SlideShare a Scribd company logo
From Branch to Data
Center: Securing the Next
Generation Enterprise

April 2013
Ofer Or

©2013 Check Point Software Technologies Ltd.
Let’s think about Security…
©2013 Check Point Software Technologies Ltd.

2
My Enterprise Security

[Restricted] ONLY for designated groups and individuals

©2013 Check Point Software Technologies Ltd.

3
…and what about the castle’s keep?
©2013 Check Point Software Technologies Ltd.

4
Is your Data Center Secured?
Can you support the security and performance requirements
of your data center?
©2013 Check Point Software Technologies Ltd.

5
More Security, Additional Power
FW & VPN
Software Blades

Application
IPS
Control
Software Blade Software Blade

Identity
Awareness
Software Blade

Antivirus
Software Blade

Email
Security
URL Filtering
Software Blade Software Blade

Anti-Bot
Software
Blade*

The Security You Want
The Performance You Need
©2013 Check Point Software Technologies Ltd.

6
Best Security with Highest Scores

For Firewall, Next Gen Firewall and IPS

Firewall
Next Generation Firewall
IPS
Threat Prevention
©2013 Check Point Software Technologies Ltd.

7
Check Point 61000 Appliance

Industry’s Fastest Next Generation Firewall

New Software Blades Support
NEW

Mobile
Access

NEW

Anti-Bot

NEW

DLP*

©2013 Check Point Software Technologies Ltd.

8
Check Point 61000 Appliance

…and Now Also with Next Generation
Virtual Systems

Scalability & Robustness

Customized Security

©2013 Check Point Software Technologies Ltd.

9
Scalability and Robustness

Robust Load Sharing
VS traffic evenly balanced
across the entire chassis

Easy Scale-Up
By adding MORE Virtual Systems
and MORE HW blades

©2013 Check Point Software Technologies Ltd.

10
Customized Security

Tailored Security per
Network Segment
Any Software Blade(s) with Any
security policy on Any Virtual System

IPS

VPN

IPS

AV

Anti-Bot

IA

APCL

URLF

AV

©2013 Check Point Software Technologies Ltd.

11
61000 Special Promotion

Get 10 Virtual Systems for Free
with your New 61000!
VS
License
VSs x10

* Promotion is valid until end of 2013

©2013 Check Point Software Technologies Ltd.

12
Check Point 21000 Appliances

Best Performance in a
Compact 2U Chassis

Low Latency for
Time-Sensitive Applications

©2013 Check Point Software Technologies Ltd.

13
Best Performance in a 2U Chassis

21700 Appliance

21400 Appliance 21600 Appliance
Security Power

2003/2900*

2501/3300*

17%

2922/3551*

Max Firewall Throughput

17/50 Gbps

21/75 Gbps

20%

25/78 Gbps

Max VPN Throughput

7 Gbps

8.5 Gbps

30%

11 Gbps

Max IPS Throughput

2.7/6.0 Gbps

3.5/6.8 Gbps

18%

4.1/8.0 Gbps

(Production Performance / 1518 byte UDP)

(Production Performance / Recommended profile)

* With Security Acceleration Module

©2013 Check Point Software Technologies Ltd.

14
Security Acceleration Module

Fastest Performance in a 2U Appliance for
latency sensitive applications
 Sub 5 µs Firewall latency

 110 Gbps Firewall throughput
 50 Gbps VPN throughput
 60 Million Packets per Second

 300,000 Connections per Second

©2013 Check Point Software Technologies Ltd.

15
©2013 Check Point Software Technologies Ltd.

16
…and what about your branch security?

©2013 Check Point Software Technologies Ltd.

17
Are Your Branches Secured?

Do you run the same Security

Do you have the same Security Policy at the Enterprise Network
and at the Remote Branches?
©2013 Check Point Software Technologies Ltd.

18
Introducing

N e w C h e c k P o i n t 11 0 0
©2013 Check Point Software Technologies Ltd.

19
More Security – Now for the Branch

Extended Industry Leading Security
Across Entire Corporate Network
FW & VPN

IPS

Application Identity
Antivirus
Control Awareness

URL
Filtering

Email
Security

Anti-Bot

Corporate
Headquarter

Branch /
Remote office
* Anti-Bot blade will be available on 1100 Appliance in H2 2013
©2013 Check Point Software Technologies Ltd.

20
1100 Appliance Management

Central

Local

Powered by Check Point Leading Security Management

©2013 Check Point Software Technologies Ltd.

21
Easy and Intuitive Local Management
Web-based UI

Simplified
Management

Local Maintenance

©2013 Check Point Software Technologies Ltd.

