SlideShare uma empresa Scribd logo
1 de 55
Baixar para ler offline
1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd.
Advanced and Agile Threat Prevention Security for
Private Cloud Data Centers
CISCO AND CHECK POINT: JOINT
SOLUTION ARCHITECTURE AND USE CASES
May 16, 2017
2©2017 Check Point Software Technologies Ltd.
Ahmed Dessouki
Product Manager
Cisco Insieme Business Unit
Krish Subramanian
Product Marketing Manager
Check Point Software Technologies
TODAY’S SPEAKERS
3©2017 Check Point Software Technologies Ltd.
• Ecosystem Overview
• Joint Architecture Overview
• Features and Benefits
• Deployment Use Cases
• Roadmap
• Demo
• Q&A
Agenda
4©2017 Check Point Software Technologies Ltd.
CISCO ACI SOLUTION OVERVIEW
PRIVATE CLOUD DATA
CENTERS BUILT ON
SOFTWARE DEFINED
NETWORKING (SDN)
5©2017 Check Point Software Technologies Ltd.
Cisco Insieme Business Unit Vision
1
2
3
6©2017 Check Point Software Technologies Ltd.
Strong Momentum in the Marketplace
ECOSYSTEM PARTNERS
Nexus 9K
Customers Globally
ACI
Customers
Ecosystem
Partners
10,800+ 65+3,100+
Business
Run Rate
$3B
The network is not
responsive
No network
automation
Turn-key automated
DC fabric
Business Problem Technical Problem Solution
Security / services are way
behind
L4-7 configuration /
forwarding is manual and
per-device
Integrate L4-7 stitching
into network automation
SLAs aren’t being met
No direct mapping of app
requirements to network
forwarding
Automate forwarding /
policy based on application
requirements
App Based Automation
Automated L4-7 Services
Turn-key network automation
9©2017 Check Point Software Technologies Ltd.
What’s the Problem?
Logical Device Cluster
Web App
• Prior to Service Graph, deploying services has been very error prone:
VLAN mismatch between
hypervisor & switch?
Firewall/Load Balancer/SSL
misconfiguration?
VLAN allocation?
VLAN missing?
Trunk not configured properly?
Physical or Virtual L4-L7 Devices
10©2017 Check Point Software Technologies Ltd.
With Service Graph
Web App
ACI Fabric
Device automation
Network
automation
EPG
App
Service Graph
EPG
Web Contract
Logical Device Cluster
Physical or Virtual L4-L7 Devices
11©2017 Check Point Software Technologies Ltd.
• APIC 2.0 or later
• Use case: Inspect all OR specific traffic by FW
Policy Based Redirect (PBR)
Overview
EPG Client EPG Web
Only HTTP traffic is redirected to FW, and
then forwarded onto Web endpoint by FW
Other traffic permitted by contract are
going to Web endpoint directly.
EPG
Client
EPG
WebContract
Redirect
providerconsumer
Traffic from client
Policy applied (PBR)
Return traffic
Policy applied (PBR)
12©2017 Check Point Software Technologies Ltd.
Copy Service
Overview
• APIC 2.0
• Service Graph is mandatory and EX hardware is required
• Copy specific traffic
EPG Client EPG Web
Traffic is copied to IDS
Original traffic goes to
Web endpoint directly.
EPG
Client
EPG
WebContract
Copy
providerconsumer
IDS
13©2017 Check Point Software Technologies Ltd.
EPG
Web
EPG
Client
192.168.1.254
Self_IP: 172.16.10.1/24
Default GW: 172.16.10.254/24
172.16.10.254 192.168.2.254
VRF1
All BDs are in same VRF
BD1 BD2BD:
ADCSvcBD
IP: 192.168.1.100
Default GW: 192.168.1.254
IP: 192.168.2.200
Default GW: 192.168.2.254
EPG
Client
EPG
Web
Contract
Redirect
providerconsumer
Return traffic
Policy applied (PBR)
ACI ADC Design
One-arm with PBR
SNAT is not required and server
sees real client IP
ADC
VIP:
172.16.10.200
Incoming Traffic
Source: 192.168.1.100
Dest: 172.16.10.200 (VIP)
Return Traffic
Source: 192.168.2.200
Dest: 192.168.1.100
14©2017 Check Point Software Technologies Ltd.
• APIC dynamically detect new endpoint, then the endpoint is automatically
added to the pool member of VIP
Dynamic Attach Endpoint
EPG
Web
192.168.1.1
VIP Web-Pool
192.168.1.2
New
192.168.1.3
New
EPG
Client
15©2017 Check Point Software Technologies Ltd.
Device Packages
• Service functions are added to APIC through
device package
• Device Package contains a device model and
device python scripts
• Script can interface with the device using REST,
SSH or any mechanism
Device Package
Configuration Model (XML File)
Python Scripts
APIC
Configuration Model
Device Interface: REST/CLI
APIC Script Interface
Python Scripts
Script Engine
APIC Policy Manager
Service Device
16©2017 Check Point Software Technologies Ltd.
