SlideShare a Scribd company logo
1 of 28
1
©2022 Check Point Software Technologies Ltd.
Cindi Carter | Field CISO @ Check Point
DEFINING THE MODERN
CYBERSECURITY ARCHITECTURE
CHECK POINT INFINITY
Antoine Korulski | Product Marketing Manager @ Check Point
2
©2022 Check Point Software Technologies Ltd.
Why is cybersecurity
architecture important?
What are the challenges with
a fragmented cybersecurity
architecture?
How to implement a modern
cyber security architecture?
3
©2022 Check Point Software Technologies Ltd.
WHY IS CYBERSECURITY
ARCHITECTURE IMPORTANT?
4
©2022 Check Point Software Technologies Ltd.
Obsolete Technology
Obsolete Technology
On average, companies waste 37% of
their software budget on obsolete
technology, equating to ~ $30 billion.
PCs more than three years old are 28%
more susceptible to viruses.
Old or outdated laptops are 58% more
susceptible.
Redundancy
On average, 33% of company data is considered
redundant, obsolete, or trivial.
Unprotected Data
41% of companies have > 1,000 sensitive files
unprotected.
A poor architecture includes
5
©2022 Check Point Software Technologies Ltd.
Brand Reputation
Damage
Fines and
Lawsuits
Sensitive Data
Theft
Customer Trust
Decline
Ransomware
Avg. $4.62 Mio*
* IBM’s 2021 Cost of a Data Breach Report
Threat actors exploit vulnerable architectures
“Cyberattack on Red Cross compromised sensitive data on
over 515,000 vulnerable people."
— January 20, 2022, NPR
“Nvidia says hackers are leaking company
data after cyberattack attack."
— March 1, 2022, TechCrunch
6
©2022 Check Point Software Technologies Ltd.
WHAT ARE THE CHALLENGES WITH A
FRAGMENTED CYBERSECURITY
ARCHITECTURE?
7
©2022 Check Point Software Technologies Ltd.
[Internal Use] for Check Point employees​
16%
17%
20%
20%
23%
28%
28%
33%
36%
41%
0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50%
MitM (Man-in-the-Middle)
Drive-by attacks
SQL injection
Fileless attacks
DNS tunneling
Zero-day exploit
DDOS/DOS
Supply chain attacks
Phishing
Ransomware
*2022 security market trends research
Cyber security threats posing the biggest risks*
8
©2022 Check Point Software Technologies Ltd.
[Internal Use] for Check Point employees​
9
©2022 Check Point Software Technologies Ltd.
HOW TO IMPLEMENT A MODERN
CYBERSECURITY ARCHITECTURE?
10
©2022 Check Point Software Technologies Ltd.
Gartner Cybersecurity
Mesh Architecture
11
©2022 Check Point Software Technologies Ltd.
Check Point Infinity - A Consolidated Cyber
Security Architecture
 Cloud Network Security
 Cloud Security Posture Management
 Cloud Intelligence & Threat Hunting
 Cloud Workload Protection
 Application Security
 DevSecOps
 Secure corporate access
 Internet access security
 Mobile security
 Endpoint security
 Email & collaboration app
security
Add-ons:
 Unified Management
 Network Detection & Response
 SOC Platform
 Managed Detection &
Response (MDR)
 Coming soon: XDR
 Security Gateway
 Hyper-scale Networking
 Unified management
 IoT Security
 Branch Virtual Security GW
 Remote Access VPN
12
©2022 Check Point Software Technologies Ltd.
Network security
& management
Support
24/7 Premium Pro
Support
Cloud
security
Training, Incident
Response, and PS
Consulting
User & Access
Security
Software & Appliances Public & Private
Cloud
Zero Trust Access
Policies
13
©2022 Check Point Software Technologies Ltd.
Widest protection coverage across all attack vectors
Full Coverage Full Coverage Full Coverage Full Coverage Full Coverage Full Coverage
Basic product
(URLF)
No prevention
for unknown
No Product
Partial coverage
(Signature Based)
Partial coverage
(No Phishing)
Full Coverage
No Product
No prevention
for unknown
Combination of
MX & API-based
cloud email
Partial coverage
(Signature Based)
Partial coverage
(No Phishing)
Partial Coverage
Basic product
(URLF)
No prevention
for unknown
No Product No Product
Partial (No
Endpoint
security agent)
Partial Coverage
Basic product
(EDR)
No Gateway.
Endpoint based
only
No Product
Partial coverage
(No WAF)
Full coverage Partial Coverage
NETWORK
ATTACKS
END POINT
DEVICE
CORPORATE
EMAIL
WEB
SERVERS
CLOUD
MOBILE
DEVICES
14
©2022 Check Point Software Technologies Ltd.
