD-WAN Blade from your Quantum Gateways
Next Generation
Firewall
Next Generation
Threat Prevention
Sandblast - Gen V
Threat Prevention
Quantum IoT Quantum SD-WAN
Firewall
VPN
Application-Control
IPS
NextGenerationFirewall+
Threat Emulation
Threat Extraction
IoT discovery
IoT threat prevention
Application prioritization
Connectivity monitoring
Automated link failover
Bandwidth aggregation
Anti Virus
Anti Bot
URL Filtering
Anti Spam
12 Blades – Best Security IoT SD-WAN
Advanced DNS
Security
Zero Phishing
R81.20 required R81.10 required
NextGenerationThreatPrevention+
R81.20 required
7
©2022 Check Point Software Technologies Ltd.
Medium Enterprise Large Enterprise
Up to 30 Gbps
28000
Up to 7.4 Gbps
6000 16200
T H R E AT P R E V E N T I O N + S D - WA N * T H R O U G H P U T
Supported in a broad range
of Quantum Gateways
Small Branch Office
Up to 1 Gbps
1500 3000
Medium Branch Office
Up to 1.5 Gbps
Full branch security stack with optimized connectivity
Up to 15 Gbps
Data Center
*estimated
8
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
9
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
10
©2022 Check Point Software Technologies Ltd.
Uncompromising Branch Security
Prevents all Branch Threats
Known & Unknown threats,
Ransomware and Phishing
Highest Malware Catch Rate
Blocks 99.7% of new malware*
*Per 2023 Miercom NGFW Benchmark Report
11
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
12
©2022 Check Point Software Technologies Ltd.
No more Zoom™ interruptions
Smooth Web Conferencing
sub-second failover between Internet connections
Optimized routing for applications and users
with 10,000+ supported apps
Internet Connectivity Monitoring
for latency, jitter and packet loss
With rich SD-WAN Capabilities
13
©2022 Check Point Software Technologies Ltd.
Optimized routing for applications and users
DESTINATION
USER, GROUP
OR NETWORK
OVER 10,000
APPLICATIONS
User-based
Optimization
10,000+
Apps
Application
Prioritization
Optimized
Steering
STEERING
BEHAVIOR
14
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
15
©2022 Check Point Software Technologies Ltd.
BEST
SECURITY
NETWORKING
Connectivity monitoring
Automated link failover
Application prioritization
SECURITY & NETWORKING
FROM THE CLOUD
SASE
Bandwidth aggregation
Complete Security & Internet-access (SASE) solution
Unified Management from Check Point Infinity
Secure Internet Access
Data Protection
Malware & Phishing Prevention
SaaS Security
16
©2022 Check Point Software Technologies Ltd.
The SD-WAN software blade is
AVAILABLE TODAY
as a service,
at a simple monthly price
1535
Base Appliance
SD-WAN
Blade for Small Branch
Starting at
$14.8
Per Month
6200
Enterprise Appliance
Starting at
$328
Per Month
SD-WAN
Blade for Enterprise
17
©2022 Check Point Software Technologies Ltd.
Manufacturing Case Study
European-based Global Textile Manufacturer
• Competitive replacement owing to superior security
• 3000 employees globally, 20 branches
• Key SD-WAN requirements
• Resilient security & connectivity
• Single appliance for both
• Why Check Point?
• Easy and fast deployment
• Sufficient SD-WAN features to replace incumbent solution
Quantum SD-WAN fulfilled all our immediate needs,
achieving secure access and cost savings.
Solution Architect
European-based global textile manufacturer
December 2022
”
“
18
©2022 Check Point Software Technologies Ltd.
Public Services Case Study
Municipality in LATAM
• Competitive replacement owing to superior security
• Local govt body with 500 employees, 70 branches
• Key SD-WAN requirements
• Direct internet connectivity for SaaS apps
• MPLS and VPN connecting to Datacenter
• Why Check Point?
• Better security than incumbent vendor
• Converged security and SD-WAN solution
We chose Check Point’s Quantum SD-WAN because it
provided superior security to that of our incumbent SD-
WAN solution. We were looking for truly converged
security and SD-WAN and found that in their solution.
Solution Architect
LATM-based Municipality
December 2022
”
“
19
©2022 Check Point Software Technologies Ltd.
Summary
New Quantum SD-WAN
software blade
embedded in Quantum
Gateways
Optimized, secure
connectivity for
branch offices
10,000+ Auto-Steered Apps
Industry’s largest repository
Sub-second Failover
For uninterrupted zoom calls
Lower TCO
With single appliance
Complete SASE Solution
Consistent policies across
users & branches
Best Security
Highest malware catch rate
Quantum
SD-WAN
20
©2022 Check Point Software Technologies Ltd.
SD-WAN Market Comparison
Capabilities
Malware Block Rate 99.70% 72.70% 46.10% 43.60%
SD-WAN & SSE Solution
Quantum and
Harmony Connect
Missing SSE
SD-WAN only
Viptela &
Umbrella
Cloudgenix & Prisma
Steering Applications 10,000+ 5000+ 1400+ 3600+
Cloud-based Management YES
Partial on-prem
components
YES
Patrial on-prem
components
Autonomous Steering Policies
(SaaS Applications)
YES NO
Partial SaaS
applications only
NO
Application Routing YES YES YES YES
Advanced routing protocols
BGP, OSPF –
Roadmap 2023
BGP, OSPF BGP, OSPF, RIP BGP, OSPF
21
©2022 Check Point Software Technologies Ltd.
THANK YOU
22
©2022 Check Point Software Technologies Ltd.
Uncompromising Branch Security
Prevents all Branch Threats
Known & Unknown threats,
Ransomware and Phishing
Highest Malware Catch Rate
Blocks 99.7% of new malware*
*Per Miercom NGFW Benchmark 2023
DATA
CENTER
BROADBAND, 4G/5G
ETC.
BRANCH OFFICE
BROADBAND, 4G/5G, etc.
ANY LINK:
• BROADBAND
• 4G/5G/LTE
• MPLS
• Etc.