ServiceManagerModeServicePolicyMode
• Full L2-L7 automation with
operational flexibility
• Joint management of L4-L7
service devices through Cisco
APIC and a service device
controller
• APIC manages a subset of
features
• Centralized single point of
management for full L2-L7
Service Automation
• APIC manages fabric and
network services
Multiple Operational Modes
L4- L7 Device
Package
Service Cluster
Manager
L4- L7 Device
Package
for Integrated L4-L7 Services Automation
NetworkPolicyMode
• Centralized network automation
L2-L3 (service stitching)
• EPG model or unmanaged service
graphs
Service Cluster
Manager
No Device Package
17©2017 Check Point Software Technologies Ltd.
L4-L7 Service Automation – Support for All Devices
Service Manager Mode General Concept
44
Service device keeps full native functions
and customizable parameters available
3 Deploy L4-7
Configuration
3Deploy L2-3
Configuration
1 Create Template
Service Device Controller
2
Associate template with
service graph
18©2017 Check Point Software Technologies Ltd.
Why Service Manager Mode?
Preserve
Administrative
Boundaries
Deploy
Apps
Faster
Maintain
L2-L7
Automation
Operational
Flexibility
19©2017 Check Point Software Technologies Ltd.
CHECK POINT AND CISCO ACI JOINT
SOLUTION ARCHITECTURE
WHY DO WE NEED AGILE AND
ADVANCED SECURITY INSIDE THE
PRIVATE CLOUD DATA CENTER?
20©2017 Check Point Software Technologies Ltd.
VIRTUAL DATA CENTER HYBRID CLOUD
• Manual operation
• On premises
• Automation & Orchestration
• Software Defined Network
DATA CENTER EVOLUTION
21©2017 Check Point Software Technologies Ltd.
PRIVATE CLOUD SECURITY REQUIREMENTS
Increasing sophistication of threats & malware
Consistent protections and policy management
Consolidated visibility, logging and reporting
Sacrificing speed and agility for security
Lateral spread of threats
22©2017 Check Point Software Technologies Ltd.
Chain of events:
1. Admin used infected laptop to manage
the virtual webserver in the cloud
2. Virtual webserver got infected
3. Oracle released new security patch
4. Infection moved from webserver to
unpatched Oracle servers
1.5M MEDICAL RECORDS EXPOSED FROM PUBLIC
IaaS DATABASE
23©2017 Check Point Software Technologies Ltd.
CHALLENGE #1:
PRIVATE CLOUD IS ALREADY SECURE, WHY DO I
NEED ADDITIONAL SECURITY?
Perception:
• Security handled by perimeter gateway
and network layers
• Segmentation or isolation = security
Network layer provides segmentation and basic
firewall capability
Data isolation does not protect against malware or
other threats
24©2017 Check Point Software Technologies Ltd.
• Perimeter Gateway doesn’t
protect traffic inside the data
center
• Lack of security between
virtual and physical
applications
LATERAL THREATS INSIDE THE DATA CENTER
25©2017 Check Point Software Technologies Ltd.
• New applications provisioned rapidly
• Virtual-app movement
• Change in IP address
• Unpatched dormant VMs that wakes up
TRADITIONAL STATIC SECURITY FAIL TO PROTECT
DYNAMIC DATACENTER
26©2017 Check Point Software Technologies Ltd.
TOP OPERATIONAL CHALLENGES IN LEGACY
DATA CENTERS Cumbersome Ongoing Maintenance
• Deploying & Maintaining
Security Gateways using
traditional networking is:
̶ Complex
̶ Time consuming
̶ Error prone
Traditional networks require Security Gateways to provide networking functions
in addition to security – increasing operational complexity
27©2017 Check Point Software Technologies Ltd.
SOLUTION:
ADVANCED SECURITY PROTECTS CUSTOMER
ASSETS IN THE PRIVATE CLOUD
Advanced security methods in Private Clouds:
• Prevent threats within Private Clouds
− Comprehensive protections to prevent breaches and data loss
• Security Groups with Advanced Threat Prevention:
− Fine-tuned policies and layered protections (Firewall, IPS,
Anti-Virus, AntiBot, and more)
− Security achieved between segments and hosts/VM’s using
network firewall and automated traffic redirection and
service insertion/chaining
28©2017 Check Point Software Technologies Ltd.
CHALLENGE #2:
NETWORK SECURITY SOLUTIONS DON’T FIT IN
PRIVATE CLOUD ARCHITECTURES
Perception:
• Environment is too dynamic
− Rapid adding/removing of VMs, subnets etc.
• Network security solutions single point of failure
/ don’t support HA configuration / cannot scale
automatically / not virtualized
• Traditional perimeter based security and
