Enviar pesquisa
Carregar
Check Point Consolidation
•
1 gostou
•
795 visualizações
Group of company MUK
Seguir
Check Point Consolidation: Your Best Move Towards Stronger Security
Leia menos
Leia mais
Tecnologia
Negócios
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 39
Recomendados
Check Point NGFW
Check Point NGFW
Group of company MUK
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
Group of company MUK
Check Point: From Branch to Data Center
Check Point: From Branch to Data Center
Group of company MUK
Check Point Threat emulation 2013
Check Point Threat emulation 2013
Group of company MUK
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
VertexMon VertexMon
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
Nextel S.A.
Recomendados
Check Point NGFW
Check Point NGFW
Group of company MUK
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
Group of company MUK
Check Point: From Branch to Data Center
Check Point: From Branch to Data Center
Group of company MUK
Check Point Threat emulation 2013
Check Point Threat emulation 2013
Group of company MUK
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
Ayulgui baidliin buteegdehunud Checkpoint Worldwide #1 Security products
VertexMon VertexMon
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
MarketingArrowECS_CZ
Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
Nextel S.A.
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
Moti Sagey מוטי שגיא
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
Check Point Virtual Systems
Check Point Virtual Systems
Group of company MUK
checkpoint
checkpoint
Mayank Dhingra
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
How to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Moti Sagey מוטי שגיא
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
Check Point sizing security
Check Point sizing security
Group of company MUK
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Global Online Trainings
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
Juniper competitive cheatsheet
Juniper competitive cheatsheet
Usman Arif
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
Check Point Software Technologies
Checkpoint ccsa r76
Checkpoint ccsa r76
Vaibhav Agrawal
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
WannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Check Point Software Technologies
Ecosystem
Ecosystem
Moti Sagey מוטי שגיא
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
Check Point and Accenture Webinar
Check Point and Accenture Webinar
Check Point Software Technologies
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Management Associates
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
Group of company MUK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
Mais conteúdo relacionado
Mais procurados
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
Moti Sagey מוטי שגיא
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Software Technologies
Check Point Virtual Systems
Check Point Virtual Systems
Group of company MUK
checkpoint
checkpoint
Mayank Dhingra
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
Moti Sagey מוטי שגיא
How to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Moti Sagey מוטי שגיא
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
Check Point sizing security
Check Point sizing security
Group of company MUK
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Global Online Trainings
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
Juniper competitive cheatsheet
Juniper competitive cheatsheet
Usman Arif
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
Check Point Software Technologies
Checkpoint ccsa r76
Checkpoint ccsa r76
Vaibhav Agrawal
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
WannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Check Point Software Technologies
Ecosystem
Ecosystem
Moti Sagey מוטי שגיא
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
Check Point and Accenture Webinar
Check Point and Accenture Webinar
Check Point Software Technologies
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Management Associates
Mais procurados
(20)
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
Check Point Virtual Systems
Check Point Virtual Systems
checkpoint
checkpoint
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
How to Choose a SandBox - Gartner
How to Choose a SandBox - Gartner
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Check Point sizing security
Check Point sizing security
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Checkpoint Firewall Training | Checkpoint Firewall Online Course
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Juniper competitive cheatsheet
Juniper competitive cheatsheet
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
Checkpoint ccsa r76
Checkpoint ccsa r76
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
WannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Ecosystem
Ecosystem
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
Check Point and Accenture Webinar
Check Point and Accenture Webinar
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Semelhante a Check Point Consolidation
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
Group of company MUK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Clouditalia Telecomunicazioni
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
Check Point SMB Proposition
Check Point SMB Proposition
Group of company MUK
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Decisions
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Decisions
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
MITRE - ATT&CKcon
Advanced Web Security Deployment
Advanced Web Security Deployment
Cisco Canada
akamai's [state of internet] / security
