SlideShare uma empresa Scribd logo
1 de 30
Security in the cloud:
Check Point security for virtual environments




 Petr Kadrmas <pkadrmas@checkpoint.com>
 SE Eastern Europe

                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone
Agenda



    1    Virtualization and Security

    2    Private Cloud Security

    3    Public Cloud Security

    4    Check Point SMB Cloud




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   2
                                                                                                             2
On Data Center Consolidation


                                    Private cloud1
                              28% have one         30% plan one


                                                                                   CIOs will virtualize
                                                                                    55% of production
                                                                                 servers next year, up
                                                                                  from 42% this year2




1   Information Week, June 2010
2   Morgan Stanley, June 2010

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   3
                                                                                                                                  3
On Cloud Computing

Top concerns with private clouds
What are your greatest concerns about deploying and managing them?


  Loss of control                                                                           80%

  Data security                                                               76%

  Data portability and ownership                                         73%

  Regulatory compliance                               62%

  Reliability                                       60%
                                                                                    Morgan Stanley
                                                                              2010 CIO Cloud Survey

                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   4
                                                                                                                        4
Enterprise Virtualization Initiatives

Top Security Challenges for Server Virtualization
What are the biggest security challenges preventing server virtualization in your
enterprise?


Lack of skills in security team                                                                    36%


Cost of new information security solutions                      28%
                                                                                      Lack of knowledge
Can’t port existing security tools from physical                                      in security teams
                                                              26%
to virtual world                                                                      remains the
                                                                                      biggest challenge
Lack of security best practices for server
virtualization
                                                      24%                             in moving to
                                                                                      virtualized
Regulatory compliance issues                           24%                            environments.

                                                                            Enterprise Strategy Group
                                                               2010 Survey of enterprise decision makers

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   5
                                                                                                                                  5
Agenda

    1    Virtualization and Security

         Private Cloud Security
            • Secure Dynamic Cloud
    2       • Security Gateway Virtual Edition



    3    Public Cloud Security

    4    Check Point SMB Cloud




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   6
                                                                                                                 6
Private Cloud - Security Needs

                                     Protection from external threats


                                             Inspect traffic between
                                             Virtual Machines (VMs)

                                       Secure new Virtual Machines
                                              automatically




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   7
                                                                                                            7
Private Cloud - Security Needs

                                       Protection from external threats


                                               Inspect traffic between
                                               Virtual Machines (VMs)

                                         Secure new Virtual Machines
                                                automatically
  VM      VM        VM

       Hypervisor




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   8
                                                                                                              8
Private Cloud - Security Needs

                                     Protection from external threats


                                             Inspect traffic between
                                             Virtual Machines (VMs)

                                       Secure new Virtual Machines
                                              automatically

                                         Ensure Security in dynamic
                                               environment




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   9
                                                                                                            9
Introducing Check Point
Security Gateway Virtual Edition (VE)


    Check Point Secures the Private Cloud

    Check Point
  Security Gateway
   Virtual Edition                  Best Virtual Security Gateway



                                    Securing the Virtual Machines


                                        Unified Management for
                                         Physical and Virtual



                           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 10
                                                                                                              10
Virtual Edition Features

      Best Security

                                      Check Point
                                  Security Gateway
►   All Software Blades           Virtual Edition (VE)                                Firewall
                                                                                          VPN
►   Flexible Security                                                                        IPS
                                                                                          Antivirus




                                                                   VE          VM               VM

                                                                 Hypervisor Connector

                                                                         Hypervisor




                          ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 11
                                                                                                             11
Virtual Edition Features

      Best Security            VMs Protection
                                                                             VM                           VM


                          ►   Securing New VMs
►   All Software Blades       Automatically

►   Flexible Security     ►   Secure Dynamic
                              Environment



                                                                               VE          VM               VM



                                                                             Hypervisor Connector
       Inspecting Inter-VM Traffic                                                   Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 12
                                                                                                                         12
Virtual Edition Features

      Best Security            VMs Protection


                          ►   Securing New VMs
►   All Software Blades       Automatically

►   Flexible security     ►   Secure Dynamic
                              Environment