More Related Content

What's hot

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
A Software Defined WAN Architecture
A Software Defined WAN ArchitectureA Software Defined WAN Architecture
A Software Defined WAN Architecture
Open Networking Summits
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
Ashutosh Kaushik
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
Robb Boyd
 
Fortinet
FortinetFortinet
Fortinet
ABEP123
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
ParishSummer
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
Forcepoint LLC
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
Maganathin Veeraragaloo
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
rtp2009
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise Management Associates
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
Wen-Pai Lu
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
NajahIdrissiMoulayRa
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
SandeshUprety4
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
Guido Marchetti
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
Er. Ajay Sirsat
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
Belsoft
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
Michael Nickle
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
Karina Matos
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
Prime Infoserv
 

What's hot (20)

Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
A Software Defined WAN Architecture
A Software Defined WAN ArchitectureA Software Defined WAN Architecture
A Software Defined WAN Architecture
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
TechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WANTechWiseTV Workshop: Cisco SD-WAN
TechWiseTV Workshop: Cisco SD-WAN
 
Fortinet
FortinetFortinet
Fortinet
 
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdfMicrosoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
CLOUD NATIVE SECURITY
CLOUD NATIVE SECURITYCLOUD NATIVE SECURITY
CLOUD NATIVE SECURITY
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the PandemicEnterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
FortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptxFortiGate_Sec_02_Security Fabric (1).pptx
FortiGate_Sec_02_Security Fabric (1).pptx
 
SOC and SIEM.pptx
SOC and SIEM.pptxSOC and SIEM.pptx
SOC and SIEM.pptx
 
Zero trust deck 2020
Zero trust deck 2020Zero trust deck 2020
Zero trust deck 2020
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013Palo Alto Networks 28.5.2013
Palo Alto Networks 28.5.2013
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 

Similar to Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf

0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
Saurabh Chauhan
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
ThousandEyes
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
bayusch
 
Thousand Eyes FMD.pptx
Thousand Eyes FMD.pptxThousand Eyes FMD.pptx
Thousand Eyes FMD.pptx
AnandYadav542909
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
RENJITHKNAIR5
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
ThousandEyes
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
Scott Logan
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
ThousandEyes
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
Netpluz Asia Pte Ltd
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PROIDEA
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
Mike Trawick
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
ThousandEyes
 
Inteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityInteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivity
MarketingArrowECS_CZ
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
Cisco Canada
 