Gain accurate prevention, everywhere
Powered by Check Point’s ThreatCloud
Big data threat intelligence
Always acquires the most recent
IoCs and protections of latest attacks seen in the wild
AI technology
30+ AI and Machine Learning technologies that identify
and block emerging threats that were never seen before
QUANTUM CLOUDGUARD HARMONY
Telemetry
Telemetry
ACCURATE PREVENTION
(MALICIOUS/SAFE)
INFINITY
Prevention first
Block attacks faster than
anyone else
Best Catch rate
Of known & unknown threats
Near Zero false positives
Uninterrupted user productivity
Less alerts/tickets for sec admins
15
©2022 Check Point Software Technologies Ltd.
The Power of ThreatCloud
Dozens of external feeds and crawling the
www and social media
Unique ML algorithms detecting 650,000
suspicious domains daily
Millions of Endpoint devices
150,000 Connected networks
2,000,000,000 Websites and files inspected daily
16
©2022 Check Point Software Technologies Ltd.
CASE STUDIES
17
©2022 Check Point Software Technologies Ltd.
Infinity ELA package includes
• Advanced network security with
Zero-Day protection for:
• HQ datacenter
• 4 corporate perimeters
• 122 stores
• Private and public cloud security for
10 applications in the cloud
• Endpoint and mobile security for
11,000 employees
# Security vendors
# Security engineers
Annual TCO
Security benefits
Existing point
security solutions
18
30
$9.4M
4
16
$5.7M
Unified security
architecture
• Unified management
• Globally shared threat
intelligence
• Increased threat
protection
A US Retailer reduced total security costs by 39%
18
©2022 Check Point Software Technologies Ltd.
Infinity ELA package includes
• Advanced network security with
Zero-Day protection for:
• Hospital datacenter
• 2 campuses perimeters
• 1,500 IoT medical devices (740
beds)
• Private and public cloud security for
10 applications in the cloud
• Endpoint and mobile security for
5,200 employees
# Security vendors
# Security engineers
Annual TCO
Security benefits
Existing point
security solutions
19
24
$5.9M
4
6
$2.7M
Unified security
architecture
• Cost predictability
• Increased threat
protection & intelligence
• Cloud security
EU Hospital reduced total security costs by 54%
19
©2022 Check Point Software Technologies Ltd.
Cut down TCO and increase efficiency with a single
security architecture
Mobile
Cloud
Endpoint
Endpoint
Cloud
Mobile
Network
*Average reduction across our customer portfolio
~ 20% reduction in security costs
Network
~ 47% increase in operational efficiency
 A focus on threat prevention reduces
incident response costs
 A single management system reduces
employee training
 Improved workflow increases security
effectiveness
 A unified policy lowers management costs
 Simplified integration with IT systems
- 20%
20
©2022 Check Point Software Technologies Ltd.
1st place in
Tech
Innovation
MITRE ATT&CK® 2022
Evaluations Highlight
Harmony Leadership in
Endpoint Security
Highest technique
detection level with
100% detection of 19
attack steps A Worldwide Major Player
in Endpoint Security for
Enterprises and SMBs
IDC MarketScape 2021 for Modern Endpoint Security
22 times a Leader in 2021
Gartner Magic Quadrant
for Network Firewalls
Leader in G2.com
For Firewall, cloud,
Endpoint, and Mobile
Data security
Industry Recognition
21
©2022 Check Point Software Technologies Ltd.
Check Point Infinity Enterprise License Agreement ensures the protection
of sensitive financial data
"We have used Check Point for a very long time, and it is heavily
involved in our daily operations. We are very happy with what Check
Point provides us."
— Kaur Lillepõld, Head of Network and Telephony at SEB Baltics
Eurowind protects critical energy infrastructure from Gen V Cyber
Attacks with Check Point Enterprise License Agreement
"The Check Point Infinity ELA model covers all current
threats. I don’t have to choose different vendors for specific
tasks or challenges. Everything is included."
Kim Moberg, IT Manager, Eurowind Energy
What our customers say about Infinity ELA
22
©2022 Check Point Software Technologies Ltd.
Consolidated
Security
A simple, predictable,
all-inclusive business
model to secure your
everything
Increased
Protection
Protection across the
entire IT infrastructure:
Networks, cloud,
endpoints, and mobile
Reduced
TCO
Achieve a 50%
increase in operational
efficiency and a 20%
security cost reduction
23
©2022 Check Point Software Technologies Ltd.
24
©2022 Check Point Software Technologies Ltd.
25
©2022 Check Point Software Technologies Ltd.
FOR MORE INFO ABOUT INFINITY
SCAN QR
OR VISIT
WWW.CHECKPOINT.COM/INFINITY-VISION/ENTERPRISE-LICENSE-AGREEMENT/
26
©2022 Check Point Software Technologies Ltd.
SECURE THE CLOUD
SECURE THE WORKFORCE
THREAT INTELLIGENCE
Check Point Infinity unified architecture and services
SECURE THE NETWORK
ICS
PERIMETER
DATA CENTER
BRANCH
SMB HYPERSCALE IOT
Spark
Security
Gateway
Maestro Rugged IoT Protect
Posture
Management
Network AppSec Workload Intelligence
PUBLIC /
PRIVATE
COMPLIANCE
API
APPLICATION
CONTAINERS
SERVERLESS
ANALYTICS
VISIBILITY
Mobile
Endpoint
Email &
Office
Browse Connect
SAAS
DESKTOP
LAPTOP
BROWSER ACCESS
TABLET
SMARTPHONE
CONSOLIDATED MANAGEMENT
& SECURITY OPERATIONS
PORTAL
MANAGEMENT
& UNIFIED
VISIBILITY
SECURITY
OPERATIONS
& XDR
SECURITY
PLATFORM
MANAGEMENT
OUR EXPERTS CAN HELP YOU
EVERY STEP OF THE WAY
Professional Services
• Long/Short-Term Engineers
• Advanced Technical Account
Management (ATAM)
• Cyber Resilience Testing (CRT)
• Life Cycle Management Services
(LCMS)
• Training
• Security Consulting
• Incident Response Services
• Managed Services
• Managed Detection
& Response
27
©2022 Check Point Software Technologies Ltd.
28
©2022 Check Point Software Technologies Ltd.
Check Point Infinity & IT today
Protecting Users, apps and services anywhere
Corporate Network
DataCenter
DMZ
HQ
Network
Security
Stack
DDoS
FW/IPS
SSLi
WAF
AV
FW/IPS
URL-APC
SSLi
AV
Sandbox
Network
Security
Stack
Branches
Branches
Remote Users
VPN
Customers
MPLS
MPLS
SaaS
IaaS
Internet
SOC/CERT
VPN
Catch Rate 100%
False Positives 0%
Endpoint & Mobile
Browser
CONNECT
CSPM
CNS
CLOUDGUARD HARMONY
QUANTUM
APPSEC
API
Email & Office

More Related Content

Similar to Infinity_Architecture_June_Webinar__Final_Wiki.pptx

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxEBERTE
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityOnward Security
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Ulrich Seldeslachts
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Kusumadihardja
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionDale Butler
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_masterdakins090174
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academyananthakrishnansblit
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiamallblitz0
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlockArmour1
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at EdgeDell EMC World
 

Similar to Infinity_Architecture_June_Webinar__Final_Wiki.pptx (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
Rombit LSEC IoTSecurity IoTSBOM CyberSec Europe 2022
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Didiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - EnglishDidiet Cybersecurity Consultant Portfolio - English
Didiet Cybersecurity Consultant Portfolio - English
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
SMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibitionSMi Group's Oil & Gas Cyber Security conference & exhibition
SMi Group's Oil & Gas Cyber Security conference & exhibition
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
AGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-iAGC Networks Security Solutions - Cyber-i
AGC Networks Security Solutions - Cyber-i
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Ebc collab portfolio_master
Ebc collab portfolio_masterEbc collab portfolio_master
Ebc collab portfolio_master
 
Cyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz AcademyCyber security course in kerala | C|PENT | Blitz Academy
Cyber security course in kerala | C|PENT | Blitz Academy
 
Cyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochiCyber security courses in Kerala , kochi
Cyber security courses in Kerala , kochi
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and GasBlock Armour Zero Trust Cybersecurity Mesh for Oil and Gas
Block Armour Zero Trust Cybersecurity Mesh for Oil and Gas
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 

Infinity_Architecture_June_Webinar__Final_Wiki.pptx

  • 1. 1 ©2022 Check Point Software Technologies Ltd. Cindi Carter | Field CISO @ Check Point DEFINING THE MODERN CYBERSECURITY ARCHITECTURE CHECK POINT INFINITY Antoine Korulski | Product Marketing Manager @ Check Point
  • 2. 2 ©2022 Check Point Software Technologies Ltd. Why is cybersecurity architecture important? What are the challenges with a fragmented cybersecurity architecture? How to implement a modern cyber security architecture?
  • 3. 3 ©2022 Check Point Software Technologies Ltd. WHY IS CYBERSECURITY ARCHITECTURE IMPORTANT?
  • 4. 4 ©2022 Check Point Software Technologies Ltd. Obsolete Technology Obsolete Technology On average, companies waste 37% of their software budget on obsolete technology, equating to ~ $30 billion. PCs more than three years old are 28% more susceptible to viruses. Old or outdated laptops are 58% more susceptible. Redundancy On average, 33% of company data is considered redundant, obsolete, or trivial. Unprotected Data 41% of companies have > 1,000 sensitive files unprotected. A poor architecture includes
  • 5. 5 ©2022 Check Point Software Technologies Ltd. Brand Reputation Damage Fines and Lawsuits Sensitive Data Theft Customer Trust Decline Ransomware Avg. $4.62 Mio* * IBM’s 2021 Cost of a Data Breach Report Threat actors exploit vulnerable architectures “Cyberattack on Red Cross compromised sensitive data on over 515,000 vulnerable people." — January 20, 2022, NPR “Nvidia says hackers are leaking company data after cyberattack attack." — March 1, 2022, TechCrunch
  • 6. 6 ©2022 Check Point Software Technologies Ltd. WHAT ARE THE CHALLENGES WITH A FRAGMENTED CYBERSECURITY ARCHITECTURE?