22
1100 Appliances Family

1120 Appliance

1140 Appliance

1180 Appliance

Target
Customer

Small branch
Up to 10 users

Small branch
Up to 25 users

Small branch
Up to 50 users

Security Power

28 SPU

34 SPU

37 SPU

Max Firewall
Throughput

750 Mbps

1 Gbps

1.5 Gbps

Max VPN
Throughput

140 Mbps

175 Mbps

220 Mbps

Price

Starting at $599

Starting at $899

Starting at $1699

4 Hardware Models Available per Appliance
1. Wired
2. Wired + Wireless

3. ADSL
4. ADSL + Wireless

©2013 Check Point Software Technologies Ltd.

23
…and finally, don’t forget the Towers!
©2013 Check Point Software Technologies Ltd.

24
Do you have Security Visibility?
Do you have full visibility to your Security Posture?
©2013 Check Point Software Technologies Ltd.

25
Majority of Organizations Use Internal Audits
to Monitor their Security
How does your organization assess the efficiency
and effectiveness of information security?
Assessments performed by internal audit function
Internal self-assessments by IT or information security
function
Monitoring and evaluation of security
incidents and events

68%
64%

48%

Source: Ernst & Young’s 2012 Global Information Security Survey
©2013 Check Point Software Technologies Ltd.

26
Check Point Compliance Blade
Check Point Compliance Software Blade
Reduces Audit Time & Costs

Compliance

Security Monitoring based on
Industry Best Practices

In Depth Visibility to Security Status

Practical Recommendations to
Improve Compliance

©2013 Check Point Software Technologies Ltd.

27
Check Point Compliance Blade

Security Monitoring Based on
Industry Best Practices

©2013 Check Point Software Technologies Ltd.

28
Check Point Compliance Blade

In Depth Visibility to Security Status

©2013 Check Point Software Technologies Ltd.

29
Check Point Compliance Blade

With Practical Recommendations
to Improve Compliance

©2013 Check Point Software Technologies Ltd.

30
And Let’s Not Forget…
and more…
Top Statistics

Events Timelines
Rule Hit Count

SmartLog

The Best Monitoring and Security
Incident Evaluation Tools
©2013 Check Point Software Technologies Ltd.

31
Summary

Check Point Helps You Secure the
Next Generation Enterprise

The Security You Want.
The Performance
You Need.

Offering BIG Security
for Small Branches.

Unmatched Security
Visibility.

©2013 Check Point Software Technologies Ltd.

32
Thank You!

©2013 Check Point Software Technologies Ltd.

More Related Content

What's hot

Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
Group of company MUK
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
Nextel S.A.
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
Group of company MUK
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Global Online Trainings
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
Moti Sagey מוטי שגיא
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
Leonardo Antichi
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
davebrosnan
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Moti Sagey מוטי שגיא
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
Vaibhav Agrawal
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
Check Point Software Technologies
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
Rahul Neel Mani
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
Cisco Enterprise Networks
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
Robb Boyd
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitShah Sheikh
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
mmiznoni
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
Dejan Jeremic
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewallsCastleforce
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
Ben Rothke
 

What's hot (20)

Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Checkpoint Overview
Checkpoint OverviewCheckpoint Overview
Checkpoint Overview
 
Multi domain security-management_technical_presentation
Multi domain security-management_technical_presentationMulti domain security-management_technical_presentation
Multi domain security-management_technical_presentation
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
State of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of BotnetsState of the Internet: Mirai, IOT and History of Botnets
State of the Internet: Mirai, IOT and History of Botnets
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
TechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnectTechWiseTV Workshop: OpenDNS and AnyConnect
TechWiseTV Workshop: OpenDNS and AnyConnect
 
VIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS SummitVIPER Labs - VOIP Security - SANS Summit
VIPER Labs - VOIP Security - SANS Summit
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Sasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protectionSasa milic, cisco advanced malware protection
Sasa milic, cisco advanced malware protection
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
Auditing Check Point Firewalls
Auditing Check Point FirewallsAuditing Check Point Firewalls
Auditing Check Point Firewalls
 

Similar to Check Point: From Branch to Data Center

Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
Cisco Canada
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
Group of company MUK
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
IRJET Journal
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
Savvius, Inc
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
BGA Cyber Security
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
Rafael Maranon
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
xband
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
Frederik Lawson
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
EBERTE
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
NetworkCollaborators
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
ThousandEyes
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
Usman Arif
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
Robb Boyd
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
AlgoSec
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
LiveAction Next Generation Network Management Software
 

Similar to Check Point: From Branch to Data Center (20)

Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
IRJET- Network Monitoring & Network Security
IRJET-  	  Network Monitoring & Network SecurityIRJET-  	  Network Monitoring & Network Security
IRJET- Network Monitoring & Network Security
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
8 Ocak 2015 SOME Etkinligi - Cisco Next Generation Security
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
Cisco Connect 2018 Thailand - Enabling the next gen data center transformatio...
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Cisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIACisco Network Insider Series: Securing Your Branch for DIA
Cisco Network Insider Series: Securing Your Branch for DIA
 
Build and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinarBuild and enforce defense in depth - an algo sec-cisco tetration webinar
Build and enforce defense in depth - an algo sec-cisco tetration webinar
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
Sourcefire - A Next-Generation Intrusion Prevention Solution Delivering Scala...
 