segmentation is limited
29©2017 Check Point Software Technologies Ltd.
• Operate in HA mode in cloud
• Clusters Within Private Cloud Data Center
• Multi-pod
• Security policies updated automatically
• Auto-discovery of cloud assets (new VM’s ,
subnets, EPG’s) reflected in automated
policy updates
• R80 Automation and Orchestration with
REST API’s
• Deployed in Private cloud Data Center
• Physical and Virtual appliance
• Automated service insertion and chaining
• Integrates with Private Cloud fabric
• Integrates with other L4-L7 services in
private cloud
• Supports both service insertion modes :
Service Manager and Network Policy
SOLUTION:
NETWORK SECURITY FITS IN PRIVATE CLOUD
30©2017 Check Point Software Technologies Ltd.
PROTECTING DATA & APPS IN
PRIVATE CLOUDS
INTRODUCING CHECK POINT VSEC :
A NEW APPROACH TO SECURITY IN DATA CENTERS
31©2017 Check Point Software Technologies Ltd.
ADVANCED THREAT PREVENTION
AND VISIBILITY FOR THE PRIVATE CLOUD
©2016 Check Point Software Technologies Ltd.
+
32©2017 Check Point Software Technologies Ltd.
CHECK POINT VSEC FOR CISCO ACI
Advanced threat prevention and visibility for the private cloud
s
Complete threat visibility
and controls
Automated security provisioning
and policy orchestrations
Automatic insertion of advanced
threat prevention gateways
33©2017 Check Point Software Technologies Ltd.
CHECK POINT VSEC FOR CISCO ACI
Solution Components
vSEC GATEWAY
• Comprehensive protections
including: Firewall, IPS,
AntiBot, AntiVirus, VPN, DLP
and SandBlast Zero-Day
Protections
• Secure traffic between
applications in the private
cloud
• Physical and Virtual appliance
vSEC CONTROLLER
• Automated security with
unified management
• Context-aware policies and logs
leveraging ACI defined objects
• Consolidated logging and
reporting across private, public
and hybrid clouds, physical and
virtual appliances
vSEC Device
Package for APIC
• Check Point plug-
in for the APIC
34©2017 Check Point Software Technologies Ltd.
CHECK POINT VIRTUAL AND PHYSICAL
SECURITY APPLIANCES
A single virtual or physical Security Gateway hosts multiple automatically
provisioned security instances inserted to the ACI fabric in every scale
Datacenters &
High End
Enterprises
23000 Appliances
Enterprises
15000 Appliances
Small Enterprises
5000 Appliances
Virtual Appliances
35©2017 Check Point Software Technologies Ltd.
ADVANCED THREAT PREVENTION LATERAL
MOVEMENT OF THREATS
vSEC Gateway prevent lateral threat movement between applications inside
hybrid clouds
Advanced Threat
Prevention Security
36©2017 Check Point Software Technologies Ltd.
​USE CHECK POINT SMART MANAGEMENT WITH VSEC
CONTROLLER TO AUTOMATE YOUR SECURITY
vSEC Controller
Check Point Smart Center
37©2017 Check Point Software Technologies Ltd.
Check Point Access Policy
Rule From To Application Action
3 Finance_App1
(vCenter Object)
SAP
(ACI End Point Group)
MSSQL Allow
4 USER_ID
(AD object)
Finance_Group
(Openstack group)
CRM Allow
APPLICATION-AWARE POLICY
TIED TO CISCO ACI & CLOUD MANAGEMENT
38©2017 Check Point Software Technologies Ltd.
LOGS ENRICHED WITH CISCO ACI OBJECTS
4800
12400
Infected Server
Identify Severity Date
SAP
(ACI App)
High 3:22:12 2/4/2016
WEB
(ACI EPG)
High 5:22:12 2/4/2016
VM_AD_15
(vCenter object)
Medium 5:28:12 2/4/2016
Check Point SmartEvent
39©2017 Check Point Software Technologies Ltd.
COMPLETE THREAT VISIBILITY AND CONTROL
• Security operational efficiency with
consistent policy across East-West and
North-South traffic
• Forensics analysis inside your
datacenter with unified logs and reports
• Physical and virtual vSEC gateways
40©2017 Check Point Software Technologies Ltd.
UNIFIED VISIBILITY
UNIFIED MANAGEMENT
41©2017 Check Point Software Technologies Ltd.
SECURITY AS DYNAMIC AS THE PRIVATE
CLOUD
• Full Support for automated service
insertion/chaining and provisioning,
Enhanced PBR and dynamic routing
support, IPv6, multi-pod
• Security policy based on EPG’s and
micro EPG’s - microsegmentation
• Physical and virtual appliances
• Supports Service Manager Mode and
Network Policy Mode
42©2017 Check Point Software Technologies Ltd.
Reference Architecture
• Check Point vSEC protects assets
in Cisco ACI data centers
• Complete Reference Architecture
• Deployment Scenarios and Demo
– YouTube video
• End Point Groups and lateral