  • 7. 7 ©2022 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​ 16% 17% 20% 20% 23% 28% 28% 33% 36% 41% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% MitM (Man-in-the-Middle) Drive-by attacks SQL injection Fileless attacks DNS tunneling Zero-day exploit DDOS/DOS Supply chain attacks Phishing Ransomware *2022 security market trends research Cyber security threats posing the biggest risks*
  • 8. 8 ©2022 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​
  • 9. 9 ©2022 Check Point Software Technologies Ltd. HOW TO IMPLEMENT A MODERN CYBERSECURITY ARCHITECTURE?
  • 10. 10 ©2022 Check Point Software Technologies Ltd. Gartner Cybersecurity Mesh Architecture
  • 11. 11 ©2022 Check Point Software Technologies Ltd. Check Point Infinity - A Consolidated Cyber Security Architecture  Cloud Network Security  Cloud Security Posture Management  Cloud Intelligence & Threat Hunting  Cloud Workload Protection  Application Security  DevSecOps  Secure corporate access  Internet access security  Mobile security  Endpoint security  Email & collaboration app security Add-ons:  Unified Management  Network Detection & Response  SOC Platform  Managed Detection & Response (MDR)  Coming soon: XDR  Security Gateway  Hyper-scale Networking  Unified management  IoT Security  Branch Virtual Security GW  Remote Access VPN
  • 12. 12 ©2022 Check Point Software Technologies Ltd. Network security & management Support 24/7 Premium Pro Support Cloud security Training, Incident Response, and PS Consulting User & Access Security Software & Appliances Public & Private Cloud Zero Trust Access Policies
  • 13. 13 ©2022 Check Point Software Technologies Ltd. Widest protection coverage across all attack vectors Full Coverage Full Coverage Full Coverage Full Coverage Full Coverage Full Coverage Basic product (URLF) No prevention for unknown No Product Partial coverage (Signature Based) Partial coverage (No Phishing) Full Coverage No Product No prevention for unknown Combination of MX & API-based cloud email Partial coverage (Signature Based) Partial coverage (No Phishing) Partial Coverage Basic product (URLF) No prevention for unknown No Product No Product Partial (No Endpoint security agent) Partial Coverage Basic product (EDR) No Gateway. Endpoint based only No Product Partial coverage (No WAF) Full coverage Partial Coverage NETWORK ATTACKS END POINT DEVICE CORPORATE EMAIL WEB SERVERS CLOUD MOBILE DEVICES
  • 14. 14 ©2022 Check Point Software Technologies Ltd. Gain accurate prevention, everywhere Powered by Check Point’s ThreatCloud Big data threat intelligence Always acquires the most recent IoCs and protections of latest attacks seen in the wild AI technology 30+ AI and Machine Learning technologies that identify and block emerging threats that were never seen before QUANTUM CLOUDGUARD HARMONY Telemetry Telemetry ACCURATE PREVENTION (MALICIOUS/SAFE) INFINITY Prevention first Block attacks faster than anyone else Best Catch rate Of known & unknown threats Near Zero false positives Uninterrupted user productivity Less alerts/tickets for sec admins
  • 15. 15 ©2022 Check Point Software Technologies Ltd. The Power of ThreatCloud Dozens of external feeds and crawling the www and social media Unique ML algorithms detecting 650,000 suspicious domains daily Millions of Endpoint devices 150,000 Connected networks 2,000,000,000 Websites and files inspected daily
  • 16. 16 ©2022 Check Point Software Technologies Ltd. CASE STUDIES
  • 17. 17 ©2022 Check Point Software Technologies Ltd. Infinity ELA package includes • Advanced network security with Zero-Day protection for: • HQ datacenter • 4 corporate perimeters • 122 stores • Private and public cloud security for 10 applications in the cloud • Endpoint and mobile security for 11,000 employees # Security vendors # Security engineers Annual TCO Security benefits Existing point security solutions 18 30 $9.4M 4 16 $5.7M Unified security architecture • Unified management • Globally shared threat intelligence • Increased threat protection A US Retailer reduced total security costs by 39%
  • 18. 18 ©2022 Check Point Software Technologies Ltd. Infinity ELA package includes • Advanced network security with Zero-Day protection for: • Hospital datacenter • 2 campuses perimeters • 1,500 IoT medical devices (740 beds) • Private and public cloud security for 10 applications in the cloud • Endpoint and mobile security for 5,200 employees # Security vendors # Security engineers Annual TCO Security benefits Existing point security solutions 19 24 $5.9M 4 6 $2.7M Unified security architecture • Cost predictability • Increased threat protection & intelligence • Cloud security EU Hospital reduced total security costs by 54%