More from Group of company MUK

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
Group of company MUK
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
Group of company MUK
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
Group of company MUK
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
Group of company MUK
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
Group of company MUK
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
Group of company MUK
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
Group of company MUK
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
Group of company MUK
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
Group of company MUK
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
Group of company MUK
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
Group of company MUK
 

More from Group of company MUK (12)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 

Check Point: From Branch to Data Center

  • 1. From Branch to Data Center: Securing the Next Generation Enterprise April 2013 Ofer Or ©2013 Check Point Software Technologies Ltd.
  • 2. Let’s think about Security… ©2013 Check Point Software Technologies Ltd. 2
  • 3. My Enterprise Security [Restricted] ONLY for designated groups and individuals ©2013 Check Point Software Technologies Ltd. 3
  • 4. …and what about the castle’s keep? ©2013 Check Point Software Technologies Ltd. 4
  • 5. Is your Data Center Secured? Can you support the security and performance requirements of your data center? ©2013 Check Point Software Technologies Ltd. 5
  • 6. More Security, Additional Power FW & VPN Software Blades Application IPS Control Software Blade Software Blade Identity Awareness Software Blade Antivirus Software Blade Email Security URL Filtering Software Blade Software Blade Anti-Bot Software Blade* The Security You Want The Performance You Need ©2013 Check Point Software Technologies Ltd. 6
  • 7. Best Security with Highest Scores For Firewall, Next Gen Firewall and IPS Firewall Next Generation Firewall IPS Threat Prevention ©2013 Check Point Software Technologies Ltd. 7
  • 8. Check Point 61000 Appliance Industry’s Fastest Next Generation Firewall New Software Blades Support NEW Mobile Access NEW Anti-Bot NEW DLP* ©2013 Check Point Software Technologies Ltd. 8
  • 9. Check Point 61000 Appliance …and Now Also with Next Generation Virtual Systems Scalability & Robustness Customized Security ©2013 Check Point Software Technologies Ltd. 9
  • 10. Scalability and Robustness Robust Load Sharing VS traffic evenly balanced across the entire chassis Easy Scale-Up By adding MORE Virtual Systems and MORE HW blades ©2013 Check Point Software Technologies Ltd. 10
  • 11. Customized Security Tailored Security per Network Segment Any Software Blade(s) with Any security policy on Any Virtual System IPS VPN IPS AV Anti-Bot IA APCL URLF AV ©2013 Check Point Software Technologies Ltd. 11
  • 12. 61000 Special Promotion Get 10 Virtual Systems for Free with your New 61000! VS License VSs x10 * Promotion is valid until end of 2013 ©2013 Check Point Software Technologies Ltd. 12
  • 13. Check Point 21000 Appliances Best Performance in a Compact 2U Chassis Low Latency for Time-Sensitive Applications ©2013 Check Point Software Technologies Ltd. 13
  • 14. Best Performance in a 2U Chassis 21700 Appliance 21400 Appliance 21600 Appliance Security Power 2003/2900* 2501/3300* 17% 2922/3551* Max Firewall Throughput 17/50 Gbps 21/75 Gbps 20% 25/78 Gbps Max VPN Throughput 7 Gbps 8.5 Gbps 30% 11 Gbps Max IPS Throughput 2.7/6.0 Gbps 3.5/6.8 Gbps 18% 4.1/8.0 Gbps (Production Performance / 1518 byte UDP) (Production Performance / Recommended profile) * With Security Acceleration Module ©2013 Check Point Software Technologies Ltd. 14
  • 15. Security Acceleration Module Fastest Performance in a 2U Appliance for latency sensitive applications  Sub 5 µs Firewall latency  110 Gbps Firewall throughput  50 Gbps VPN throughput  60 Million Packets per Second  300,000 Connections per Second ©2013 Check Point Software Technologies Ltd. 15
  • 16. ©2013 Check Point Software Technologies Ltd. 16
  • 17. …and what about your branch security? ©2013 Check Point Software Technologies Ltd. 17
  • 18. Are Your Branches Secured? Do you run the same Security Do you have the same Security Policy at the Enterprise Network and at the Remote Branches? ©2013 Check Point Software Technologies Ltd. 18
  • 19. Introducing N e w C h e c k P o i n t 11 0 0 ©2013 Check Point Software Technologies Ltd. 19
  • 20. More Security – Now for the Branch Extended Industry Leading Security Across Entire Corporate Network FW & VPN IPS Application Identity Antivirus Control Awareness URL Filtering Email Security Anti-Bot Corporate Headquarter Branch / Remote office * Anti-Bot blade will be available on 1100 Appliance in H2 2013 ©2013 Check Point Software Technologies Ltd. 20
  • 21. 1100 Appliance Management Central Local Powered by Check Point Leading Security Management ©2013 Check Point Software Technologies Ltd. 21
  • 22. Easy and Intuitive Local Management Web-based UI Simplified Management Local Maintenance ©2013 Check Point Software Technologies Ltd. 22
  • 23. 1100 Appliances Family 1120 Appliance 1140 Appliance 1180 Appliance Target Customer Small branch Up to 10 users Small branch Up to 25 users Small branch Up to 50 users Security Power 28 SPU 34 SPU 37 SPU Max Firewall Throughput 750 Mbps 1 Gbps 1.5 Gbps Max VPN Throughput 140 Mbps 175 Mbps 220 Mbps Price Starting at $599 Starting at $899 Starting at $1699 4 Hardware Models Available per Appliance 1. Wired 2. Wired + Wireless 3. ADSL 4. ADSL + Wireless ©2013 Check Point Software Technologies Ltd. 23
  • 24. …and finally, don’t forget the Towers! ©2013 Check Point Software Technologies Ltd. 24
  • 25. Do you have Security Visibility? Do you have full visibility to your Security Posture? ©2013 Check Point Software Technologies Ltd. 25
  • 26. Majority of Organizations Use Internal Audits to Monitor their Security How does your organization assess the efficiency and effectiveness of information security? Assessments performed by internal audit function Internal self-assessments by IT or information security function Monitoring and evaluation of security incidents and events 68% 64% 48% Source: Ernst & Young’s 2012 Global Information Security Survey ©2013 Check Point Software Technologies Ltd. 26
  • 27. Check Point Compliance Blade Check Point Compliance Software Blade Reduces Audit Time & Costs Compliance Security Monitoring based on Industry Best Practices In Depth Visibility to Security Status Practical Recommendations to Improve Compliance ©2013 Check Point Software Technologies Ltd. 27
  • 28. Check Point Compliance Blade Security Monitoring Based on Industry Best Practices ©2013 Check Point Software Technologies Ltd. 28
  • 29. Check Point Compliance Blade In Depth Visibility to Security Status ©2013 Check Point Software Technologies Ltd. 29
  • 30. Check Point Compliance Blade With Practical Recommendations to Improve Compliance ©2013 Check Point Software Technologies Ltd. 30
  • 31. And Let’s Not Forget… and more… Top Statistics Events Timelines Rule Hit Count SmartLog The Best Monitoring and Security Incident Evaluation Tools ©2013 Check Point Software Technologies Ltd. 31
  • 32. Summary Check Point Helps You Secure the Next Generation Enterprise The Security You Want. The Performance You Need. Offering BIG Security for Small Branches. Unmatched Security Visibility. ©2013 Check Point Software Technologies Ltd. 32
  • 33. Thank You! ©2013 Check Point Software Technologies Ltd.

Editor's Notes

  1. http://www.istockphoto.com/stock-illustration-9521095-castle.phphttp://www.istockphoto.com/stock-illustration-13879758-little-princess-girl.php?st=a1916ba
  2. For every 61k you buy you get 10 VSs
  3. Check Point21700 creates value in all aspects:First and most important, it includes the most comprehensive security solutionCheck Point 21700 further improves performance, and offers industry’s best performance in a 2U chassisSupporting the SAM,Security Acceleration Module, 21700 features sub 5usec latency for time-sensitive applications, such as financial trading, and ultra high FW and VPN performanceAnd last, the 21700, includes the most comprehensive hardware feature set, including highest port count, redundancy and serviceability.
  4. The 21700 is a new member to the 21000 family of appliances.As you can see it improves performance in almost all aspects comparing to the 21600, while the main focus is on improving IPS and NGFW performance on real world traffic.You can see that the overall improvement in performance, compared to the 21600, is about 20%.17% more Security Power20% more FW throughput30% more VPN throughput18% more IPS throughput20% more packet forwarding capabilities and 21% more session ratePlease note that default and recommended profiles are based on RFC 3511, 2544, 2647, 1242 performance tests.Maximum Production Performance isbased upon the SecurityPower benchmark, which includes Real-world traffic, Multiple Software Blades, Typical rule-base, NAT and Logging enabled.
  5. With SAM, the 21700 can deliver: Sub 5 microseconds of firewall latency110 Gbps Firewall Throughput50 Gbps of VPN throughput60M packets per sec300K sessions/sec13M concurrent connections
  6. http://www.istockphoto.com/stock-photo-20219036-computer-in-data-center.php?st=03c45ec