SlideShare uma empresa Scribd logo
1 de 39
Check Point
SMB Proposition:
Small Size. Big Security

Ofer Or
April 2013

©2013 Check Point Software Technologies Ltd.
KEY INSIGHTS FROM
CHECK POINT 2013
SECURITY REPORT

©2013 Check Point Software Technologies Ltd.

2
63%

of organizations are infected
with bots

63%

©2013 Check Point Software Technologies Ltd.

3
In

75%

of organizations, a host accesses
a malicious website

75%

Source: Check Point 2013 Security Report
©2013 Check Point Software Technologies Ltd.

4
In

61%

of organizations, a P2P file
sharing application is used

72 % APAC

62 % Americas

55 % EMEA

61%

Source: Check Point 2013 Security Report
©2013 Check Point Software Technologies Ltd.

5
So what does it
mean for SMBs?

©2013 Check Point Software Technologies Ltd.

6
Cyber-Security is important for defense contractors,
and critical infrastructure…Right?

©2013 Check Point Software Technologies Ltd.

7
I’m too small…
Why should hackers attack me…Right?

©2013 Check Point Software Technologies Ltd.

8
My company is OK…we’ve got security! Right?

©2013 Check Point Software Technologies Ltd.

9
77%

of SMBs think their company is
safe from cyber threats

77%

Source: NCSA National Small Business Study 2012
©2013 Check Point Software Technologies Ltd.

10
SMBs don’t think they’re a target for cyber-attacks
Why do you not consider cyber-attacks a
serious threat to your company?
We are too small to be targeted for an attack

47%

We protect our business
Other

50%

7%

Source: SMB Threat Awareness Poll 2012
©2013 Check Point Software Technologies Ltd.

11
So we’re good…
Right?

©2013 Check Point Software Technologies Ltd.

12
Cost of Data Breach (in $M)
$8.93

$5.95
$5.15
$3.25

$3.39

UK

AU

JP

DE

US

Source: 2012 Cost of Cyber Security Study, Ponemon Institute
©2013 Check Point Software Technologies Ltd.

13
67%

of reported data breaches were at
companies with 11-100 employees

“Smaller businesses
are an ideal target for
cyber raids, and cyber
criminals understand
this very well…

”

67%

Source: Verizon Data Breach Investigation Report 2012
©2013 Check Point Software Technologies Ltd.

14
90%

of SMBs do not have a
professional IT Manager

90%

Source: NCSA National Small Business Study 2012
©2013 Check Point Software Technologies Ltd.

15
70%

of SMBs do not provide any Internet
Safety training to employees

70%

Source: NCSA National Small Business Study 2012
©2013 Check Point Software Technologies Ltd.

16
SMBs represent the best ROI for cyber-criminals

Enterprise

Value of
information
(in $)

SMB

Sweet-spot

Consumer

Level of protection

©2013 Check Point Software Technologies Ltd.

17
So what should
SMBs do?

©2013 Check Point Software Technologies Ltd.

18
Essential Security Tools for SMBs

1

Network Firewall
©2013 Check Point Software Technologies Ltd.

19
Essential Security Tools for SMBs

2

Threat Prevention & Anti-Malware Solutions
©2013 Check Point Software Technologies Ltd.

20
Essential Security Tools for SMBs

3

Educate & Involve the End User
©2013 Check Point Software Technologies Ltd.

21
New Check Point 600

C o m i n g S o o n t o T h e a t e r s N e a r Yo u

©2013 Check Point Software Technologies Ltd.

22
Network Firewall

A Firewall is only as good as its Security Configuration
Simple
activation
of security
policy
Easily see
what
security
functions
are in use

©2013 Check Point Software Technologies Ltd.

23
Threat Prevention & Anti-Malware

Threat Prevention setup by non-experts in seconds

Add
exceptions
if needed

Default
policies
based
on best
practices
for easy
setup

©2013 Check Point Software Technologies Ltd.

24
User Education & Involvement

Security needs to educate and engage end-users

www.flickr.com

Educate
users on
risk and
Internet
usage
policies

Make
control
more
practical

©2013 Check Point Software Technologies Ltd.

25
and also featuring…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

26
Secured Guest Wireless Network

©2013 Check Point Software Technologies Ltd.

27
3G Modem Support (USB/ExpressCard)

©2013 Check Point Software Technologies Ltd.

28
…and Cloud-based Management Service

Security Policy
Configuration and updates

©2013 Check Point Software Technologies Ltd.

29
Check Point 600 Appliance

Small Size. BIG Security.

©2013 Check Point Software Technologies Ltd.

30
C O M I N G SOON
SOON
COMING

©2013 Check Point Software Technologies Ltd.

31
Thank you!

©2013 Check Point Software Technologies Ltd.
Introducing

New Check Point 600
©2013 Check Point Software Technologies Ltd.

33
New Check Point 600

©2013 Check Point Software Technologies Ltd.

34
©2013 Check Point Software Technologies Ltd.

35
Easy & Intuitive Local Management
Blade Activation

Policy Configuration

Event Monitoring

©2013 Check Point Software Technologies Ltd.

36
©2013 Check Point Software Technologies Ltd.

37
Network Firewall

A Firewall is only as good as its Security Configuration

©2013 Check Point Software Technologies Ltd.

38
User Education & Involvement

Security needs to educate and engage end-users

www.netflix.com

Educate
users on
risk and
Internet
usage
policies

Make
control
more
practical

©2013 Check Point Software Technologies Ltd.

39

Mais conteúdo relacionado

Mais procurados

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10MarketingArrowECS_CZ
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problemNathan Burke
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 

Mais procurados (19)

Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problem
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 

Semelhante a Check Point SMB Proposition

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 
Controle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDCControle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDCThierry TROUIN ☁
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020TestingXperts
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Avantika University
 

Semelhante a Check Point SMB Proposition (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
16231
1623116231
16231
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Controle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDCControle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDC
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
 

Mais de Group of company MUK

Mais de Group of company MUK (16)

Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Último

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 

Último (20)

Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 

Check Point SMB Proposition

  • 1. Check Point SMB Proposition: Small Size. Big Security Ofer Or April 2013 ©2013 Check Point Software Technologies Ltd.
  • 2. KEY INSIGHTS FROM CHECK POINT 2013 SECURITY REPORT ©2013 Check Point Software Technologies Ltd. 2
  • 3. 63% of organizations are infected with bots 63% ©2013 Check Point Software Technologies Ltd. 3
  • 4. In 75% of organizations, a host accesses a malicious website 75% Source: Check Point 2013 Security Report ©2013 Check Point Software Technologies Ltd. 4
  • 5. In 61% of organizations, a P2P file sharing application is used 72 % APAC 62 % Americas 55 % EMEA 61% Source: Check Point 2013 Security Report ©2013 Check Point Software Technologies Ltd. 5
  • 6. So what does it mean for SMBs? ©2013 Check Point Software Technologies Ltd. 6
  • 7. Cyber-Security is important for defense contractors, and critical infrastructure…Right? ©2013 Check Point Software Technologies Ltd. 7
  • 8. I’m too small… Why should hackers attack me…Right? ©2013 Check Point Software Technologies Ltd. 8
  • 9. My company is OK…we’ve got security! Right? ©2013 Check Point Software Technologies Ltd. 9
  • 10. 77% of SMBs think their company is safe from cyber threats 77% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 10
  • 11. SMBs don’t think they’re a target for cyber-attacks Why do you not consider cyber-attacks a serious threat to your company? We are too small to be targeted for an attack 47% We protect our business Other 50% 7% Source: SMB Threat Awareness Poll 2012 ©2013 Check Point Software Technologies Ltd. 11
  • 12. So we’re good… Right? ©2013 Check Point Software Technologies Ltd. 12
  • 13. Cost of Data Breach (in $M) $8.93 $5.95 $5.15 $3.25 $3.39 UK AU JP DE US Source: 2012 Cost of Cyber Security Study, Ponemon Institute ©2013 Check Point Software Technologies Ltd. 13
  • 14. 67% of reported data breaches were at companies with 11-100 employees “Smaller businesses are an ideal target for cyber raids, and cyber criminals understand this very well… ” 67% Source: Verizon Data Breach Investigation Report 2012 ©2013 Check Point Software Technologies Ltd. 14
  • 15. 90% of SMBs do not have a professional IT Manager 90% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 15
  • 16. 70% of SMBs do not provide any Internet Safety training to employees 70% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 16
  • 17. SMBs represent the best ROI for cyber-criminals Enterprise Value of information (in $) SMB Sweet-spot Consumer Level of protection ©2013 Check Point Software Technologies Ltd. 17
  • 18. So what should SMBs do? ©2013 Check Point Software Technologies Ltd. 18
  • 19. Essential Security Tools for SMBs 1 Network Firewall ©2013 Check Point Software Technologies Ltd. 19
  • 20. Essential Security Tools for SMBs 2 Threat Prevention & Anti-Malware Solutions ©2013 Check Point Software Technologies Ltd. 20
  • 21. Essential Security Tools for SMBs 3 Educate & Involve the End User ©2013 Check Point Software Technologies Ltd. 21
  • 22. New Check Point 600 C o m i n g S o o n t o T h e a t e r s N e a r Yo u ©2013 Check Point Software Technologies Ltd. 22
  • 23. Network Firewall A Firewall is only as good as its Security Configuration Simple activation of security policy Easily see what security functions are in use ©2013 Check Point Software Technologies Ltd. 23
  • 24. Threat Prevention & Anti-Malware Threat Prevention setup by non-experts in seconds Add exceptions if needed Default policies based on best practices for easy setup ©2013 Check Point Software Technologies Ltd. 24
  • 25. User Education & Involvement Security needs to educate and engage end-users www.flickr.com Educate users on risk and Internet usage policies Make control more practical ©2013 Check Point Software Technologies Ltd. 25
  • 26. and also featuring… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
  • 27. Secured Guest Wireless Network ©2013 Check Point Software Technologies Ltd. 27
  • 28. 3G Modem Support (USB/ExpressCard) ©2013 Check Point Software Technologies Ltd. 28
  • 29. …and Cloud-based Management Service Security Policy Configuration and updates ©2013 Check Point Software Technologies Ltd. 29
  • 30. Check Point 600 Appliance Small Size. BIG Security. ©2013 Check Point Software Technologies Ltd. 30
  • 31. C O M I N G SOON SOON COMING ©2013 Check Point Software Technologies Ltd. 31
  • 32. Thank you! ©2013 Check Point Software Technologies Ltd.
  • 33. Introducing New Check Point 600 ©2013 Check Point Software Technologies Ltd. 33
  • 34. New Check Point 600 ©2013 Check Point Software Technologies Ltd. 34
  • 35. ©2013 Check Point Software Technologies Ltd. 35
  • 36. Easy & Intuitive Local Management Blade Activation Policy Configuration Event Monitoring ©2013 Check Point Software Technologies Ltd. 36
  • 37. ©2013 Check Point Software Technologies Ltd. 37
  • 38. Network Firewall A Firewall is only as good as its Security Configuration ©2013 Check Point Software Technologies Ltd. 38
  • 39. User Education & Involvement Security needs to educate and engage end-users www.netflix.com Educate users on risk and Internet usage policies Make control more practical ©2013 Check Point Software Technologies Ltd. 39

Notas do Editor

  1. http://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdfCost == direct, indirect and opportunity costs that resulted from the loss or theft of information, disruption to business operations, revenue loss and destruction of property, plant and equipment. In addition to external consequences of the cyber crime, the analysis attempted to capture the total cost spent on detection, investigation, incident response, containment, recovery and after-the-fact or “ex-post” response.
  2. SMBs are attractive targets for cyber criminals. Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users.
  3. http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  4. http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  5. http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  6. Inspired by: http://www.istockphoto.com/stock-photo-19680099-cloud-computing-services.php?st=eb02dbc