SlideShare uma empresa Scribd logo
1 de 39
Consolidation: Your
Best Move Towards
Stronger Security

Avi Rembaum
Director, 3D Consulting

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.
Current Threat Vectors
Spear
Phishing

RATs

DoS

Security administrators
face multiple attacks
from the same source
that can occur
simultaneously or
over time

Web
attacks

Zero-day

Malware

Botnets

Network
breach

SPAM

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

2
Finding The Source of a Security Incident Is Like…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

3
Average Cost of a Cyber Crime Attack

$8,389,828

$8,933,510

$6,459,362

2010

2011

2012

Source: Ponemon Cost of Cyber Crime Study, October 2012
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

4
What About Spending?
According to 12,396 security professionals,
spending on security during 2013 will:

Source: ISC(2), 2013

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

5
Are Thing Improving?
And how does the same group of people
feel about the success of their work?

Source: ISC(2), 2013

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

6
What’s Going On?

Security incidents are
becoming more
expensive
Security professionals
doubt their effectiveness

But, investment will stay
the same or go up

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

7
At some point we have to
realize that just maybe it’s time
for a different approach
But is this really a new conclusion?
Some interesting reading…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

8
When Was This Written?
 Malware and other forms of attack continue to be
alarmingly effective at eluding in-place safeguards

 The vulnerability-threat window is continuing to close
 Equally troublesome is the fact that propagation times for
threats are reaching new lows

 Automated tools continue to lower the bar when it comes
to the degree of knowledge required to launch ever more
sophisticated attacks

 The vast armies of “amateur” hackers are increasingly
being joined by ranks of “professionals”
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

9
How About 2005?
Admit it – it’s kind of scary that we can
tell the same story eight years later

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

10
At The Time, They Recommended
Figure 5 — Unified Threat Defenses

Pervasive
Perimeters
Multilayer
Awareness

Pervasive
Integration

Multiservice
Security

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

11
What They Were Really Saying

Defense-in-depth is not the
same as best-of-breed
An example…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

12
IPS Software Blade:
Security Quality Comparison
99.00%

NSS 2012 IPS
Group Test
Competitive
Comparison
July 2012

97.00%
95.00%
93.00%
91.00%

Over-all Protection
Client Protections
Server Protections

89.00%
87.00%
Check Point
12600

SourceFire
3D8120

Fortinet
3240C

Palo Alto PA5020

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

13
The reality is that IPS
integrated into the firewall is
just as effective, if not
better, than stand-alone IPS
solutions
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

14
And Comparing Check Point in 2012
vs. 2013
100.0%
99.5%
99.0%

Getting
better every
year

98.5%

98.0%
97.5%
97.0%
96.5%

Over-all Protection
Client Protections
Server Protections

96.0%
95.5%

95.0%
2012

2013

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

15
And a look at costs

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

16
IPS Software Blade:
Three-Year TCO Comparison
Comparing Dedicated IPS Appliances to
IPS Software Blade
$80,000
$72,500
$70,000
$60,000
$50,000

$50,000

$40,000
$30,000
$20,000

$10,000

$13,500
$7,500

$4,500

$0
Dedicated IPS Dedicated IPS Annual Support One-Year TCOSoftware Blade
Product Price Three-Year Dedicated IPS IPS
Three-Year IPS Software Blade
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

17
What about other
security technologies?

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

18
Application Control:
Three-Year TCO Comparison
Comparing Dedicated Web Filter Appliances to
Application Control Blade
$60,000
$50,750
$50,000
$40,000

$35,000

$30,000
$20,000
$13,500
$10,000

$5,250

$4,500

$0
Dedicated Web Filter GatewayGateway Appliance Support Application Control Blade Control Bla
Dedicated Web Appliance
Three-Year Dedicated Web Gateway Three-YearTCO
One-Year Appliance Application
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

19
GRC: Three-Year TCO Comparison
Comparing Dedicated GRC Solutions with
the Compliance Blade
$90,000
$79,750

$80,000
$70,000
$60,000

$55,000

$50,000
$40,000
$30,000

$25,500

$20,000

$10,000

$8,250

$8,500

$0
Dedicated GRC Product Price Three-Year One-Year 25 Gateway Compliance Blade Blade T
Dedicated GRC Solution Support
Dedicated GRC TCO
Three-Year Compliance
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

20
Sandboxing:
Three-Year TCO Comparison
Comparing Dedicated Sandbox Solutions
$80,000
$72,500
$70,000
$60,000
$50,000

$50,000

$40,000
$30,000
$20,000

$10,000

$13,500
$7,500

$4,500

$0
Dedicated Sandbox Solution Solution Support
Dedicated Sandbox
Three-Year DedicatedOne-Year Threat Emulation BladeEmulation Bl
Sandbox Solution TCO Threat
Three-Year
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

21
Some questions for you

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

22
Please Raise Your Hand
Question #1: Who here is using IPS Software Blade?

 Why?
 What protections?
Question #2: Who here is using Anti-Bot?

 Why?
 Do you run the controls in protect mode?
Question #3: Who here is using SmartEvent?

 Why?
 Do you activate automated blocking?
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

23
Today, security solutions must provide:
Multi-layer, integrated protections

Real-time, actionable intelligence
Adaptive controls

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

24
Why?

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

25
Consider The Following Attack

All three attack
vectors are meant to
breach the perimeter

Server vulnerability
exploit
Weaponized
attachment

Network
access

Malware via social
engineering

Each attack uses a
distinct method

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

26
“Best-of-Breed” During The Attack
Server
vulnerability
exploit

Weaponized
attachment

Malware via social
engineering

Dedicated
Intrusion
Detection

Dedicated
Sandbox
Solution

Dedicated Web
Proxy

Probably not in
“prevent” mode

Captures and
analyzes
attachment

Sees Facebook
and allows data
to pass

Proprietary
Log

Proprietary
Log

Proprietary
Log

3rd Party Log
Aggregator
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

27
And The Outcome
Server
vulnerability
exploit

Weaponized
attachment

Malware via social
engineering

Dedicated
Intrusion
Detection

Dedicated
Sandbox
Solution

Dedicated Web
Proxy

Server
compromised, ad
Probably not in
min“prevent” mode
rights obtained
Proprietary
Log

Captures and
analyzes
attachment

Endpoint
Sees Facebook
compromised, dat
andextracted
allows
a to passdata

Proprietary
Log

Proprietary
Log

3rd Party Log
Aggregator
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

28
And Event Management?

Sandbox
shows
different
event

Log aggregator
collects multiple
feeds
Each individual
event appears
separate
Full picture and
individual events
have no relationship

[Protected] For public distribution

IDS event
shows
exploit

Proxy just
sees
Facebook

©2013 Check Point Software Technologies Ltd.

29
And Worse

Separate signature updates
No sharing of “bad actor”
information
Multiple policy changes required
for mitigation

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

30
And Finally, The Cost

Product
Dedicated
IDS
Dedicated
Sandbox
Dedicated
Web Proxy

CAPEX

OPEX

Three Year
Cost

$50,000

$7,500

$72,500

$50,000

$7,500

$72,500

$35,000

$5,250

$50,750

Three-Year Total

[Protected] For public distribution

$195,750

©2013 Check Point Software Technologies Ltd.

31
Consolidating with
Check Point

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

32
Starting With The GUI

Key is to build a security flow
Policy starts from the ground up

 Firewall is that ground floor
 IPS, App Ctrl, Anti-Bot flow from there

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

33
Check Point During The Attack

Centralized updates via the
ThreatCloud

Server vulnerability
exploit

Weaponized
attachment

Malware via social
engineering

Threat Emulation
Anti-Bot
Application Control
IPS
Firewall

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

34
What Administrators Would See

All attack vectors collected into a
single perspective

 Protections report into a single location
 Tools for high-level and detailed analysis

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

35
And Then…

When the attacker
gets desperate
and launches a
DDoS

Use the new DDoS
controls and/or CLI
the source IPs to
the firewall

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

36
Costs With Check Point

Product

CAPEX

OPEX

12607 (25% Discount)
IPS Software Blade

$53,760

$10,080

Three Year
Cost
$84,000

$4,500

$9,000

$4,500

$13,500

$4,500

$9,000

(Included in Year 1)

Threat Emulation
Application Control
(Included in Year 1)

Anti-Bot Blade

$4,500
Three-Year Total

[Protected] For public distribution

$13,500
$129,000

©2013 Check Point Software Technologies Ltd.

37
The Savings

$195,750

$135,000

$53,760

$129,000

$75,240
$60,750

Savings
Amount: $66,750
Percent: 35%

Multiple Vendors
Check Point

CAPEX

OPEX

3 Year Total

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

38
Summary

Yes, it’s tempting
to do what’s
always been
done:
Multi-vendor

Data suggest
that it’s time for
an alternative
approach:
Consolidation

[Protected] For public distribution

Check Point’s
multi-layer
threat
prevention
makes it work

©2013 Check Point Software Technologies Ltd.

39

Mais conteúdo relacionado

Mais procurados

Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 

Mais procurados (20)

How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
checkpoint
checkpointcheckpoint
checkpoint
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 

Semelhante a Check Point Consolidation

Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Clouditalia Telecomunicazioni
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
solarisyourep
 
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Dayfestival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2016
 

Semelhante a Check Point Consolidation (20)

Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / security
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud Challenge
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Dayfestival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
 
stackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Securitystackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Security
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 

Mais de Group of company MUK

Mais de Group of company MUK (12)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Último

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Check Point Consolidation

  • 1. Consolidation: Your Best Move Towards Stronger Security Avi Rembaum Director, 3D Consulting [Protected] For public distribution ©2013 Check Point Software Technologies Ltd.
  • 2. Current Threat Vectors Spear Phishing RATs DoS Security administrators face multiple attacks from the same source that can occur simultaneously or over time Web attacks Zero-day Malware Botnets Network breach SPAM [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 2
  • 3. Finding The Source of a Security Incident Is Like… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 3
  • 4. Average Cost of a Cyber Crime Attack $8,389,828 $8,933,510 $6,459,362 2010 2011 2012 Source: Ponemon Cost of Cyber Crime Study, October 2012 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 4
  • 5. What About Spending? According to 12,396 security professionals, spending on security during 2013 will: Source: ISC(2), 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 5
  • 6. Are Thing Improving? And how does the same group of people feel about the success of their work? Source: ISC(2), 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 6
  • 7. What’s Going On? Security incidents are becoming more expensive Security professionals doubt their effectiveness But, investment will stay the same or go up [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 7
  • 8. At some point we have to realize that just maybe it’s time for a different approach But is this really a new conclusion? Some interesting reading… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 8
  • 9. When Was This Written?  Malware and other forms of attack continue to be alarmingly effective at eluding in-place safeguards  The vulnerability-threat window is continuing to close  Equally troublesome is the fact that propagation times for threats are reaching new lows  Automated tools continue to lower the bar when it comes to the degree of knowledge required to launch ever more sophisticated attacks  The vast armies of “amateur” hackers are increasingly being joined by ranks of “professionals” [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 9
  • 10. How About 2005? Admit it – it’s kind of scary that we can tell the same story eight years later [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 10
  • 11. At The Time, They Recommended Figure 5 — Unified Threat Defenses Pervasive Perimeters Multilayer Awareness Pervasive Integration Multiservice Security [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 11
  • 12. What They Were Really Saying Defense-in-depth is not the same as best-of-breed An example… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 12
  • 13. IPS Software Blade: Security Quality Comparison 99.00% NSS 2012 IPS Group Test Competitive Comparison July 2012 97.00% 95.00% 93.00% 91.00% Over-all Protection Client Protections Server Protections 89.00% 87.00% Check Point 12600 SourceFire 3D8120 Fortinet 3240C Palo Alto PA5020 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 13
  • 14. The reality is that IPS integrated into the firewall is just as effective, if not better, than stand-alone IPS solutions [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 14
  • 15. And Comparing Check Point in 2012 vs. 2013 100.0% 99.5% 99.0% Getting better every year 98.5% 98.0% 97.5% 97.0% 96.5% Over-all Protection Client Protections Server Protections 96.0% 95.5% 95.0% 2012 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 15
  • 16. And a look at costs [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 16
  • 17. IPS Software Blade: Three-Year TCO Comparison Comparing Dedicated IPS Appliances to IPS Software Blade $80,000 $72,500 $70,000 $60,000 $50,000 $50,000 $40,000 $30,000 $20,000 $10,000 $13,500 $7,500 $4,500 $0 Dedicated IPS Dedicated IPS Annual Support One-Year TCOSoftware Blade Product Price Three-Year Dedicated IPS IPS Three-Year IPS Software Blade [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 17
  • 18. What about other security technologies? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 18
  • 19. Application Control: Three-Year TCO Comparison Comparing Dedicated Web Filter Appliances to Application Control Blade $60,000 $50,750 $50,000 $40,000 $35,000 $30,000 $20,000 $13,500 $10,000 $5,250 $4,500 $0 Dedicated Web Filter GatewayGateway Appliance Support Application Control Blade Control Bla Dedicated Web Appliance Three-Year Dedicated Web Gateway Three-YearTCO One-Year Appliance Application [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 19
  • 20. GRC: Three-Year TCO Comparison Comparing Dedicated GRC Solutions with the Compliance Blade $90,000 $79,750 $80,000 $70,000 $60,000 $55,000 $50,000 $40,000 $30,000 $25,500 $20,000 $10,000 $8,250 $8,500 $0 Dedicated GRC Product Price Three-Year One-Year 25 Gateway Compliance Blade Blade T Dedicated GRC Solution Support Dedicated GRC TCO Three-Year Compliance [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 20
  • 21. Sandboxing: Three-Year TCO Comparison Comparing Dedicated Sandbox Solutions $80,000 $72,500 $70,000 $60,000 $50,000 $50,000 $40,000 $30,000 $20,000 $10,000 $13,500 $7,500 $4,500 $0 Dedicated Sandbox Solution Solution Support Dedicated Sandbox Three-Year DedicatedOne-Year Threat Emulation BladeEmulation Bl Sandbox Solution TCO Threat Three-Year [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 21
  • 22. Some questions for you [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 22
  • 23. Please Raise Your Hand Question #1: Who here is using IPS Software Blade?  Why?  What protections? Question #2: Who here is using Anti-Bot?  Why?  Do you run the controls in protect mode? Question #3: Who here is using SmartEvent?  Why?  Do you activate automated blocking? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 23
  • 24. Today, security solutions must provide: Multi-layer, integrated protections Real-time, actionable intelligence Adaptive controls [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 24
  • 25. Why? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 25
  • 26. Consider The Following Attack All three attack vectors are meant to breach the perimeter Server vulnerability exploit Weaponized attachment Network access Malware via social engineering Each attack uses a distinct method [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
  • 27. “Best-of-Breed” During The Attack Server vulnerability exploit Weaponized attachment Malware via social engineering Dedicated Intrusion Detection Dedicated Sandbox Solution Dedicated Web Proxy Probably not in “prevent” mode Captures and analyzes attachment Sees Facebook and allows data to pass Proprietary Log Proprietary Log Proprietary Log 3rd Party Log Aggregator [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 27
  • 28. And The Outcome Server vulnerability exploit Weaponized attachment Malware via social engineering Dedicated Intrusion Detection Dedicated Sandbox Solution Dedicated Web Proxy Server compromised, ad Probably not in min“prevent” mode rights obtained Proprietary Log Captures and analyzes attachment Endpoint Sees Facebook compromised, dat andextracted allows a to passdata Proprietary Log Proprietary Log 3rd Party Log Aggregator [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 28
  • 29. And Event Management? Sandbox shows different event Log aggregator collects multiple feeds Each individual event appears separate Full picture and individual events have no relationship [Protected] For public distribution IDS event shows exploit Proxy just sees Facebook ©2013 Check Point Software Technologies Ltd. 29
  • 30. And Worse Separate signature updates No sharing of “bad actor” information Multiple policy changes required for mitigation [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 30
  • 31. And Finally, The Cost Product Dedicated IDS Dedicated Sandbox Dedicated Web Proxy CAPEX OPEX Three Year Cost $50,000 $7,500 $72,500 $50,000 $7,500 $72,500 $35,000 $5,250 $50,750 Three-Year Total [Protected] For public distribution $195,750 ©2013 Check Point Software Technologies Ltd. 31
  • 32. Consolidating with Check Point [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 32
  • 33. Starting With The GUI Key is to build a security flow Policy starts from the ground up  Firewall is that ground floor  IPS, App Ctrl, Anti-Bot flow from there [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 33
  • 34. Check Point During The Attack Centralized updates via the ThreatCloud Server vulnerability exploit Weaponized attachment Malware via social engineering Threat Emulation Anti-Bot Application Control IPS Firewall [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 34
  • 35. What Administrators Would See All attack vectors collected into a single perspective  Protections report into a single location  Tools for high-level and detailed analysis [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 35
  • 36. And Then… When the attacker gets desperate and launches a DDoS Use the new DDoS controls and/or CLI the source IPs to the firewall [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 36
  • 37. Costs With Check Point Product CAPEX OPEX 12607 (25% Discount) IPS Software Blade $53,760 $10,080 Three Year Cost $84,000 $4,500 $9,000 $4,500 $13,500 $4,500 $9,000 (Included in Year 1) Threat Emulation Application Control (Included in Year 1) Anti-Bot Blade $4,500 Three-Year Total [Protected] For public distribution $13,500 $129,000 ©2013 Check Point Software Technologies Ltd. 37
  • 38. The Savings $195,750 $135,000 $53,760 $129,000 $75,240 $60,750 Savings Amount: $66,750 Percent: 35% Multiple Vendors Check Point CAPEX OPEX 3 Year Total [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 38
  • 39. Summary Yes, it’s tempting to do what’s always been done: Multi-vendor Data suggest that it’s time for an alternative approach: Consolidation [Protected] For public distribution Check Point’s multi-layer threat prevention makes it work ©2013 Check Point Software Technologies Ltd. 39