                                                                               VE          VM               VM



                                                                             Hypervisor Connector

                                                                                     Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 13
                                                                                                                         13
Virtual Edition Features

      Best Security            VMs Protection                           Unified Management



                          ►   Securing New VMs                         ►   Same management for
►   All Software Blades       Automatically                                Physical and Virtual
►   Flexible security     ►   Secure Dynamic
                              Environment                              ►   Virtualize the Management




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 14
                                                                                                                         14
Virtual Edition Features

      Best Security            VMs Protection                           Unified Management



                          ►   Securing New VMs                         ►   Same management for
►   All Software Blades       Automatically                                Physical and Virtual
►   Flexible security     ►   Secure Dynamic
                              Environment                              ►   Virtualize the Management




                                                                                          VM              VM



                                                                           Hypervisor Connector

                                                                                     Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.    |   [Unrestricted] For everyone   | 15
                                                                                                                          15
Agenda


    1    Virtualization and Security

    2    Private Cloud Security

         Public Cloud Security
            • Multitenancy Security
    3       • Check Point Solution



    4    Check Point SMB Cloud




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 16
                                                                                                               16
Cloud Providers – Security Needs

    Multitenancy: Servicing Multiple Customers
           From the Same Environment


                                                                    Secure
                                                                connection to the
                                                                     Cloud
                 Cloud
                                                                   Security of the
                                                                      Cloud


                                                                   Security within
                                                                     the Cloud



                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 17
                                                                                                            17
Check Point Cloud Security

   Check Point Secures the Public Clouds

              VPN-1 Power VSX for secure connectivity with the
              Public Cloud




              Secured VMs and Inter-VMs connection with
              Security Gateway Virtual Edition



              Multi-tenancy management and customized
              policy via Multi-Domain Management


                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 18
                                                                                                            18
VPN-1 Power VSX
“Making it Virtual”



                 Physical                                    Virtual

        VPN-1 Firewall Module                  Virtual System (VS)


        VPN-1 Firewall Module in               Virtual System in Bridge
        Bridge mode                            mode


        IP Router                              Virtual Router (VR)


        Switch                                 Virtual Switch (V-SW)


        Network Cable                          Virtual Cable (warp link)




                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 19
                                                                                                                      19
How does it work ?

      Each Virtual System is a unique routing and security
      domain featuring most Firewall and VPN-1 Power
      functionality.


      Each Virtual System has its own:
               Security and VPN Policy
               Configuration Parameters
               Interfaces and Links
               Secure Internal Communication Certificate



      Packets arriving to a VSX gateway are routed to the relevant
      firewall based on incoming interface, source or destination
      IP Address


                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 20
                                                                                                                     20
Security Virtualization Benefits
                                         Consolidation
                    Cost reduction
                    The simplest management for consolidated
                     environments



                           Multi- Customers Tenancy
                    Servicing multiple customers on a single system
                    Dedicated management & policy per customer
                    Add-on services per virtual system (IPS, URLF)


                                             Scalability
                    Adding more Virtual Systems without
                     additional hardware
                    Unique offering of linear performance scale-up
                     with additional hardware


                           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 21
                                                                                                              21
Check Point
Multi-Domain Security Management

      Check Point Eases the Way to Multi-Domain
                Security Management


                        Maximize security by segmenting
                         management in virtual domains


                                Achieve better security
                            with consistent global policies


                        Deploy multi-domain management
                             simply and affordably



                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 22
                                                                                                           22
Get Increased Flexibility and Control
     Segment your Security Management Environment into
                     Virtual Domains

                         Multi Domains




   Customer A    Customer B   Customer C                  Customer D                     Customer E




                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 23
                                                                                                                 23
Agenda


    1    Virtualization and Security

    2    Private Cloud Security

    3    Public Cloud Security

    4    Check Point SMB Cloud




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 24
                                                                                                            24
Main SMB Security Challenges

           Running Your Business
           While Keeping Up With:

         Growing complexity in protecting your network
         and data


         Evolving and more sophisticated security threats


         Increasing budget pressure and unpredictable
         security expenses

                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 25
                                                                                                            25
Check Point Cloud
  Management Services
                                                                 Check Point
                                                              Central Management




                 Firewall    URL Filtering


                 Check Point
                 VPN         Intrusion Prevention (IPS)

                 Antivirus   Logging & Reporting
             Security Management
                 Anti-Spam
                                                                                   Best Ongoing
                                                                                    Protection


  Your                                                                         Expert Management
Business



                                                                                    24x7 Support
                                                                                      Services


           Protecting Your Business, Optimizing
            Performance, Uptime and Flexibility
                                ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 26
                                                                                                                   26
Simple to Start




   1. Determine # of users
   2. Choose connection type                       1. Activate service
   3. Select protection package



                    Set It and Forget It!


                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 27
                                                                                                                     27
Cost-Effective Offerings

      Two All-in-One Packages to Choose From:

            Standard                                            Premium


     Firewall                                   Standard package
     VPN                                                            +
     Software Updates                              Intrusion Prevention (IPS)
     Logging & Reporting                           Antivirus
     Management Services                           Anti-Spam
     24x7 Support Services                         URL Filtering




Starts at $19 /month!                    Starts at $33 /month!

                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 28
                                                                                                                 28
Summary

Check Point provides effective Cloud Security
            for every enviromnet

                 Virtual Security Gateway For Multi-Tenant
                            Cloud Environments


                        Best Hypervisor security for Virtual
                                   Machines



                             Cloud Managed Security for SMB




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 29
                                                                                                           29
Thank You




            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone

Mais conteúdo relacionado

Mais de ASBIS SK

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-uASBIS SK
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachASBIS SK
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.ASBIS SK
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateASBIS SK
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
VMware world news
VMware world newsVMware world news
VMware world newsASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamASBIS SK
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachASBIS SK
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZASBIS SK
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureASBIS SK
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xASBIS SK
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouASBIS SK
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...ASBIS SK
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...ASBIS SK
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudASBIS SK
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...ASBIS SK
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudASBIS SK
 

Mais de ASBIS SK (20)

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
VMware world news
VMware world newsVMware world news
VMware world news
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 

Último

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Check Point prináša efektívne riešenie bezpečnosti pre súkromné aj verejné cloud prostredie