Vdc introduction with cameroon in Nov, 2013
Vdc introduction  with cameroon in Nov, 2013Vdc introduction  with cameroon in Nov, 2013
Vdc introduction with cameroon in Nov, 2013
besuhao
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Digital Transformation EXPO Event Series
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
ThousandEyes
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
Netpluz Asia Pte Ltd
 

Similar to Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf (20)

0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
 
Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Thousand Eyes FMD.pptx
Thousand Eyes FMD.pptxThousand Eyes FMD.pptx
Thousand Eyes FMD.pptx
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Inteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityInteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivity
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Vdc introduction with cameroon in Nov, 2013
Vdc introduction  with cameroon in Nov, 2013Vdc introduction  with cameroon in Nov, 2013
Vdc introduction with cameroon in Nov, 2013
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 

Recently uploaded

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 

Recently uploaded (20)

PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 

Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf

  • 1. 1 ©2022 Check Point Software Technologies Ltd. QUANTUM SD-WAN UNIFYING THE BEST SECURITY WITH OPTIMIZED CONNECTIVITY
  • 2. 2 ©2022 Check Point Software Technologies Ltd. Fast internet connectivity requires SD-WAN DATA CENTER BROADBAND, 4G/5G, etc. SD-WAN BRANCH OFFICE SD-WAN ANY LINK: • BROADBAND • 4G/5G/LTE • MPLS • Etc. • Organizations are connecting directly to the internet, adopting SD-WAN • SD-WAN optimizes Internet connectivity with better service levels and lower costs
  • 3. 3 ©2022 Check Point Software Technologies Ltd. SD-WAN reduces networking costs by 80% MPLS Solution Broadband + SD-WAN Solution Reduce monthly expenses by 80% compared with MPLS solutions Resilient and faster connectivity Autonomous SD-WAN steering policies for 10,000+ applications $185 Total per site/month $1,000 Total per site/month • ISP1 – 1 Gbps broadband internet for $80/mo. • ISP2 – 1 Gbps broadband internet for $80/mo. • SD-WAN service for $14.8/mo. (1535 Spark) • MPLS Ethernet (100Mbps) at $1000/mo.
  • 4. 4 ©2022 Check Point Software Technologies Ltd. Direct connectivity via SD-WAN bypasses enterprise security Exposing branches to Gen V attacks Increased Risk of Cyber Attacks Requires a New Approach to Branch Security DATA CENTER BRANCH OFFICE SD-WAN Direct connections bypass the enterprise firewall
  • 5. 5 ©2022 Check Point Software Technologies Ltd. INTRODUCING New software blade in Quantum Gateways Unifying best security with optimized internet and network connectivity NOW AVAILABLE
  • 6. 6 ©2022 Check Point Software Technologies Ltd. Activate SD-WAN Blade from your Quantum Gateways Next Generation Firewall Next Generation Threat Prevention Sandblast - Gen V Threat Prevention Quantum IoT Quantum SD-WAN Firewall VPN Application-Control IPS NextGenerationFirewall+ Threat Emulation Threat Extraction IoT discovery IoT threat prevention Application prioritization Connectivity monitoring Automated link failover Bandwidth aggregation Anti Virus Anti Bot URL Filtering Anti Spam 12 Blades – Best Security IoT SD-WAN Advanced DNS Security Zero Phishing R81.20 required R81.10 required NextGenerationThreatPrevention+ R81.20 required
  • 7. 7 ©2022 Check Point Software Technologies Ltd. Medium Enterprise Large Enterprise Up to 30 Gbps 28000 Up to 7.4 Gbps 6000 16200 T H R E AT P R E V E N T I O N + S D - WA N * T H R O U G H P U T Supported in a broad range of Quantum Gateways Small Branch Office Up to 1 Gbps 1500 3000 Medium Branch Office Up to 1.5 Gbps Full branch security stack with optimized connectivity Up to 15 Gbps Data Center *estimated
  • 8. 8 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 9. 9 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 10. 10 ©2022 Check Point Software Technologies Ltd. Uncompromising Branch Security Prevents all Branch Threats Known & Unknown threats, Ransomware and Phishing Highest Malware Catch Rate Blocks 99.7% of new malware* *Per 2023 Miercom NGFW Benchmark Report
