SlideShare uma empresa Scribd logo
1 de 39
Consolidation: Your
Best Move Towards
Stronger Security

Avi Rembaum
Director, 3D Consulting

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.
Current Threat Vectors
Spear
Phishing

RATs

DoS

Security administrators
face multiple attacks
from the same source
that can occur
simultaneously or
over time

Web
attacks

Zero-day

Malware

Botnets

Network
breach

SPAM

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

2
Finding The Source of a Security Incident Is Like…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

3
Average Cost of a Cyber Crime Attack

$8,389,828

$8,933,510

$6,459,362

2010

2011

2012

Source: Ponemon Cost of Cyber Crime Study, October 2012
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

4
What About Spending?
According to 12,396 security professionals,
spending on security during 2013 will:

Source: ISC(2), 2013

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

5
Are Thing Improving?
And how does the same group of people
feel about the success of their work?

Source: ISC(2), 2013

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

6
What’s Going On?

Security incidents are
becoming more
expensive
Security professionals
doubt their effectiveness

But, investment will stay
the same or go up

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

7
At some point we have to
realize that just maybe it’s time
for a different approach
But is this really a new conclusion?
Some interesting reading…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

8
When Was This Written?
 Malware and other forms of attack continue to be
alarmingly effective at eluding in-place safeguards

 The vulnerability-threat window is continuing to close
 Equally troublesome is the fact that propagation times for
threats are reaching new lows

 Automated tools continue to lower the bar when it comes
to the degree of knowledge required to launch ever more
sophisticated attacks

 The vast armies of “amateur” hackers are increasingly
being joined by ranks of “professionals”
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

9
How About 2005?
Admit it – it’s kind of scary that we can
tell the same story eight years later

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

10
At The Time, They Recommended
Figure 5 — Unified Threat Defenses

Pervasive
Perimeters
Multilayer
Awareness

Pervasive
Integration

Multiservice
Security

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

11
What They Were Really Saying

Defense-in-depth is not the
same as best-of-breed
An example…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

12
IPS Software Blade:
Security Quality Comparison
99.00%

NSS 2012 IPS
Group Test
Competitive
Comparison
July 2012

97.00%
95.00%
93.00%
91.00%

Over-all Protection
Client Protections
Server Protections

89.00%
87.00%
Check Point
12600

SourceFire
3D8120

Fortinet
3240C

Palo Alto PA5020

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

13
The reality is that IPS
integrated into the firewall is
just as effective, if not
better, than stand-alone IPS
solutions
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

14
And Comparing Check Point in 2012
vs. 2013
100.0%
99.5%
99.0%

Getting
better every
year

98.5%

98.0%
97.5%
97.0%
96.5%

Over-all Protection
Client Protections
Server Protections

96.0%
95.5%

95.0%
2012

2013

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

15
And a look at costs

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

16
IPS Software Blade:
Three-Year TCO Comparison
Comparing Dedicated IPS Appliances to
IPS Software Blade
$80,000
$72,500
$70,000
$60,000
$50,000

$50,000

$40,000
$30,000
$20,000

$10,000

$13,500
$7,500

$4,500

$0
Dedicated IPS Dedicated IPS Annual Support One-Year TCOSoftware Blade
Product Price Three-Year Dedicated IPS IPS
Three-Year IPS Software Blade
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

17
What about other
security technologies?

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

18
Application Control:
Three-Year TCO Comparison
Comparing Dedicated Web Filter Appliances to
Application Control Blade
$60,000
$50,750
$50,000
$40,000

$35,000

$30,000
$20,000
$13,500
$10,000

$5,250

$4,500

$0
Dedicated Web Filter GatewayGateway Appliance Support Application Control Blade Control Bla
Dedicated Web Appliance
Three-Year Dedicated Web Gateway Three-YearTCO
One-Year Appliance Application
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