akamai's [state of internet] / security
The Internet of Things
Indusrty Strategy For Action
Indusrty Strategy For Action
Barry Greene
The Cloud Challenge
The Cloud Challenge
VMware Tanzu
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
IBMGovernmentCA
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
VMware Tanzu
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
RedhuntLabs2
Presentation security build for v mware
Presentation security build for v mware
solarisyourep
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2016
stackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Security
NETWAYS
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
Diana Frolova
Presentation copy
Presentation copy
Adel Zalok
Semelhante a Check Point Consolidation
(20)
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
Check Point SMB Proposition
Check Point SMB Proposition
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
Advanced Web Security Deployment
Advanced Web Security Deployment
akamai's [state of internet] / security
akamai's [state of internet] / security
Indusrty Strategy For Action
Indusrty Strategy For Action
The Cloud Challenge
The Cloud Challenge
Security Trends and Risk Mitigation for the Public Sector
Security Trends and Risk Mitigation for the Public Sector
Security in the Hybrid Cloud at Liberty Mutual
Security in the Hybrid Cloud at Liberty Mutual
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
Presentation security build for v mware
Presentation security build for v mware
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
festival ICT 2013: Difendersi da attacchi mirati e Zero Day
stackconf 2021 | Data Driven Security
stackconf 2021 | Data Driven Security
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
Presentation copy
Presentation copy
Mais de Group of company MUK
Check Point Products RU
Check Point Products RU
Group of company MUK
Check Point Mobile Security
Check Point Mobile Security
Group of company MUK
Check Point Ddos protector
Check Point Ddos protector
Group of company MUK
Check Point: Compliance Blade
Check Point: Compliance Blade
Group of company MUK
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
Group of company MUK
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
Group of company MUK
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
Group of company MUK
Check Point designing a security
Check Point designing a security
Group of company MUK
Check Point 2013
Check Point 2013
Group of company MUK
Check Point appliances brochure 2012
Check Point appliances brochure 2012
Group of company MUK
Check Point Report 2013 RU
Check Point Report 2013 RU
Group of company MUK
3D Security Report
3D Security Report
Group of company MUK
Mais de Group of company MUK
(12)
Check Point Products RU
Check Point Products RU
Check Point Mobile Security
Check Point Mobile Security
Check Point Ddos protector
Check Point Ddos protector
Check Point: Compliance Blade
Check Point: Compliance Blade
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
Check Point designing a security
Check Point designing a security
Check Point 2013
Check Point 2013
Check Point appliances brochure 2012
Check Point appliances brochure 2012
Check Point Report 2013 RU
Check Point Report 2013 RU
3D Security Report
3D Security Report
Último
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
ScyllaDB
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Paige Cruz
Working together SRE & Platform Engineering
Working together SRE & Platform Engineering
Marcus Vechiato
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Skynet Technologies
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
Lorenzo Miniero
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
FIDO Alliance
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
ScyllaDB
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
FIDO Alliance
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Patrick Viafore
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
FIDO Alliance
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
2024 May Patch Tuesday
2024 May Patch Tuesday
Ivanti
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
Pixlogix Infotech
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
GDSC PJATK
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Safe Software
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
IES VE
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
FIDO Alliance
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Mark Opanasiuk
Último
(20)
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Working together SRE & Platform Engineering
Working together SRE & Platform Engineering
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
2024 May Patch Tuesday
2024 May Patch Tuesday
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
Check Point Consolidation
1.
Consolidation: Your Best Move
Towards Stronger Security Avi Rembaum Director, 3D Consulting [Protected] For public distribution ©2013 Check Point Software Technologies Ltd.
2.
Current Threat Vectors Spear Phishing RATs DoS Security
administrators face multiple attacks from the same source that can occur simultaneously or over time Web attacks Zero-day Malware Botnets Network breach SPAM [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 2
3.
Finding The Source
of a Security Incident Is Like… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 3
4.
Average Cost of
a Cyber Crime Attack $8,389,828 $8,933,510 $6,459,362 2010 2011 2012 Source: Ponemon Cost of Cyber Crime Study, October 2012 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 4
5.
What About Spending? According
to 12,396 security professionals, spending on security during 2013 will: Source: ISC(2), 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 5
6.
