Visibility & Control Identity, Application

greenpepperwhinnySecurity

Nov 3, 2013 (3 years and 7 months ago)

54 views

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Visibility & Control


Identity, Application

& Content Awareness

Andrea Bellinzaghi

Technical Manager

Check Point Italia

2

2

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Boundaries are disappearing

Work from Anywhere

Share Data

Use Different Devices

Use Internet Tools

Users Have Different
Needs

Boundaries

are disappearing

3

3

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

New environment, new challenges

Image of IT juggling:

-
Users

-
Internal assets
(databases, servers)

-
Mobile devices

-
Information

-
Internet apps

To secure this new environment,

IT needs to do more

4

4

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

More Security….

…with Less:

Less

Resources

Less

Time

5

5

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |



INTRODUCING…





3
D

SECURITY

6

6

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

|

6






Easily
enforce

security policies






Security that involves
people



Policy

that supports business needs

Security as a Business Process

Policy

People

Enforcement

7

7

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Policy Definition

Legacy:

Now:

8

8

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Security is about People, not Numbers

Security Is about
People
,

not Numbers

9

9

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

IP Based Policy Challenges


Access from Anywhere…


Users no longer belong to specific networks!

10

10

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Granular security

per user,

Security following the user !

user
-
group

and machine

11

11

©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Accurate
Security

Intuitive
Management

Full
Integration

Introducing ..

Check Point Identity Awareness

12

12

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

are an integral part of security

People

13

13

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point
UserCheck


Technology

Understand usage needs,

while enforcing policy

Makes Web
control more
practical

Asks users to
confirm usage in
real
-
time

Ask

http://www.youtube.com

Need to watch product demo

http://www.youtube.com

Internet
Access Policy



John Smith,


According to the company policy, access to
YouTube is intended for work
-
related use only.



This is work related. Reason below:





Need to watch product demo

Cancel

OK

14

14

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Granular Control of all Security layers

Granular Visibility

Identity
Awareness

Application
Control &
URL filtering

DLP

Mobile
Access

SmartEvent

IPS

15

15

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Industry
-
Leading Next Generation Firewall

Check Point the
Only

Firewall to Pass Latest NSS Next Generation
Firewall Test and Earn "Recommend" Rating


Passed 100% of Traditional Firewall Tests


Passed 100% of Application Identification and Control Tests


Passed 100% all firewall policies with direct integration to Active Directory


Passed 100% of Tested Evasions


Low TCO

16

16

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Sets a New
Standard in Latest

NSS Group IPS Test

Industry
-
Leading IPS

The
Check Point IPS

Software Blade
outperformed nearly every
vendor in overall accuracy
and blocking:


97.3% Security
Effectiveness


Multi
-
Gigabit rated
throughput of 2.4Gbps


100% anti
-
evasion
coverage

17

17

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Need to Control All Aspects of Web

Websites

Applications

Facebook Chat

Granularity
beyond URLs

Not URL
-
based

www.hackthissite.org

www.fantasyfootball.com

Unified Control Needed !

18

18

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Unifies

URL
Filtering and Application Control

Websites



URL Filtering

Applications


Application Control

Unified categories


URLs and
applications

User/Group
Granularity

Unified Control of All Aspects of Web Security

19

19

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Different Users Have Different Needs

IT wants to conserve
bandwidth

Marketing
needs
to
upload
a product
demo

But…

Should

be allowed? Blocked?

Support
User Needs by Engaging End
-
Users

20

20

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point
UserCheck


Technology

Understand usage needs,

while enforcing policy

Makes Web
control more
practical

Asks users to
confirm usage in
real
-
time

Ask

http://www.youtube.com

Need to watch product demo

http://www.youtube.com

Internet
Access Policy



John Smith,


According to the company policy, access to
YouTube is intended for work
-
related use only.



This is work related. Reason below:





Need to watch product demo

Cancel

OK

21

21

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point
AppWiki

Over
4,500

applications

Over
250,000

social
-
network
widgets

Grouped in over
80
categories

(including Web 2.0, IM, P2P,

Voice & Video, File Share)

World’s largest

Application Classification Library

a ppwi k i.c he c k poi nt.c om

22

22

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Engage users for practical enforcement

Unified with Application
Control

New and
Improved

URL Filtering Software
Blade

Granular user
-
based policies

Cloud
-
based
categorization

Available on ALL Security
Gateways

Check Point Offers the Right Solution

23

23

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point DLP

Makes data loss prevention work

Prevent

Data
loss
by i
nvolving user

Inspect

Sensitive data leaving
organization in
real time

Check Point Data Loss Prevention

25

25

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Inspect SSL
-
Encrypted
T
raffic

Across
A
ll Software Blades

URL
Filtering

Application
Control

Antivirus &
Anti
-
Malware

IPS

DLP

26

26

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Mobile Access Software Blade

Easy Access to Email and Applications

27

27

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

360º Visibility into All Security Events

28

28

©2011 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Software Blades
Architecture

Check Point 3D Security

Combines
Policy, People and Enforcement for
Better Security

Centralized
Management

Flexible
Deployment

©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Thank You!