  • 1. Security in the cloud: Check Point security for virtual environments Petr Kadrmas <pkadrmas@checkpoint.com> SE Eastern Europe ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  • 2. Agenda 1 Virtualization and Security 2 Private Cloud Security 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2
  • 3. On Data Center Consolidation Private cloud1 28% have one 30% plan one CIOs will virtualize 55% of production servers next year, up from 42% this year2 1 Information Week, June 2010 2 Morgan Stanley, June 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3
  • 4. On Cloud Computing Top concerns with private clouds What are your greatest concerns about deploying and managing them? Loss of control 80% Data security 76% Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Morgan Stanley 2010 CIO Cloud Survey ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4
  • 5. Enterprise Virtualization Initiatives Top Security Challenges for Server Virtualization What are the biggest security challenges preventing server virtualization in your enterprise? Lack of skills in security team 36% Cost of new information security solutions 28% Lack of knowledge Can’t port existing security tools from physical in security teams 26% to virtual world remains the biggest challenge Lack of security best practices for server virtualization 24% in moving to virtualized Regulatory compliance issues 24% environments. Enterprise Strategy Group 2010 Survey of enterprise decision makers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5
  • 6. Agenda 1 Virtualization and Security Private Cloud Security • Secure Dynamic Cloud 2 • Security Gateway Virtual Edition 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6
  • 7. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7
  • 8. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically VM VM VM Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8
  • 9. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically Ensure Security in dynamic environment ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9
  • 10. Introducing Check Point Security Gateway Virtual Edition (VE) Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10
  • 11. Virtual Edition Features Best Security Check Point Security Gateway ► All Software Blades Virtual Edition (VE) Firewall VPN ► Flexible Security IPS Antivirus VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11
  • 12. Virtual Edition Features Best Security VMs Protection VM VM ► Securing New VMs ► All Software Blades Automatically ► Flexible Security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Inspecting Inter-VM Traffic Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12
  • 13. Virtual Edition Features Best Security VMs Protection ► Securing New VMs ► All Software Blades Automatically ► Flexible security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13
  • 14. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for ► All Software Blades Automatically Physical and Virtual ► Flexible security ► Secure Dynamic Environment ► Virtualize the Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14
  • 15. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for ► All Software Blades Automatically Physical and Virtual ► Flexible security ► Secure Dynamic Environment ► Virtualize the Management VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15
  • 16. Agenda 1 Virtualization and Security 2 Private Cloud Security Public Cloud Security • Multitenancy Security 3 • Check Point Solution 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16
  • 17. Cloud Providers – Security Needs Multitenancy: Servicing Multiple Customers From the Same Environment Secure connection to the Cloud Cloud Security of the Cloud Security within the Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17 17
  • 18. Check Point Cloud Security Check Point Secures the Public Clouds VPN-1 Power VSX for secure connectivity with the Public Cloud Secured VMs and Inter-VMs connection with Security Gateway Virtual Edition Multi-tenancy management and customized policy via Multi-Domain Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18
  • 19. VPN-1 Power VSX “Making it Virtual” Physical Virtual VPN-1 Firewall Module Virtual System (VS) VPN-1 Firewall Module in Virtual System in Bridge Bridge mode mode IP Router Virtual Router (VR) Switch Virtual Switch (V-SW) Network Cable Virtual Cable (warp link) ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19 19
  • 20. How does it work ? Each Virtual System is a unique routing and security domain featuring most Firewall and VPN-1 Power functionality. Each Virtual System has its own: Security and VPN Policy Configuration Parameters Interfaces and Links Secure Internal Communication Certificate Packets arriving to a VSX gateway are routed to the relevant firewall based on incoming interface, source or destination IP Address ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20
  • 21. Security Virtualization Benefits Consolidation  Cost reduction  The simplest management for consolidated environments Multi- Customers Tenancy  Servicing multiple customers on a single system  Dedicated management & policy per customer  Add-on services per virtual system (IPS, URLF) Scalability  Adding more Virtual Systems without additional hardware  Unique offering of linear performance scale-up with additional hardware ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21
  • 22. Check Point Multi-Domain Security Management Check Point Eases the Way to Multi-Domain Security Management Maximize security by segmenting management in virtual domains Achieve better security with consistent global policies Deploy multi-domain management simply and affordably ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22
  • 23. Get Increased Flexibility and Control Segment your Security Management Environment into Virtual Domains Multi Domains Customer A Customer B Customer C Customer D Customer E ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23
  • 24. Agenda 1 Virtualization and Security 2 Private Cloud Security 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24
  • 25. Main SMB Security Challenges Running Your Business While Keeping Up With: Growing complexity in protecting your network and data Evolving and more sophisticated security threats Increasing budget pressure and unpredictable security expenses ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25
  • 26. Check Point Cloud Management Services Check Point Central Management Firewall URL Filtering Check Point VPN Intrusion Prevention (IPS) Antivirus Logging & Reporting Security Management Anti-Spam Best Ongoing Protection Your Expert Management Business 24x7 Support Services Protecting Your Business, Optimizing Performance, Uptime and Flexibility ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26 26
  • 27. Simple to Start 1. Determine # of users 2. Choose connection type 1. Activate service 3. Select protection package Set It and Forget It! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27
  • 28. Cost-Effective Offerings Two All-in-One Packages to Choose From: Standard Premium  Firewall  Standard package  VPN +  Software Updates  Intrusion Prevention (IPS)  Logging & Reporting  Antivirus  Management Services  Anti-Spam  24x7 Support Services  URL Filtering Starts at $19 /month! Starts at $33 /month! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28
  • 29. Summary Check Point provides effective Cloud Security for every enviromnet Virtual Security Gateway For Multi-Tenant Cloud Environments Best Hypervisor security for Virtual Machines Cloud Managed Security for SMB ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29 29
  • 30. Thank You ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone