SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Check Point Endpoint Security



IBM Insight Forum 09   Make change work for you
                                                  ®
2

     Agenda
     A   d
        Endpoint security challenges
            p           y        g
        What is Check Point TotalSecurity
        Demonstration of Technical Functionalities
        Live Demo of WebCheck




IBM Insight Forum 09          Make change work for you
                                                             ®
3

     Issues with Endpoint Security
     I       ith E d i t S     it
        Difficult for administrators
             Complexity and Manageability
             Evolving Vulnerabilities
             Too many point solutions

        Users see it as a hassle
             Everything looks different, difficult for end users
             ‘Stops me doing what I need to’
             Performance




IBM Insight Forum 09                Make change work for you
                                                                       ®
4
     So what is in the End Point Total
     Security?


            Personal Firewall   Antivirus                   Full Disk
                                               VPN Client                  Port protection   Media Encryption
            Host-IPS / NAC      Anti-spyware                Encryption




IBM Insight Forum 09                            Make change work for you
                                                                                                                    ®
5




IBM Insight Forum 09   Make change work for you
                                                      ®
6
     When you g into the office….
          y get




IBM Insight Forum 09   Make change work for you
                                                      ®
7
     When you move some sensitive
           y
     data home….




IBM Insight Forum 09   Make change work for you
                                                      ®
8
     USB Key Enrolment
           y




IBM Insight Forum 09   Make change work for you
                                                      ®
9
     When you g home…..
          y get




IBM Insight Forum 09   Make change work for you
                                                      ®
10
     What the admin sees




IBM Insight Forum 09   Make change work for you
                                                       ®
11




IBM Insight Forum 09   Make change work for you
                                                       ®
12




                       Thank you
                              o

                       Questions?




IBM Insight Forum 09   Make change work for you
                                                       ®

Mais conteúdo relacionado

Mais procurados

Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
 
Kiwibank: From Startup to Enterprise in 7 years
Kiwibank:  From Startup to Enterprise in 7 yearsKiwibank:  From Startup to Enterprise in 7 years
Kiwibank: From Startup to Enterprise in 7 yearsVincent Kwon
 
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra ProjectBreaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra ProjectVincent Kwon
 
CDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business IntelligenceCDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business IntelligenceVincent Kwon
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008eLiberatica
 
Présentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSOPrésentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSOIBMInfoSphereUGFR
 
IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...Vincent Kwon
 

Mais procurados (9)

Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
 
Kiwibank: From Startup to Enterprise in 7 years
Kiwibank:  From Startup to Enterprise in 7 yearsKiwibank:  From Startup to Enterprise in 7 years
Kiwibank: From Startup to Enterprise in 7 years
 
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra ProjectBreaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
 
CDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business IntelligenceCDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business Intelligence
 
Z vm-faq
Z vm-faqZ vm-faq
Z vm-faq
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
 
Présentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSOPrésentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSO
 
IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...
 
What is the latest from the IBM OMEGAMON portfolio?
What is the latest from the IBM OMEGAMON portfolio?What is the latest from the IBM OMEGAMON portfolio?
What is the latest from the IBM OMEGAMON portfolio?
 

Destaque

Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Corporation
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMCourion Corporation
 
PDFCertification
PDFCertificationPDFCertification
PDFCertificationGene Berger
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacksCourion Corporation
 
Check Point Certified Security Admin
Check Point Certified Security AdminCheck Point Certified Security Admin
Check Point Certified Security AdminGene Berger
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Duane Bodle
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Auditkeyuradmin
 
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Javier Ortega
 

Destaque (15)

10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAM
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
PDFCertification
PDFCertificationPDFCertification
PDFCertification
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacks
 
Check Point Certified Security Admin
Check Point Certified Security AdminCheck Point Certified Security Admin
Check Point Certified Security Admin
 
Firewall audit
Firewall auditFirewall audit
Firewall audit
 
Forti web
Forti webForti web
Forti web
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
 
Firewalking
FirewalkingFirewalking
Firewalking
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 

Semelhante a Checkpoint - A Practical Demonstration of Endpoint Security

Cisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business TransformationCisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business TransformationVincent Kwon
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Vincent Kwon
 
How FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business OneHow FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business OneVincent Kwon
 
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...Vincent Kwon
 
IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...Vincent Kwon
 
Utility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementUtility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementVincent Kwon
 
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary EducationCyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary EducationVincent Kwon
 
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...Vincent Kwon
 
Certus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of PortalCertus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of PortalVincent Kwon
 
FORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent TimesFORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent TimesLKS, S. Coop.
 
WhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for GrowthWhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for GrowthVincent Kwon
 
Ability Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus NotesAbility Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus NotesVincent Kwon
 
Open systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedOpen systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedVincent Kwon
 
e-Com:Activate content in your business process
e-Com:Activate content in your business processe-Com:Activate content in your business process
e-Com:Activate content in your business processVincent Kwon
 
Granite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS UpdatesGranite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS UpdatesLuis Guirigay
 
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)bisg
 
Lessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionLessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionIBM India Smarter Computing
 
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...Stephan H. Wissel
 

Semelhante a Checkpoint - A Practical Demonstration of Endpoint Security (20)

Cisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business TransformationCisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business Transformation
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...
 
How FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business OneHow FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business One
 
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
 
IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...
 
Utility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementUtility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset Management
 
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary EducationCyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
 
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
 
Certus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of PortalCertus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of Portal
 
FORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent TimesFORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent Times
 
WhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for GrowthWhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for Growth
 
Ability Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus NotesAbility Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus Notes
 
Open systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedOpen systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage Reinvented
 
e-Com:Activate content in your business process
e-Com:Activate content in your business processe-Com:Activate content in your business process
e-Com:Activate content in your business process
 
Granite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS UpdatesGranite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS Updates
 
Top brand ibm
Top brand ibmTop brand ibm
Top brand ibm
 
Top brand ibm
Top brand ibmTop brand ibm
Top brand ibm
 
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
 
Lessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionLessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in Production
 
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
 

Mais de Vincent Kwon

Smarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattSmarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattVincent Kwon
 
Paul croft - Auckland Cloud Camp 2010
Paul croft  - Auckland Cloud Camp 2010Paul croft  - Auckland Cloud Camp 2010
Paul croft - Auckland Cloud Camp 2010Vincent Kwon
 
Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011Vincent Kwon
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
Capitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceCapitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceVincent Kwon
 
IBM Maximo for Utilities
IBM Maximo for UtilitiesIBM Maximo for Utilities
IBM Maximo for UtilitiesVincent Kwon
 
IBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XIBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XVincent Kwon
 
VMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVincent Kwon
 
Turn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionTurn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionVincent Kwon
 
Keynote intelligence, innovation & best practice
Keynote    intelligence, innovation & best practiceKeynote    intelligence, innovation & best practice
Keynote intelligence, innovation & best practiceVincent Kwon
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisationVincent Kwon
 
Enhanced business performance
Enhanced business performanceEnhanced business performance
Enhanced business performanceVincent Kwon
 
Drive business performance with information analytics
Drive business performance with information analyticsDrive business performance with information analytics
Drive business performance with information analyticsVincent Kwon
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)Vincent Kwon
 
Acclerating jounrey to cloud computing
Acclerating jounrey to cloud computingAcclerating jounrey to cloud computing
Acclerating jounrey to cloud computingVincent Kwon
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationVincent Kwon
 
Wellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanWellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanVincent Kwon
 

Mais de Vincent Kwon (20)

Smarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattSmarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D Watt
 
Paul croft - Auckland Cloud Camp 2010
Paul croft  - Auckland Cloud Camp 2010Paul croft  - Auckland Cloud Camp 2010
Paul croft - Auckland Cloud Camp 2010
 
Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Capitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceCapitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross Pearce
 
IBM Maximo for Utilities
IBM Maximo for UtilitiesIBM Maximo for Utilities
IBM Maximo for Utilities
 
IBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XIBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System X
 
VMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloud
 
Turn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionTurn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take action
 
Keynote intelligence, innovation & best practice
Keynote    intelligence, innovation & best practiceKeynote    intelligence, innovation & best practice
Keynote intelligence, innovation & best practice
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisation
 
Enhanced business performance
Enhanced business performanceEnhanced business performance
Enhanced business performance
 
Drive business performance with information analytics
Drive business performance with information analyticsDrive business performance with information analytics
Drive business performance with information analytics
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Acclerating jounrey to cloud computing
Acclerating jounrey to cloud computingAcclerating jounrey to cloud computing
Acclerating jounrey to cloud computing
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisation
 
Wellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanWellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul Callaghan
 

Último

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

Checkpoint - A Practical Demonstration of Endpoint Security

  • 1. Check Point Endpoint Security IBM Insight Forum 09 Make change work for you ®
  • 2. 2 Agenda A d Endpoint security challenges p y g What is Check Point TotalSecurity Demonstration of Technical Functionalities Live Demo of WebCheck IBM Insight Forum 09 Make change work for you ®
  • 3. 3 Issues with Endpoint Security I ith E d i t S it Difficult for administrators Complexity and Manageability Evolving Vulnerabilities Too many point solutions Users see it as a hassle Everything looks different, difficult for end users ‘Stops me doing what I need to’ Performance IBM Insight Forum 09 Make change work for you ®
  • 4. 4 So what is in the End Point Total Security? Personal Firewall Antivirus Full Disk VPN Client Port protection Media Encryption Host-IPS / NAC Anti-spyware Encryption IBM Insight Forum 09 Make change work for you ®
  • 5. 5 IBM Insight Forum 09 Make change work for you ®
  • 6. 6 When you g into the office…. y get IBM Insight Forum 09 Make change work for you ®
  • 7. 7 When you move some sensitive y data home…. IBM Insight Forum 09 Make change work for you ®
  • 8. 8 USB Key Enrolment y IBM Insight Forum 09 Make change work for you ®
  • 9. 9 When you g home….. y get IBM Insight Forum 09 Make change work for you ®
  • 10. 10 What the admin sees IBM Insight Forum 09 Make change work for you ®
  • 11. 11 IBM Insight Forum 09 Make change work for you ®
  • 12. 12 Thank you o Questions? IBM Insight Forum 09 Make change work for you ®