threat prevention
• Service insertion modes
• Dynamic Peer routing
• Multi-pod
CHECK POINT VSEC FOR CISCO ACI
43©2017 Check Point Software Technologies Ltd.
APIC SERVICE INSERTION AUTOMATION
Physical or virtual device is connected to the
ACI fabric
Logical device representing Check Point’s
concrete device – physical or virtual VSX
Security Gateway is configured
Check Point management receives render
command from Cisco APIC, instantiate the
Virtual System and configures it automatically
Check Point Management installs the security
policy automatically on the Virtual System
Service graph is created on APIC and specific
device parameters are configured
APIC generates a render command to the
Management Server
1
2
5
63
4
44©2017 Check Point Software Technologies Ltd.
Reference Architecture
• Auto-discovery of ACI defined
objects
• Leverages ACI objects like EPG’s
in security policies and logs
• Policies updated in real-time
• Improved visibility and forensics
ACI CLOUD OBJECT DISCOVERY WITH VSEC
45©2017 Check Point Software Technologies Ltd.
ROADMAP
46©2017 Check Point Software Technologies Ltd.
ROADMAP
• PBR ( Policy based redirect) in all service modes,
Ability to absorb micro EPG’s, Dynamic peer-peer
routing, IPv6 , Support for R80.10 on VSX and vSEC
gateways, multi-pod support (available in upcoming
release)
• Tagging of infected VM’s for isolation/remediation
• Check Point apps in Cisco ACI AppCenter
47©2017 Check Point Software Technologies Ltd.
CUSTOMER SUCCESSES WITH
CISCO ACI AND CHECK POINT
48©2017 Check Point Software Technologies Ltd.
Customer modernized their Data Center network &
security infrastructure.
Leveraged VSLS technology, multiple cluster members and
cross-site clustering, Check Point expertise and trusted
advisor role.
Aviation industry player achieves better TCO
with joint Cisco ACI and Check Point solution
Joint solution supported the best security, better segmentation
and consolidation of workloads with minimal downtime during
the transition to private cloud.
Customer improves security posture recognizing Check Point’s
industry leading security, innovation and experience in the
banking sector
Leveraged the existing investment in Check Point, resources and
training.
Customer leverages vSEC controller’s comprehensive
integration with ACI and R80 APIs for automation
Achieved better TCO using unified policy that utilizes ACI
objects in security policy
Leveraged existing Check Point infrastructure including
Multi-Domain Manager.
Financial Services industry player transforms
app delivery with Cisco ACI and Check Point
Banking industry players cements future needs
with app-centric secure hybrid infrastructure
CUSTOMER SUCCESSES
Healthcare industry player gains Scalability and
Security with private cloud architecture
49©2017 Check Point Software Technologies Ltd.
SUMMARY
50©2017 Check Point Software Technologies Ltd.
CHECK POINT vSEC FOR CISCO ACI
s
Complete threat visibility
and controls
Automated security provisioning
and policy orchestrations
Prevent lateral movement of
threats between cloud applications
Advanced threat prevention and visibility for the private cloud
51©2017 Check Point Software Technologies Ltd.
SUMMARY: WHY CHECK POINT VSEC FOR CISCO ACI?
Unified Management for Physical and Virtual Environments
Lateral Threat Prevention Inside the Data Center
Automated, Adaptive and Scalable Security
Advanced Threat Prevention for Cisco ACI Data Centers
52©2017 Check Point Software Technologies Ltd.
MORE INFORMATION - RESOURCES
• Check Point vSEC for Cisco ACI product page and collateral
• Check Point vSEC for ACI joint solution brief
• Cisco ACI L4-L7 Partner Compatibility Matrix
• vSEC on Cisco Marketplace for Technology Solutions
• Check Point Reference Architectures for Cisco ACI
• Cisco ACI and Check Point vSEC Deployment Scenarios and Demo - video
• Check Point vSEC Device Package for ACI
• Check Point SmartConsole integration with ACI - video
53©2017 Check Point Software Technologies Ltd.
HOW EASY IS IT DEPLOY VSEC IN
CISCO ACI?
DEMO
54©2017 Check Point Software Technologies Ltd.
• Krish Subramanian – Product Marketing Manager, Check Point - ksubrama@checkpoint.com
• Ahmed Dessouki - Product Manager, Cisco - ahdessou@cisco.com
Q
A
55©2017 Check Point Software Technologies Ltd.
THANK YOU

Mais conteúdo relacionado

Mais procurados

Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...MarketingArrowECS_CZ
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Moti Sagey מוטי שגיא
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey מוטי שגיא
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionMarketingArrowECS_CZ
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksDevOps.com
 

Mais procurados (20)

Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
Check Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- DetailedCheck Point Solutions Portfolio- Detailed
Check Point Solutions Portfolio- Detailed
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 

Semelhante a Check Point and Cisco: Securing the Private Cloud

Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionMarketingArrowECS_CZ
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Canada
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudControlCase
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...MarketingArrowECS_CZ
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with merakiCisco Canada
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceThousandEyes
 
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceEMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceThousandEyes
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes WebinarThousandEyes
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceThousandEyes
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dcCisco Canada
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceThousandEyes
 
Optimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWSOptimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWSDevOps.com
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxEBERTE
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Scott Sims
 

Semelhante a Check Point and Cisco: Securing the Private Cloud (20)

Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 
PCI DSS Compliance in the Cloud
PCI DSS Compliance in the CloudPCI DSS Compliance in the Cloud
PCI DSS Compliance in the Cloud
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
 
Cisco connect winnipeg 2018 simply powerful networking with meraki
Cisco connect winnipeg 2018   simply powerful networking with merakiCisco connect winnipeg 2018   simply powerful networking with meraki
Cisco connect winnipeg 2018 simply powerful networking with meraki
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
 
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceEMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
EMEA Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
What is ThousandEyes Webinar
What is ThousandEyes WebinarWhat is ThousandEyes Webinar
What is ThousandEyes Webinar
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Cisco connect montreal 2018 secure dc
Cisco connect montreal 2018    secure dcCisco connect montreal 2018    secure dc
Cisco connect montreal 2018 secure dc
 
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid WorkforceOptimizing and Troubleshooting Digital Experience for a Hybrid Workforce
Optimizing and Troubleshooting Digital Experience for a Hybrid Workforce
 
Optimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWSOptimize your CI/CD with GitLab and AWS
Optimize your CI/CD with GitLab and AWS
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016Brocade Software Networking Presentation at Interface 2016
Brocade Software Networking Presentation at Interface 2016
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Último (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Check Point and Cisco: Securing the Private Cloud

  • 1. 1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd. Advanced and Agile Threat Prevention Security for Private Cloud Data Centers CISCO AND CHECK POINT: JOINT SOLUTION ARCHITECTURE AND USE CASES May 16, 2017
  • 2. 2©2017 Check Point Software Technologies Ltd. Ahmed Dessouki Product Manager Cisco Insieme Business Unit Krish Subramanian Product Marketing Manager Check Point Software Technologies TODAY’S SPEAKERS
  • 3. 3©2017 Check Point Software Technologies Ltd. • Ecosystem Overview • Joint Architecture Overview • Features and Benefits • Deployment Use Cases • Roadmap • Demo • Q&A Agenda
  • 4. 4©2017 Check Point Software Technologies Ltd. CISCO ACI SOLUTION OVERVIEW PRIVATE CLOUD DATA CENTERS BUILT ON SOFTWARE DEFINED NETWORKING (SDN)
  • 5. 5©2017 Check Point Software Technologies Ltd. Cisco Insieme Business Unit Vision 1 2 3
  • 6. 6©2017 Check Point Software Technologies Ltd. Strong Momentum in the Marketplace ECOSYSTEM PARTNERS Nexus 9K Customers Globally ACI Customers Ecosystem Partners 10,800+ 65+3,100+ Business Run Rate $3B
  • 7. The network is not responsive No network automation Turn-key automated DC fabric Business Problem Technical Problem Solution Security / services are way behind L4-7 configuration / forwarding is manual and per-device Integrate L4-7 stitching into network automation SLAs aren’t being met No direct mapping of app requirements to network forwarding Automate forwarding / policy based on application requirements
  • 8. App Based Automation Automated L4-7 Services Turn-key network automation
  • 9. 9©2017 Check Point Software Technologies Ltd. What’s the Problem? Logical Device Cluster Web App • Prior to Service Graph, deploying services has been very error prone: VLAN mismatch between hypervisor & switch? Firewall/Load Balancer/SSL misconfiguration? VLAN allocation? VLAN missing? Trunk not configured properly? Physical or Virtual L4-L7 Devices
  • 10. 10©2017 Check Point Software Technologies Ltd. With Service Graph Web App ACI Fabric Device automation Network automation EPG App Service Graph EPG Web Contract Logical Device Cluster Physical or Virtual L4-L7 Devices
  • 11. 11©2017 Check Point Software Technologies Ltd. • APIC 2.0 or later • Use case: Inspect all OR specific traffic by FW Policy Based Redirect (PBR) Overview EPG Client EPG Web Only HTTP traffic is redirected to FW, and then forwarded onto Web endpoint by FW Other traffic permitted by contract are going to Web endpoint directly. EPG Client EPG WebContract Redirect providerconsumer Traffic from client Policy applied (PBR) Return traffic Policy applied (PBR)
  • 12. 12©2017 Check Point Software Technologies Ltd. Copy Service Overview • APIC 2.0 • Service Graph is mandatory and EX hardware is required • Copy specific traffic EPG Client EPG Web Traffic is copied to IDS Original traffic goes to Web endpoint directly. EPG Client EPG WebContract Copy providerconsumer IDS
  • 13. 13©2017 Check Point Software Technologies Ltd. EPG Web EPG Client 192.168.1.254 Self_IP: 172.16.10.1/24 Default GW: 172.16.10.254/24 172.16.10.254 192.168.2.254 VRF1 All BDs are in same VRF BD1 BD2BD: ADCSvcBD IP: 192.168.1.100 Default GW: 192.168.1.254 IP: 192.168.2.200 Default GW: 192.168.2.254 EPG Client EPG Web Contract Redirect providerconsumer Return traffic Policy applied (PBR) ACI ADC Design One-arm with PBR SNAT is not required and server sees real client IP ADC VIP: 172.16.10.200 Incoming Traffic Source: 192.168.1.100 Dest: 172.16.10.200 (VIP) Return Traffic Source: 192.168.2.200 Dest: 192.168.1.100
  • 14. 14©2017 Check Point Software Technologies Ltd. • APIC dynamically detect new endpoint, then the endpoint is automatically added to the pool member of VIP Dynamic Attach Endpoint EPG Web 192.168.1.1 VIP Web-Pool 192.168.1.2 New 192.168.1.3 New EPG Client
  • 15. 15©2017 Check Point Software Technologies Ltd. Device Packages • Service functions are added to APIC through device package • Device Package contains a device model and device python scripts • Script can interface with the device using REST, SSH or any mechanism Device Package Configuration Model (XML File) Python Scripts APIC Configuration Model Device Interface: REST/CLI APIC Script Interface Python Scripts Script Engine APIC Policy Manager Service Device
  • 16. 16©2017 Check Point Software Technologies Ltd. ServiceManagerModeServicePolicyMode • Full L2-L7 automation with operational flexibility • Joint management of L4-L7 service devices through Cisco APIC and a service device controller • APIC manages a subset of features • Centralized single point of management for full L2-L7 Service Automation • APIC manages fabric and network services Multiple Operational Modes L4- L7 Device Package Service Cluster Manager L4- L7 Device Package for Integrated L4-L7 Services Automation NetworkPolicyMode • Centralized network automation L2-L3 (service stitching) • EPG model or unmanaged service graphs Service Cluster Manager No Device Package
  • 17. 17©2017 Check Point Software Technologies Ltd. L4-L7 Service Automation – Support for All Devices Service Manager Mode General Concept 44 Service device keeps full native functions and customizable parameters available 3 Deploy L4-7 Configuration 3Deploy L2-3 Configuration 1 Create Template Service Device Controller 2 Associate template with service graph
  • 18. 18©2017 Check Point Software Technologies Ltd. Why Service Manager Mode? Preserve Administrative Boundaries Deploy Apps Faster Maintain L2-L7 Automation Operational Flexibility
  • 19. 19©2017 Check Point Software Technologies Ltd. CHECK POINT AND CISCO ACI JOINT SOLUTION ARCHITECTURE WHY DO WE NEED AGILE AND ADVANCED SECURITY INSIDE THE PRIVATE CLOUD DATA CENTER?
  • 20. 20©2017 Check Point Software Technologies Ltd. VIRTUAL DATA CENTER HYBRID CLOUD • Manual operation • On premises • Automation & Orchestration • Software Defined Network DATA CENTER EVOLUTION