  • 11. 11 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 12. 12 ©2022 Check Point Software Technologies Ltd. No more Zoom™ interruptions Smooth Web Conferencing sub-second failover between Internet connections Optimized routing for applications and users with 10,000+ supported apps Internet Connectivity Monitoring for latency, jitter and packet loss With rich SD-WAN Capabilities
  • 13. 13 ©2022 Check Point Software Technologies Ltd. Optimized routing for applications and users DESTINATION USER, GROUP OR NETWORK OVER 10,000 APPLICATIONS User-based Optimization 10,000+ Apps Application Prioritization Optimized Steering STEERING BEHAVIOR
  • 14. 14 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 15. 15 ©2022 Check Point Software Technologies Ltd. BEST SECURITY NETWORKING Connectivity monitoring Automated link failover Application prioritization SECURITY & NETWORKING FROM THE CLOUD SASE Bandwidth aggregation Complete Security & Internet-access (SASE) solution Unified Management from Check Point Infinity Secure Internet Access Data Protection Malware & Phishing Prevention SaaS Security
  • 16. 16 ©2022 Check Point Software Technologies Ltd. The SD-WAN software blade is AVAILABLE TODAY as a service, at a simple monthly price 1535 Base Appliance SD-WAN Blade for Small Branch Starting at $14.8 Per Month 6200 Enterprise Appliance Starting at $328 Per Month SD-WAN Blade for Enterprise
  • 17. 17 ©2022 Check Point Software Technologies Ltd. Manufacturing Case Study European-based Global Textile Manufacturer • Competitive replacement owing to superior security • 3000 employees globally, 20 branches • Key SD-WAN requirements • Resilient security & connectivity • Single appliance for both • Why Check Point? • Easy and fast deployment • Sufficient SD-WAN features to replace incumbent solution Quantum SD-WAN fulfilled all our immediate needs, achieving secure access and cost savings. Solution Architect European-based global textile manufacturer December 2022 ” “
  • 18. 18 ©2022 Check Point Software Technologies Ltd. Public Services Case Study Municipality in LATAM • Competitive replacement owing to superior security • Local govt body with 500 employees, 70 branches • Key SD-WAN requirements • Direct internet connectivity for SaaS apps • MPLS and VPN connecting to Datacenter • Why Check Point? • Better security than incumbent vendor • Converged security and SD-WAN solution We chose Check Point’s Quantum SD-WAN because it provided superior security to that of our incumbent SD- WAN solution. We were looking for truly converged security and SD-WAN and found that in their solution. Solution Architect LATM-based Municipality December 2022 ” “
  • 19. 19 ©2022 Check Point Software Technologies Ltd. Summary New Quantum SD-WAN software blade embedded in Quantum Gateways Optimized, secure connectivity for branch offices 10,000+ Auto-Steered Apps Industry’s largest repository Sub-second Failover For uninterrupted zoom calls Lower TCO With single appliance Complete SASE Solution Consistent policies across users & branches Best Security Highest malware catch rate Quantum SD-WAN
  • 20. 20 ©2022 Check Point Software Technologies Ltd. SD-WAN Market Comparison Capabilities Malware Block Rate 99.70% 72.70% 46.10% 43.60% SD-WAN & SSE Solution Quantum and Harmony Connect Missing SSE SD-WAN only Viptela & Umbrella Cloudgenix & Prisma Steering Applications 10,000+ 5000+ 1400+ 3600+ Cloud-based Management YES Partial on-prem components YES Patrial on-prem components Autonomous Steering Policies (SaaS Applications) YES NO Partial SaaS applications only NO Application Routing YES YES YES YES Advanced routing protocols BGP, OSPF – Roadmap 2023 BGP, OSPF BGP, OSPF, RIP BGP, OSPF
  • 21. 21 ©2022 Check Point Software Technologies Ltd. THANK YOU
  • 22. 22 ©2022 Check Point Software Technologies Ltd. Uncompromising Branch Security Prevents all Branch Threats Known & Unknown threats, Ransomware and Phishing Highest Malware Catch Rate Blocks 99.7% of new malware* *Per Miercom NGFW Benchmark 2023 DATA CENTER BROADBAND, 4G/5G ETC. BRANCH OFFICE BROADBAND, 4G/5G, etc. ANY LINK: • BROADBAND • 4G/5G/LTE • MPLS • Etc.