19
GRC: Three-Year TCO Comparison
Comparing Dedicated GRC Solutions with
the Compliance Blade
$90,000
$79,750

$80,000
$70,000
$60,000

$55,000

$50,000
$40,000
$30,000

$25,500

$20,000

$10,000

$8,250

$8,500

$0
Dedicated GRC Product Price Three-Year One-Year 25 Gateway Compliance Blade Blade T
Dedicated GRC Solution Support
Dedicated GRC TCO
Three-Year Compliance
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

20
Sandboxing:
Three-Year TCO Comparison
Comparing Dedicated Sandbox Solutions
$80,000
$72,500
$70,000
$60,000
$50,000

$50,000

$40,000
$30,000
$20,000

$10,000

$13,500
$7,500

$4,500

$0
Dedicated Sandbox Solution Solution Support
Dedicated Sandbox
Three-Year DedicatedOne-Year Threat Emulation BladeEmulation Bl
Sandbox Solution TCO Threat
Three-Year
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

21
Some questions for you

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

22
Please Raise Your Hand
Question #1: Who here is using IPS Software Blade?

 Why?
 What protections?
Question #2: Who here is using Anti-Bot?

 Why?
 Do you run the controls in protect mode?
Question #3: Who here is using SmartEvent?

 Why?
 Do you activate automated blocking?
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

23
Today, security solutions must provide:
Multi-layer, integrated protections

Real-time, actionable intelligence
Adaptive controls

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

24
Why?

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

25
Consider The Following Attack

All three attack
vectors are meant to
breach the perimeter

Server vulnerability
exploit
Weaponized
attachment

Network
access

Malware via social
engineering

Each attack uses a
distinct method

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

26
“Best-of-Breed” During The Attack
Server
vulnerability
exploit

Weaponized
attachment

Malware via social
engineering

Dedicated
Intrusion
Detection

Dedicated
Sandbox
Solution

Dedicated Web
Proxy

Probably not in
“prevent” mode

Captures and
analyzes
attachment

Sees Facebook
and allows data
to pass

Proprietary
Log

Proprietary
Log

Proprietary
Log

3rd Party Log
Aggregator
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

27
And The Outcome
Server
vulnerability
exploit

Weaponized
attachment

Malware via social
engineering

Dedicated
Intrusion
Detection

Dedicated
Sandbox
Solution

Dedicated Web
Proxy

Server
compromised, ad
Probably not in
min“prevent” mode
rights obtained
Proprietary
Log

Captures and
analyzes
attachment

Endpoint
Sees Facebook
compromised, dat
andextracted
allows
a to passdata

Proprietary
Log

Proprietary
Log

3rd Party Log
Aggregator
[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

28
And Event Management?

Sandbox
shows
different
event

Log aggregator
collects multiple
feeds
Each individual
event appears
separate
Full picture and
individual events
have no relationship

[Protected] For public distribution

IDS event
shows
exploit

Proxy just
sees
Facebook

©2013 Check Point Software Technologies Ltd.

29
And Worse

Separate signature updates
No sharing of “bad actor”
information
Multiple policy changes required
for mitigation

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

30
And Finally, The Cost

Product
Dedicated
IDS
Dedicated
Sandbox
Dedicated
Web Proxy

CAPEX

OPEX

Three Year
Cost

$50,000

$7,500

$72,500

$50,000

$7,500

$72,500

$35,000

$5,250

$50,750

Three-Year Total

[Protected] For public distribution

$195,750

©2013 Check Point Software Technologies Ltd.

31
Consolidating with
Check Point

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

32
Starting With The GUI

Key is to build a security flow
Policy starts from the ground up

 Firewall is that ground floor
 IPS, App Ctrl, Anti-Bot flow from there

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

33
Check Point During The Attack

Centralized updates via the
ThreatCloud

Server vulnerability
exploit

Weaponized
attachment

Malware via social
engineering

Threat Emulation
Anti-Bot
Application Control
IPS
Firewall

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

34
What Administrators Would See

All attack vectors collected into a
single perspective

 Protections report into a single location
 Tools for high-level and detailed analysis

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

35
And Then…

When the attacker
gets desperate
and launches a
DDoS

Use the new DDoS
controls and/or CLI
the source IPs to
the firewall

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

36
Costs With Check Point

Product

CAPEX

OPEX

12607 (25% Discount)
IPS Software Blade

$53,760

$10,080

Three Year
Cost
$84,000

$4,500

$9,000

$4,500

$13,500

$4,500

$9,000

(Included in Year 1)

Threat Emulation
Application Control
(Included in Year 1)

Anti-Bot Blade

$4,500
Three-Year Total

[Protected] For public distribution

$13,500
$129,000

©2013 Check Point Software Technologies Ltd.

37
The Savings

$195,750

$135,000

$53,760

$129,000

$75,240
$60,750

Savings
Amount: $66,750
Percent: 35%

Multiple Vendors
Check Point

CAPEX

OPEX

3 Year Total

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

38
Summary

Yes, it’s tempting
to do what’s
always been
done:
Multi-vendor

Data suggest
that it’s time for
an alternative
approach:
Consolidation

[Protected] For public distribution

Check Point’s
multi-layer
threat
prevention
makes it work

©2013 Check Point Software Technologies Ltd.

39

Mais conteúdo relacionado

Mais procurados

Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseGlobal Online Trainings
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheetUsman Arif
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 

Mais procurados (20)

How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
checkpoint
checkpointcheckpoint
checkpoint
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
How to Choose a SandBox - Gartner
How to Choose a SandBox - GartnerHow to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online CourseCheckpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Checkpoint ccsa r76
Checkpoint ccsa r76Checkpoint ccsa r76
Checkpoint ccsa r76
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 

Semelhante a Check Point Consolidation

Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE - ATT&CKcon
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security DeploymentCisco Canada
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / securityThe Internet of Things
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For ActionBarry Greene
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud ChallengeVMware Tanzu
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorIBMGovernmentCA
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualVMware Tanzu
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mwaresolarisyourep
 
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Dayfestival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Dayfestival ICT 2016
 
stackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Securitystackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven SecurityNETWAYS
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastDiana Frolova
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copyAdel Zalok
 

Semelhante a Check Point Consolidation (20)

Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
Advanced Web Security Deployment
Advanced Web Security DeploymentAdvanced Web Security Deployment
Advanced Web Security Deployment
 
akamai's [state of internet] / security
akamai's [state of internet] / securityakamai's [state of internet] / security
akamai's [state of internet] / security
 
Indusrty Strategy For Action
Indusrty Strategy For ActionIndusrty Strategy For Action
Indusrty Strategy For Action
 
The Cloud Challenge
The Cloud ChallengeThe Cloud Challenge
The Cloud Challenge
 
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public SectorSecurity Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
 
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty MutualSecurity in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Presentation security build for v mware
Presentation   security build for v mwarePresentation   security build for v mware
Presentation security build for v mware
 
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Dayfestival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
 
stackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Securitystackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Security
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
Presentation copy
Presentation   copyPresentation   copy
Presentation copy
 

Mais de Group of company MUK

Mais de Group of company MUK (12)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Último

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...ScyllaDB
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Patrick Viafore
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGDSC PJATK
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandIES VE
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...FIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 

Último (20)

Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 

Check Point Consolidation

  • 1. Consolidation: Your Best Move Towards Stronger Security Avi Rembaum Director, 3D Consulting [Protected] For public distribution ©2013 Check Point Software Technologies Ltd.
  • 2. Current Threat Vectors Spear Phishing RATs DoS Security administrators face multiple attacks from the same source that can occur simultaneously or over time Web attacks Zero-day Malware Botnets Network breach SPAM [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 2
  • 3. Finding The Source of a Security Incident Is Like… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 3
  • 4. Average Cost of a Cyber Crime Attack $8,389,828 $8,933,510 $6,459,362 2010 2011 2012 Source: Ponemon Cost of Cyber Crime Study, October 2012 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 4
  • 5. What About Spending? According to 12,396 security professionals, spending on security during 2013 will: Source: ISC(2), 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 5
  • 6. Are Thing Improving? And how does the same group of people feel about the success of their work? Source: ISC(2), 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 6
  • 7. What’s Going On? Security incidents are becoming more expensive Security professionals doubt their effectiveness But, investment will stay the same or go up [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 7
  • 8. At some point we have to realize that just maybe it’s time for a different approach But is this really a new conclusion? Some interesting reading… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 8
  • 9. When Was This Written?  Malware and other forms of attack continue to be alarmingly effective at eluding in-place safeguards  The vulnerability-threat window is continuing to close  Equally troublesome is the fact that propagation times for threats are reaching new lows  Automated tools continue to lower the bar when it comes to the degree of knowledge required to launch ever more sophisticated attacks  The vast armies of “amateur” hackers are increasingly being joined by ranks of “professionals” [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 9
  • 10. How About 2005? Admit it – it’s kind of scary that we can tell the same story eight years later [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 10
  • 11. At The Time, They Recommended Figure 5 — Unified Threat Defenses Pervasive Perimeters Multilayer Awareness Pervasive Integration Multiservice Security [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 11
  • 12. What They Were Really Saying Defense-in-depth is not the same as best-of-breed An example… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 12
  • 13. IPS Software Blade: Security Quality Comparison 99.00% NSS 2012 IPS Group Test Competitive Comparison July 2012 97.00% 95.00% 93.00% 91.00% Over-all Protection Client Protections Server Protections 89.00% 87.00% Check Point 12600 SourceFire 3D8120 Fortinet 3240C Palo Alto PA5020 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 13
  • 14. The reality is that IPS integrated into the firewall is just as effective, if not better, than stand-alone IPS solutions [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 14
  • 15. And Comparing Check Point in 2012 vs. 2013 100.0% 99.5% 99.0% Getting better every year 98.5% 98.0% 97.5% 97.0% 96.5% Over-all Protection Client Protections Server Protections 96.0% 95.5% 95.0% 2012 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 15
  • 16. And a look at costs [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 16
  • 17. IPS Software Blade: Three-Year TCO Comparison Comparing Dedicated IPS Appliances to IPS Software Blade $80,000 $72,500 $70,000 $60,000 $50,000 $50,000 $40,000 $30,000 $20,000 $10,000 $13,500 $7,500 $4,500 $0 Dedicated IPS Dedicated IPS Annual Support One-Year TCOSoftware Blade Product Price Three-Year Dedicated IPS IPS Three-Year IPS Software Blade [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 17
  • 18. What about other security technologies? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 18
  • 19. Application Control: Three-Year TCO Comparison Comparing Dedicated Web Filter Appliances to Application Control Blade $60,000 $50,750 $50,000 $40,000 $35,000 $30,000 $20,000 $13,500 $10,000 $5,250 $4,500 $0 Dedicated Web Filter GatewayGateway Appliance Support Application Control Blade Control Bla Dedicated Web Appliance Three-Year Dedicated Web Gateway Three-YearTCO One-Year Appliance Application [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 19
  • 20. GRC: Three-Year TCO Comparison Comparing Dedicated GRC Solutions with the Compliance Blade $90,000 $79,750 $80,000 $70,000 $60,000 $55,000 $50,000 $40,000 $30,000 $25,500 $20,000 $10,000 $8,250 $8,500 $0 Dedicated GRC Product Price Three-Year One-Year 25 Gateway Compliance Blade Blade T Dedicated GRC Solution Support Dedicated GRC TCO Three-Year Compliance [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 20
  • 21. Sandboxing: Three-Year TCO Comparison Comparing Dedicated Sandbox Solutions $80,000 $72,500 $70,000 $60,000 $50,000 $50,000 $40,000 $30,000 $20,000 $10,000 $13,500 $7,500 $4,500 $0 Dedicated Sandbox Solution Solution Support Dedicated Sandbox Three-Year DedicatedOne-Year Threat Emulation BladeEmulation Bl Sandbox Solution TCO Threat Three-Year [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 21
  • 22. Some questions for you [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 22
  • 23. Please Raise Your Hand Question #1: Who here is using IPS Software Blade?  Why?  What protections? Question #2: Who here is using Anti-Bot?  Why?  Do you run the controls in protect mode? Question #3: Who here is using SmartEvent?  Why?  Do you activate automated blocking? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 23
  • 24. Today, security solutions must provide: Multi-layer, integrated protections Real-time, actionable intelligence Adaptive controls [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 24
  • 25. Why? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 25
  • 26. Consider The Following Attack All three attack vectors are meant to breach the perimeter Server vulnerability exploit Weaponized attachment Network access Malware via social engineering Each attack uses a distinct method [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
  • 27. “Best-of-Breed” During The Attack Server vulnerability exploit Weaponized attachment Malware via social engineering Dedicated Intrusion Detection Dedicated Sandbox Solution Dedicated Web Proxy Probably not in “prevent” mode Captures and analyzes attachment Sees Facebook and allows data to pass Proprietary Log Proprietary Log Proprietary Log 3rd Party Log Aggregator [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 27
  • 28. And The Outcome Server vulnerability exploit Weaponized attachment Malware via social engineering Dedicated Intrusion Detection Dedicated Sandbox Solution Dedicated Web Proxy Server compromised, ad Probably not in min“prevent” mode rights obtained Proprietary Log Captures and analyzes attachment Endpoint Sees Facebook compromised, dat andextracted allows a to passdata Proprietary Log Proprietary Log 3rd Party Log Aggregator [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 28
  • 29. And Event Management? Sandbox shows different event Log aggregator collects multiple feeds Each individual event appears separate Full picture and individual events have no relationship [Protected] For public distribution IDS event shows exploit Proxy just sees Facebook ©2013 Check Point Software Technologies Ltd. 29
  • 30. And Worse Separate signature updates No sharing of “bad actor” information Multiple policy changes required for mitigation [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 30
  • 31. And Finally, The Cost Product Dedicated IDS Dedicated Sandbox Dedicated Web Proxy CAPEX OPEX Three Year Cost $50,000 $7,500 $72,500 $50,000 $7,500 $72,500 $35,000 $5,250 $50,750 Three-Year Total [Protected] For public distribution $195,750 ©2013 Check Point Software Technologies Ltd. 31
  • 32. Consolidating with Check Point [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 32
  • 33. Starting With The GUI Key is to build a security flow Policy starts from the ground up  Firewall is that ground floor  IPS, App Ctrl, Anti-Bot flow from there [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 33
  • 34. Check Point During The Attack Centralized updates via the ThreatCloud Server vulnerability exploit Weaponized attachment Malware via social engineering Threat Emulation Anti-Bot Application Control IPS Firewall [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 34
  • 35. What Administrators Would See All attack vectors collected into a single perspective  Protections report into a single location  Tools for high-level and detailed analysis [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 35
  • 36. And Then… When the attacker gets desperate and launches a DDoS Use the new DDoS controls and/or CLI the source IPs to the firewall [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 36
  • 37. Costs With Check Point Product CAPEX OPEX 12607 (25% Discount) IPS Software Blade $53,760 $10,080 Three Year Cost $84,000 $4,500 $9,000 $4,500 $13,500 $4,500 $9,000 (Included in Year 1) Threat Emulation Application Control (Included in Year 1) Anti-Bot Blade $4,500 Three-Year Total [Protected] For public distribution $13,500 $129,000 ©2013 Check Point Software Technologies Ltd. 37
  • 38. The Savings $195,750 $135,000 $53,760 $129,000 $75,240 $60,750 Savings Amount: $66,750 Percent: 35% Multiple Vendors Check Point CAPEX OPEX 3 Year Total [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 38
  • 39. Summary Yes, it’s tempting to do what’s always been done: Multi-vendor Data suggest that it’s time for an alternative approach: Consolidation [Protected] For public distribution Check Point’s multi-layer threat prevention makes it work ©2013 Check Point Software Technologies Ltd. 39