Are Thing Improving? And
how does the same group of people feel about the success of their work? Source: ISC(2), 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 6
7.
What’s Going On? Security
incidents are becoming more expensive Security professionals doubt their effectiveness But, investment will stay the same or go up [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 7
8.
At some point
we have to realize that just maybe it’s time for a different approach But is this really a new conclusion? Some interesting reading… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 8
9.
When Was This
Written? Malware and other forms of attack continue to be alarmingly effective at eluding in-place safeguards The vulnerability-threat window is continuing to close Equally troublesome is the fact that propagation times for threats are reaching new lows Automated tools continue to lower the bar when it comes to the degree of knowledge required to launch ever more sophisticated attacks The vast armies of “amateur” hackers are increasingly being joined by ranks of “professionals” [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 9
10.
How About 2005? Admit
it – it’s kind of scary that we can tell the same story eight years later [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 10
11.
At The Time,
They Recommended Figure 5 — Unified Threat Defenses Pervasive Perimeters Multilayer Awareness Pervasive Integration Multiservice Security [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 11
12.
What They Were
Really Saying Defense-in-depth is not the same as best-of-breed An example… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 12
13.
IPS Software Blade: Security
Quality Comparison 99.00% NSS 2012 IPS Group Test Competitive Comparison July 2012 97.00% 95.00% 93.00% 91.00% Over-all Protection Client Protections Server Protections 89.00% 87.00% Check Point 12600 SourceFire 3D8120 Fortinet 3240C Palo Alto PA5020 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 13
14.
The reality is
that IPS integrated into the firewall is just as effective, if not better, than stand-alone IPS solutions [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 14
15.
And Comparing Check
Point in 2012 vs. 2013 100.0% 99.5% 99.0% Getting better every year 98.5% 98.0% 97.5% 97.0% 96.5% Over-all Protection Client Protections Server Protections 96.0% 95.5% 95.0% 2012 2013 [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 15
16.
And a look
at costs [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 16
17.
IPS Software Blade: Three-Year
TCO Comparison Comparing Dedicated IPS Appliances to IPS Software Blade $80,000 $72,500 $70,000 $60,000 $50,000 $50,000 $40,000 $30,000 $20,000 $10,000 $13,500 $7,500 $4,500 $0 Dedicated IPS Dedicated IPS Annual Support One-Year TCOSoftware Blade Product Price Three-Year Dedicated IPS IPS Three-Year IPS Software Blade [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 17
18.
What about other security
technologies? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 18
19.
Application Control: Three-Year TCO
Comparison Comparing Dedicated Web Filter Appliances to Application Control Blade $60,000 $50,750 $50,000 $40,000 $35,000 $30,000 $20,000 $13,500 $10,000 $5,250 $4,500 $0 Dedicated Web Filter GatewayGateway Appliance Support Application Control Blade Control Bla Dedicated Web Appliance Three-Year Dedicated Web Gateway Three-YearTCO One-Year Appliance Application [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 19
20.
GRC: Three-Year TCO
Comparison Comparing Dedicated GRC Solutions with the Compliance Blade $90,000 $79,750 $80,000 $70,000 $60,000 $55,000 $50,000 $40,000 $30,000 $25,500 $20,000 $10,000 $8,250 $8,500 $0 Dedicated GRC Product Price Three-Year One-Year 25 Gateway Compliance Blade Blade T Dedicated GRC Solution Support Dedicated GRC TCO Three-Year Compliance [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 20
21.
Sandboxing: Three-Year TCO Comparison Comparing
Dedicated Sandbox Solutions $80,000 $72,500 $70,000 $60,000 $50,000 $50,000 $40,000 $30,000 $20,000 $10,000 $13,500 $7,500 $4,500 $0 Dedicated Sandbox Solution Solution Support Dedicated Sandbox Three-Year DedicatedOne-Year Threat Emulation BladeEmulation Bl Sandbox Solution TCO Threat Three-Year [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 21
22.
Some questions for
you [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 22
23.