  • 21. 21©2017 Check Point Software Technologies Ltd. PRIVATE CLOUD SECURITY REQUIREMENTS Increasing sophistication of threats & malware Consistent protections and policy management Consolidated visibility, logging and reporting Sacrificing speed and agility for security Lateral spread of threats
  • 22. 22©2017 Check Point Software Technologies Ltd. Chain of events: 1. Admin used infected laptop to manage the virtual webserver in the cloud 2. Virtual webserver got infected 3. Oracle released new security patch 4. Infection moved from webserver to unpatched Oracle servers 1.5M MEDICAL RECORDS EXPOSED FROM PUBLIC IaaS DATABASE
  • 23. 23©2017 Check Point Software Technologies Ltd. CHALLENGE #1: PRIVATE CLOUD IS ALREADY SECURE, WHY DO I NEED ADDITIONAL SECURITY? Perception: • Security handled by perimeter gateway and network layers • Segmentation or isolation = security Network layer provides segmentation and basic firewall capability Data isolation does not protect against malware or other threats
  • 24. 24©2017 Check Point Software Technologies Ltd. • Perimeter Gateway doesn’t protect traffic inside the data center • Lack of security between virtual and physical applications LATERAL THREATS INSIDE THE DATA CENTER
  • 25. 25©2017 Check Point Software Technologies Ltd. • New applications provisioned rapidly • Virtual-app movement • Change in IP address • Unpatched dormant VMs that wakes up TRADITIONAL STATIC SECURITY FAIL TO PROTECT DYNAMIC DATACENTER
  • 26. 26©2017 Check Point Software Technologies Ltd. TOP OPERATIONAL CHALLENGES IN LEGACY DATA CENTERS Cumbersome Ongoing Maintenance • Deploying & Maintaining Security Gateways using traditional networking is: ̶ Complex ̶ Time consuming ̶ Error prone Traditional networks require Security Gateways to provide networking functions in addition to security – increasing operational complexity
  • 27. 27©2017 Check Point Software Technologies Ltd. SOLUTION: ADVANCED SECURITY PROTECTS CUSTOMER ASSETS IN THE PRIVATE CLOUD Advanced security methods in Private Clouds: • Prevent threats within Private Clouds − Comprehensive protections to prevent breaches and data loss • Security Groups with Advanced Threat Prevention: − Fine-tuned policies and layered protections (Firewall, IPS, Anti-Virus, AntiBot, and more) − Security achieved between segments and hosts/VM’s using network firewall and automated traffic redirection and service insertion/chaining
  • 28. 28©2017 Check Point Software Technologies Ltd. CHALLENGE #2: NETWORK SECURITY SOLUTIONS DON’T FIT IN PRIVATE CLOUD ARCHITECTURES Perception: • Environment is too dynamic − Rapid adding/removing of VMs, subnets etc. • Network security solutions single point of failure / don’t support HA configuration / cannot scale automatically / not virtualized • Traditional perimeter based security and segmentation is limited
  • 29. 29©2017 Check Point Software Technologies Ltd. • Operate in HA mode in cloud • Clusters Within Private Cloud Data Center • Multi-pod • Security policies updated automatically • Auto-discovery of cloud assets (new VM’s , subnets, EPG’s) reflected in automated policy updates • R80 Automation and Orchestration with REST API’s • Deployed in Private cloud Data Center • Physical and Virtual appliance • Automated service insertion and chaining • Integrates with Private Cloud fabric • Integrates with other L4-L7 services in private cloud • Supports both service insertion modes : Service Manager and Network Policy SOLUTION: NETWORK SECURITY FITS IN PRIVATE CLOUD
  • 30. 30©2017 Check Point Software Technologies Ltd. PROTECTING DATA & APPS IN PRIVATE CLOUDS INTRODUCING CHECK POINT VSEC : A NEW APPROACH TO SECURITY IN DATA CENTERS
  • 31. 31©2017 Check Point Software Technologies Ltd. ADVANCED THREAT PREVENTION AND VISIBILITY FOR THE PRIVATE CLOUD ©2016 Check Point Software Technologies Ltd. +
  • 32. 32©2017 Check Point Software Technologies Ltd. CHECK POINT VSEC FOR CISCO ACI Advanced threat prevention and visibility for the private cloud s Complete threat visibility and controls Automated security provisioning and policy orchestrations Automatic insertion of advanced threat prevention gateways
  • 33. 33©2017 Check Point Software Technologies Ltd. CHECK POINT VSEC FOR CISCO ACI Solution Components vSEC GATEWAY • Comprehensive protections including: Firewall, IPS, AntiBot, AntiVirus, VPN, DLP and SandBlast Zero-Day Protections • Secure traffic between applications in the private cloud • Physical and Virtual appliance vSEC CONTROLLER • Automated security with unified management • Context-aware policies and logs leveraging ACI defined objects • Consolidated logging and reporting across private, public and hybrid clouds, physical and virtual appliances vSEC Device Package for APIC • Check Point plug- in for the APIC
  • 34. 34©2017 Check Point Software Technologies Ltd. CHECK POINT VIRTUAL AND PHYSICAL SECURITY APPLIANCES A single virtual or physical Security Gateway hosts multiple automatically provisioned security instances inserted to the ACI fabric in every scale Datacenters & High End Enterprises 23000 Appliances Enterprises 15000 Appliances Small Enterprises 5000 Appliances Virtual Appliances
  • 35. 35©2017 Check Point Software Technologies Ltd. ADVANCED THREAT PREVENTION LATERAL MOVEMENT OF THREATS vSEC Gateway prevent lateral threat movement between applications inside hybrid clouds Advanced Threat Prevention Security
  • 36. 36©2017 Check Point Software Technologies Ltd. ​USE CHECK POINT SMART MANAGEMENT WITH VSEC CONTROLLER TO AUTOMATE YOUR SECURITY vSEC Controller Check Point Smart Center
  • 37. 37©2017 Check Point Software Technologies Ltd. Check Point Access Policy Rule From To Application Action 3 Finance_App1 (vCenter Object) SAP (ACI End Point Group) MSSQL Allow 4 USER_ID (AD object) Finance_Group (Openstack group) CRM Allow APPLICATION-AWARE POLICY TIED TO CISCO ACI & CLOUD MANAGEMENT
  • 38. 38©2017 Check Point Software Technologies Ltd. LOGS ENRICHED WITH CISCO ACI OBJECTS 4800 12400 Infected Server Identify Severity Date SAP (ACI App) High 3:22:12 2/4/2016 WEB (ACI EPG) High 5:22:12 2/4/2016 VM_AD_15 (vCenter object) Medium 5:28:12 2/4/2016 Check Point SmartEvent
  • 39. 39©2017 Check Point Software Technologies Ltd. COMPLETE THREAT VISIBILITY AND CONTROL • Security operational efficiency with consistent policy across East-West and North-South traffic • Forensics analysis inside your datacenter with unified logs and reports • Physical and virtual vSEC gateways
  • 40. 40©2017 Check Point Software Technologies Ltd. UNIFIED VISIBILITY UNIFIED MANAGEMENT
  • 41. 41©2017 Check Point Software Technologies Ltd. SECURITY AS DYNAMIC AS THE PRIVATE CLOUD • Full Support for automated service insertion/chaining and provisioning, Enhanced PBR and dynamic routing support, IPv6, multi-pod • Security policy based on EPG’s and micro EPG’s - microsegmentation • Physical and virtual appliances • Supports Service Manager Mode and Network Policy Mode
  • 42. 42©2017 Check Point Software Technologies Ltd. Reference Architecture • Check Point vSEC protects assets in Cisco ACI data centers • Complete Reference Architecture • Deployment Scenarios and Demo – YouTube video • End Point Groups and lateral threat prevention • Service insertion modes • Dynamic Peer routing • Multi-pod CHECK POINT VSEC FOR CISCO ACI
  • 43. 43©2017 Check Point Software Technologies Ltd. APIC SERVICE INSERTION AUTOMATION Physical or virtual device is connected to the ACI fabric Logical device representing Check Point’s concrete device – physical or virtual VSX Security Gateway is configured Check Point management receives render command from Cisco APIC, instantiate the Virtual System and configures it automatically Check Point Management installs the security policy automatically on the Virtual System Service graph is created on APIC and specific device parameters are configured APIC generates a render command to the Management Server 1 2 5 63 4
  • 44. 44©2017 Check Point Software Technologies Ltd. Reference Architecture • Auto-discovery of ACI defined objects • Leverages ACI objects like EPG’s in security policies and logs • Policies updated in real-time • Improved visibility and forensics ACI CLOUD OBJECT DISCOVERY WITH VSEC
  • 45. 45©2017 Check Point Software Technologies Ltd. ROADMAP
  • 46. 46©2017 Check Point Software Technologies Ltd. ROADMAP • PBR ( Policy based redirect) in all service modes, Ability to absorb micro EPG’s, Dynamic peer-peer routing, IPv6 , Support for R80.10 on VSX and vSEC gateways, multi-pod support (available in upcoming release) • Tagging of infected VM’s for isolation/remediation • Check Point apps in Cisco ACI AppCenter
  • 47. 47©2017 Check Point Software Technologies Ltd. CUSTOMER SUCCESSES WITH CISCO ACI AND CHECK POINT
  • 48. 48©2017 Check Point Software Technologies Ltd. Customer modernized their Data Center network & security infrastructure. Leveraged VSLS technology, multiple cluster members and cross-site clustering, Check Point expertise and trusted advisor role. Aviation industry player achieves better TCO with joint Cisco ACI and Check Point solution Joint solution supported the best security, better segmentation and consolidation of workloads with minimal downtime during the transition to private cloud. Customer improves security posture recognizing Check Point’s industry leading security, innovation and experience in the banking sector Leveraged the existing investment in Check Point, resources and training. Customer leverages vSEC controller’s comprehensive integration with ACI and R80 APIs for automation Achieved better TCO using unified policy that utilizes ACI objects in security policy Leveraged existing Check Point infrastructure including Multi-Domain Manager. Financial Services industry player transforms app delivery with Cisco ACI and Check Point Banking industry players cements future needs with app-centric secure hybrid infrastructure CUSTOMER SUCCESSES Healthcare industry player gains Scalability and Security with private cloud architecture
  • 49. 49©2017 Check Point Software Technologies Ltd. SUMMARY
  • 50. 50©2017 Check Point Software Technologies Ltd. CHECK POINT vSEC FOR CISCO ACI s Complete threat visibility and controls Automated security provisioning and policy orchestrations Prevent lateral movement of threats between cloud applications Advanced threat prevention and visibility for the private cloud
  • 51. 51©2017 Check Point Software Technologies Ltd. SUMMARY: WHY CHECK POINT VSEC FOR CISCO ACI? Unified Management for Physical and Virtual Environments Lateral Threat Prevention Inside the Data Center Automated, Adaptive and Scalable Security Advanced Threat Prevention for Cisco ACI Data Centers
  • 52. 52©2017 Check Point Software Technologies Ltd. MORE INFORMATION - RESOURCES • Check Point vSEC for Cisco ACI product page and collateral • Check Point vSEC for ACI joint solution brief • Cisco ACI L4-L7 Partner Compatibility Matrix • vSEC on Cisco Marketplace for Technology Solutions • Check Point Reference Architectures for Cisco ACI • Cisco ACI and Check Point vSEC Deployment Scenarios and Demo - video • Check Point vSEC Device Package for ACI • Check Point SmartConsole integration with ACI - video
  • 53. 53©2017 Check Point Software Technologies Ltd. HOW EASY IS IT DEPLOY VSEC IN CISCO ACI? DEMO
  • 54. 54©2017 Check Point Software Technologies Ltd. • Krish Subramanian – Product Marketing Manager, Check Point - ksubrama@checkpoint.com • Ahmed Dessouki - Product Manager, Cisco - ahdessou@cisco.com Q A
  • 55. 55©2017 Check Point Software Technologies Ltd. THANK YOU