  • 19. 19 ©2022 Check Point Software Technologies Ltd. Cut down TCO and increase efficiency with a single security architecture Mobile Cloud Endpoint Endpoint Cloud Mobile Network *Average reduction across our customer portfolio ~ 20% reduction in security costs Network ~ 47% increase in operational efficiency  A focus on threat prevention reduces incident response costs  A single management system reduces employee training  Improved workflow increases security effectiveness  A unified policy lowers management costs  Simplified integration with IT systems - 20%
  • 20. 20 ©2022 Check Point Software Technologies Ltd. 1st place in Tech Innovation MITRE ATT&CK® 2022 Evaluations Highlight Harmony Leadership in Endpoint Security Highest technique detection level with 100% detection of 19 attack steps A Worldwide Major Player in Endpoint Security for Enterprises and SMBs IDC MarketScape 2021 for Modern Endpoint Security 22 times a Leader in 2021 Gartner Magic Quadrant for Network Firewalls Leader in G2.com For Firewall, cloud, Endpoint, and Mobile Data security Industry Recognition
  • 21. 21 ©2022 Check Point Software Technologies Ltd. Check Point Infinity Enterprise License Agreement ensures the protection of sensitive financial data "We have used Check Point for a very long time, and it is heavily involved in our daily operations. We are very happy with what Check Point provides us." — Kaur Lillepõld, Head of Network and Telephony at SEB Baltics Eurowind protects critical energy infrastructure from Gen V Cyber Attacks with Check Point Enterprise License Agreement "The Check Point Infinity ELA model covers all current threats. I don’t have to choose different vendors for specific tasks or challenges. Everything is included." Kim Moberg, IT Manager, Eurowind Energy What our customers say about Infinity ELA
  • 22. 22 ©2022 Check Point Software Technologies Ltd. Consolidated Security A simple, predictable, all-inclusive business model to secure your everything Increased Protection Protection across the entire IT infrastructure: Networks, cloud, endpoints, and mobile Reduced TCO Achieve a 50% increase in operational efficiency and a 20% security cost reduction
  • 23. 23 ©2022 Check Point Software Technologies Ltd.
  • 24. 24 ©2022 Check Point Software Technologies Ltd.
  • 25. 25 ©2022 Check Point Software Technologies Ltd. FOR MORE INFO ABOUT INFINITY SCAN QR OR VISIT WWW.CHECKPOINT.COM/INFINITY-VISION/ENTERPRISE-LICENSE-AGREEMENT/
  • 26. 26 ©2022 Check Point Software Technologies Ltd. SECURE THE CLOUD SECURE THE WORKFORCE THREAT INTELLIGENCE Check Point Infinity unified architecture and services SECURE THE NETWORK ICS PERIMETER DATA CENTER BRANCH SMB HYPERSCALE IOT Spark Security Gateway Maestro Rugged IoT Protect Posture Management Network AppSec Workload Intelligence PUBLIC / PRIVATE COMPLIANCE API APPLICATION CONTAINERS SERVERLESS ANALYTICS VISIBILITY Mobile Endpoint Email & Office Browse Connect SAAS DESKTOP LAPTOP BROWSER ACCESS TABLET SMARTPHONE CONSOLIDATED MANAGEMENT & SECURITY OPERATIONS PORTAL MANAGEMENT & UNIFIED VISIBILITY SECURITY OPERATIONS & XDR SECURITY PLATFORM MANAGEMENT OUR EXPERTS CAN HELP YOU EVERY STEP OF THE WAY Professional Services • Long/Short-Term Engineers • Advanced Technical Account Management (ATAM) • Cyber Resilience Testing (CRT) • Life Cycle Management Services (LCMS) • Training • Security Consulting • Incident Response Services • Managed Services • Managed Detection & Response
  • 27. 27 ©2022 Check Point Software Technologies Ltd.
  • 28. 28 ©2022 Check Point Software Technologies Ltd. Check Point Infinity & IT today Protecting Users, apps and services anywhere Corporate Network DataCenter DMZ HQ Network Security Stack DDoS FW/IPS SSLi WAF AV FW/IPS URL-APC SSLi AV Sandbox Network Security Stack Branches Branches Remote Users VPN Customers MPLS MPLS SaaS IaaS Internet SOC/CERT VPN Catch Rate 100% False Positives 0% Endpoint & Mobile Browser CONNECT CSPM CNS CLOUDGUARD HARMONY QUANTUM APPSEC API Email & Office

Editor's Notes

  1. Headline Increased Protection - Reduced TCO Defining the modern cyber security architecture
  2. Unified cyber security architecture Security architecture, also known as cyber security architecture or network security architecture, is defined as The practice of designing computer systems to ensure the security of underlying data. While businesses can build simple network security systems independently, many do not possess the necessary technologies to effectively manage their cyber security risks. An ideal security architecture should be flexible enough to adapt and provide security coverage for businesses despite the continuously evolving cyber threat domain. 