Please Raise Your
Hand Question #1: Who here is using IPS Software Blade? Why? What protections? Question #2: Who here is using Anti-Bot? Why? Do you run the controls in protect mode? Question #3: Who here is using SmartEvent? Why? Do you activate automated blocking? [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 23
24.
Today, security solutions
must provide: Multi-layer, integrated protections Real-time, actionable intelligence Adaptive controls [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 24
25.
Why? [Protected] For public
distribution ©2013 Check Point Software Technologies Ltd. 25
26.
Consider The Following
Attack All three attack vectors are meant to breach the perimeter Server vulnerability exploit Weaponized attachment Network access Malware via social engineering Each attack uses a distinct method [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
27.
“Best-of-Breed” During The
Attack Server vulnerability exploit Weaponized attachment Malware via social engineering Dedicated Intrusion Detection Dedicated Sandbox Solution Dedicated Web Proxy Probably not in “prevent” mode Captures and analyzes attachment Sees Facebook and allows data to pass Proprietary Log Proprietary Log Proprietary Log 3rd Party Log Aggregator [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 27
28.
And The Outcome Server vulnerability exploit Weaponized attachment Malware
via social engineering Dedicated Intrusion Detection Dedicated Sandbox Solution Dedicated Web Proxy Server compromised, ad Probably not in min“prevent” mode rights obtained Proprietary Log Captures and analyzes attachment Endpoint Sees Facebook compromised, dat andextracted allows a to passdata Proprietary Log Proprietary Log 3rd Party Log Aggregator [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 28
29.
And Event Management? Sandbox shows different event Log
aggregator collects multiple feeds Each individual event appears separate Full picture and individual events have no relationship [Protected] For public distribution IDS event shows exploit Proxy just sees Facebook ©2013 Check Point Software Technologies Ltd. 29
30.
And Worse Separate signature
updates No sharing of “bad actor” information Multiple policy changes required for mitigation [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 30
31.
And Finally, The
Cost Product Dedicated IDS Dedicated Sandbox Dedicated Web Proxy CAPEX OPEX Three Year Cost $50,000 $7,500 $72,500 $50,000 $7,500 $72,500 $35,000 $5,250 $50,750 Three-Year Total [Protected] For public distribution $195,750 ©2013 Check Point Software Technologies Ltd. 31
32.
Consolidating with Check Point [Protected]
For public distribution ©2013 Check Point Software Technologies Ltd. 32
33.
Starting With The
GUI Key is to build a security flow Policy starts from the ground up Firewall is that ground floor IPS, App Ctrl, Anti-Bot flow from there [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 33
34.
Check Point During
The Attack Centralized updates via the ThreatCloud Server vulnerability exploit Weaponized attachment Malware via social engineering Threat Emulation Anti-Bot Application Control IPS Firewall [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 34
35.
What Administrators Would
See All attack vectors collected into a single perspective Protections report into a single location Tools for high-level and detailed analysis [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 35
36.
And Then… When the
attacker gets desperate and launches a DDoS Use the new DDoS controls and/or CLI the source IPs to the firewall [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 36
37.
Costs With Check
Point Product CAPEX OPEX 12607 (25% Discount) IPS Software Blade $53,760 $10,080 Three Year Cost $84,000 $4,500 $9,000 $4,500 $13,500 $4,500 $9,000 (Included in Year 1) Threat Emulation Application Control (Included in Year 1) Anti-Bot Blade $4,500 Three-Year Total [Protected] For public distribution $13,500 $129,000 ©2013 Check Point Software Technologies Ltd. 37
38.
The Savings $195,750 $135,000 $53,760 $129,000 $75,240 $60,750 Savings Amount: $66,750 Percent:
35% Multiple Vendors Check Point CAPEX OPEX 3 Year Total [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 38
39.
Summary Yes, it’s tempting to
do what’s always been done: Multi-vendor Data suggest that it’s time for an alternative approach: Consolidation [Protected] For public distribution Check Point’s multi-layer threat prevention makes it work ©2013 Check Point Software Technologies Ltd. 39