  3. This is where IT and Cybersecurity architecture fuse together, and here are some warning signs of bad architecture. From a cyber risk perspective, poor architecture: allows for undocumented applications to fall by the wayside, such as obsolete and redundant technology difficult to maintain waste time and money creates security gaps, leaving your architecture vulnerable to outside threats Poor architecture stems from a lack of communication, meaning that employees and/or business owners may not even be aware of certain problems. A stable architecture creates several benefits: Reduce costs by removing redundant data and applications Improve your overall IT quality and performance Gain a comprehensive understanding of your company’s applications, licenses, and systems Easier to enable innovation, as your business continues to grow and take advantage of new technology Reduce security risks, costs, and unnecessary complexity when you target and eliminate weaknesses/gaps/blind spots within your IT architecture Building security into instead of bolting on….Secure from the Start: IT cybersecurity principles and tools can no longer be an afterthought, continually trying to catch up to the technology disruption. While business focuses on rapidly pushing new products & services to market, necessary security standards and governance frequently lag. That leaves vital data vulnerable and critical operations at risk. Technology advances — from the Internet of Things (IoT) to artificial intelligence (AI) and advanced analytics are enabling purpose-driven, resilient, and adaptable enterprises. Yet for many companies, IT cybersecurity principles and tools are still an afterthought, continually trying to catch up to the technology disruption. As a result, while business understandably focuses on rapidly pushing new products to market, necessary security standards and governance frequently lag behind. That leaves vital data vulnerable and critical operations at risk. More importantly no longer is the threat only to corporate, government, and personal information. With the widespread adoption of Internet-of-Things capabilities into our daily lives — including advanced healthcare solutions — even human lives can be at risk Building Blocks of IT and Cybersecurity Architecture Purpose built: business-IT-cybersecurity together Sources: https://www.tcs.com/perspectives/articles/cybersecurity-modernization-iot-implementation https://www.cr-t.com/blog/warning-signs-of-bad-it-architecture/
  4. Any cyber attack can result in a breach – my own example of a business process that we hadn’t fully architected for security considerations. Your company may have fallen victim [to help build compassion] Supporting statement that we HAD cybersecurity practices in place, were building, etc… Key elements of cyber security architecture include an understanding of data flow: to/from, who has access, type of data, encrypted or unencrypted at rest or in transit? Important to know how threat actors attack a potential target, and your security architecture must encompass a good understanding of the organization’s processes and business objectives. They have to understand how vulnerabilities occur and how threat actors exploit them. https://www.cshub.com/attacks/articles/five-ransomware-attacks-in-2022-so-far-you-should-know-about Nvidia Red Cross Conti https://www.linkedin.com/pulse/plaintext-trim-away-security-excess-dark-reading/?trackingId=h3JGRHrTSnqMeZO82KoJhA%3D%3D
  5. Globally in 2021, Check Point Research reported a >40% increase in cyberattacks, with one1 out of every 61 organizations being impacted by ransomware each week. Threats increase year after year: Ransomware, Phishing, and Supply chain attacks Velocity, intensity, complexity increasing > 50% year over year Disjointed architecture makes stopping these things from happening more difficult Threat prevention front & center focus for architecture That said, we can establish some general requirements of an effective security architecture. It consists of three major components: The People – They establish security objectives and identify business drivers. The Processes – These determine the security techniques and principles that best suits the business based on a Needs assessment. The Tools – The architectural framework developed to suit business goals and objectives. The architecture must be strategically designed and implemented in a way that supports business goals. >>>>>> Practices that were established when data, applications, and other elements of IT infrastructure were located within a company’s four walls are not sufficient for an era of cloud computing and increasingly decentralized threats. A hyper-connected, boundary-less network is the new normal for a modern digital organization — which means a wider threat surface and more vectors for actors with ill intent globally. More important, no longer is the threat only to corporate, government and personal information. With the widespread adoption of Internet-of-Things capabilities into our daily lives — including advanced healthcare solutions — even human lives can be at risk.
  6. Complexities in cybersecurity toolsets To defend against an expanding attack surface, security teams are increasingly adopting new cyber security products to protect networks, cloud infrastructure, IoT devices, as well as users and access. However, stitching together different products from multiple vendors may create security gaps and operational overhead. Sprawl of different cyber security tools … Most look at the price point whenever they have chosen a tool to implement. There is nothing inherently wrong with doing that, but it leads to a more complex set of defenses with little or no integration between the tools. Cybersecurity professionals continue to grapple with the challenges that come with a rapidly expanding network perimeter. And with every new ransomware attack that hits the headlines, it would be fair to assume that adding more security products or vendors would make a company more secure. But that’s not the case. Saturated security market One of the key reasons organizations are falling behind when it comes to consolidation is that decision-makers are, to all intents and purposes, spoiled for choice. The security market is heavily saturated at the moment, particularly in light of the move toward remote or hybrid working. Yet, despite organizations needing more robust security measures than ever before, budgets are tight and many feel pressured to only focus on the specific problem they face today. This is particularly true of the healthcare sector.    There are many reasons behind this tendency, not least the concept of vendor lock-in, which is still highly prevalent in the industry. Ongoing subscriptions make it difficult for organizations to switch vendors. Likewise, it’s becoming increasingly difficult for vendors to get customers to commit to a relationship spanning multiple years. Such relationships take time to nurture and reach their full potential. “With the threat landscape posing immediate risks, it’s probably more realistic and achievable for organizations to leverage and integrate a smaller number of vendors than commit to any single one,” says Deryck.   This multi-vendor approach might offer a fix for short-term problems, but it puts a great deal of strain on security teams who might not have the resources to adequately vet every product or vendor. CISOs might have a good idea of what’s best for their own organization, but it’s difficult to apply that knowledge to an ever-expanding list of disparate vendors that are pulled together under one umbrella. Dark Reading article for talking points
  7. How Check Point helps to solve the challenge What is a modern/reference architecture?
  8. Depicts all the security tools that should be in place to protect assets Having disparate toolsets creates more complexity and re-work, etc. Without a solid security architecture, this complexity can lead to gaps in the security posture why moving toward security consolidation can significantly enhance security posture, improve security operational efficiency, and greatly reduce TCO (Total Cost of Ownership). Similarly, CISOs had to react to the widening attack surface by enforcing security policies and the security infrastructure. CISOs have two options to deal with a widening attack surface. Either one takes a best-of-breed strategy to patchwork the security architecture with multiple vendors, or one consolidates the security architecture with a cyber security suite. The latter approach is recommended as it closes security gaps related to misconfiguration and security policies that do not fully overlap when using multiple vendors. Check Point surveyed over 400 global CISOs to confirm this trend, with  79% of security experts saying that working with multiple security vendors is challenging and 69% agreeing that working with fewer vendors would increase security. Saturated security market One of the key reasons organizations are falling behind when it comes to consolidation is that decision-makers are, to all intents and purposes, spoiled for choice. The security market is heavily saturated at the moment, particularly in light of the move toward remote or hybrid working. Yet, despite organizations needing more robust security measures than ever before, budgets are tight and many feel pressured to only focus on the specific problem they face today. This is particularly true of the healthcare sector.   According to Deryck Mitchelson, Field CISO at Check Point and former CISO at NHS Scotland, “Managers have become accustomed to making short-term decisions to solve immediate problems instead of considering more long-term, strategic approaches to addressing their security concerns.”   There are many reasons behind this tendency, not least the concept of vendor lock-in, which is still highly prevalent in the industry. Ongoing subscriptions make it difficult for organizations to switch vendors. Likewise, it’s becoming increasingly difficult for vendors to get customers to commit to a relationship spanning multiple years. Such relationships take time to nurture and reach their full potential. “With the threat landscape posing immediate risks, it’s probably more realistic and achievable for organizations to leverage and integrate a smaller number of vendors than commit to any single one,” says Deryck.   This multi-vendor approach might offer a fix for short-term problems, but it puts a great deal of strain on security teams who might not have the resources to adequately vet every product or vendor. CISOs might have a good idea of what’s best for their own organization, but it’s difficult to apply that knowledge to an ever-expanding list of disparate vendors that are pulled together under one umbrella.
  9. Check Point’s Infinity platform is the first modern, consolidated security platform specifically designed to guard against modern-day threats such as zero-day and fifth-generation attacks across the network, cloud and endpoints; Protecting your entire infrastructure to address the elements shown in the Gartner mesh architecture. Check Point Infinity is a unified, multi-layered approach to cyber security that protects all IT attack surfaces – networks, cloud, endpoints, mobile, and IoT devices – sharing the same threat prevention technologies, management services, and threat intelligence. A unified cloud-native security suite – Check Point CloudGuard; Network and data center security – Check Point Quantum; User & Access security – Check Point Harmony; Unified security management – Check Point Infinity. Pre-emptive threat prevention technology is the key to a modern cyber security architecture blocking sophisticated attacks before damage can be inflicted. An organization needs to be able to predict and block unknown malware, as well as known malware, to deliver consistent protection across the entire IT infrastructure. >>>>>>>>>> Secure access – secure the cloud – secure the network – Time management of team Unified visibility !! By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against the most advanced attacks, while achieving on average a 50% increase in operational efficiency and a 20% reduction in security costs. Unlike other consolidated security solutions on the market, Check Point Infinity has a flexible ELA (enterprise license agreement) that can be tailored to individual applications. Brent Lassi, CISO at Bluecore, on a CISO Stop List he believes every leader in security should have.
  10. Infinity Enterprise License Agreement is a simple and predictable Business Model One license for all services: All-inclusive subscription & tailored pricing model To meet the demand for security consolidation, Check Point offers an Infinity Enterprise License Agreement (ELA) Suite with a unified management approach to cyber security. Benefits:   Reduced Overhead: Managing individual licenses across the organization can consume significant resources as each license needs to be purchased, tracked, and renewed individually. An ELA (Enterprise License Agreement) allows a company to use a single license for all vendor’s services that it consumes across the entire organization. Lower Costs: An ELA is a bulk purchase of a vendor’s service for a fixed period. Often, this comes with large discounts compared to individual, per-seat licenses. Decreased Business Impact: With individual licenses, an organization needs to manage each license and may face business disruptions if one slips through the cracks and expires. With an ELA, an organization only needs to manage a single license, decreasing the probability that an oversight will cause a disruption to operations. Reduced Waste: With individual license agreements, an organization may inadvertently purchase additional licenses for a product while others go to waste or are only used occasionally. An ELA enables an organization to bundle services and stop spending money on unused services. Predictable Spend: With an ELA, an organization and a vendor agree on a predetermined rate for a vendor’s services for the period of the ELA. This provides a greater degree of predictability than individual user licenses. Service Flexibility: ELAs often include the option to claim credits for underused resources that can be applied to other services. This allows an organization to better tailor its service consumption to its actual needs. Remember the CISO Stop List? In addition to ELA, the Vision Add-ons can further your comprehensive cybersecurity protection, keeping the toolset integrated.
  11. How do we stack up? Coverage across all attack vectors versus having to supplement with other point solutions
  12. And the brains behind this is Check Point’s proprietary architecture is ThreatCloud, then talk through the items Threat Cloud Glues our architecture together Shared intelligence Part of Infinity’s success is its ability to leverage Check Point’s ThreatCloud, a real-time global threat intelligence platform that monitors networks around the world for emerging threats and vulnerabilities. Unlike other consolidated security solutions on the market, Check Point Infinity has a flexible ELA (enterprise license agreement) that can be tailored to individual applications. While some solutions come with complex pricing structures and require cumbersome “all in one” rollouts, Infinity’s pricing is clear and streamlined, and can be rolled out in a way to suit individual businesses. If you want to tackle endpoint security first, for instance, and then focus on their network, you can take that approach with Infinity.
  13. Finer points of our proprietary TC architecture: ThreatCloud delivers accurate prevention in under 2 seconds To 100’s of millions of enforcement points worldwide How do we validate the authenticity of our “homegrown” TC? As a pioneer in the cybersecurity industry, based on 25 years of experience – Structural component in your CS architecture Reliability Authenticity Robust protection CISO going to sleep at night; never at peace Log4j customers protected by Threat Cloud were unaffected by 0-day threat because of TC protection
  14. Increased Protection
  15. Optimal # of engineers required to support all of the disparate systems 30 vs 16 needed for Infinity; freed up other members of the security team to focus on other security initiatives and projects (GRC, BCDR, etc.) Applicable to any size organization SMB
  16. Reduce SW, HW and operational cost Compare and contrast HW SW to operational costs
  17. Need to adjust this graphic to fill the slide Check Point leadership has been recognized By third-party analysts, testing labs and associations
  18. What our customers say about Infinity ELA
  19. Consolidate your security architecture Gain accurate prevention against sophisticated attacks with the power of ThreatCloud Reduce TCO & Increase security efficiency
  20. Check Point provides the most complete security for banks. Infinity-Vision is the unified management platform for Check Point Infinity, the first modern, consolidated cyber security architecture built to prevent today’s most sophisticated attacks across networks, cloud, endpoints, mobile, and IoT. Infinity-Vision is powered by the world’s largest threat intelligence network. It is centrally managing the Infinity architecture to mitigate attacks effectively in real-time, solve security gaps, and reduce the total cost of ownership. Organizations frequently implement multiple cyber security solutions in pursuit of better protections. As a result, they are frequently left with a patchwork security architecture that results in a high TCO. By adopting a consolidated security approach with Check Point Infinity architecture, businesses realize preemptive protection against advanced fifth-generation attacks while achieving a 50% increase in operational efficiency and a 20% reduction in security costs.
  21. 30sec
  22. IT has changed Limited Resources – Money and HR Increasing # and complexity of attacks Security is reactive & expensive Point products create overlap, misconfigurations and confusion We built a holistic solution