©2011 check point software technologies ltd. | [unrestricted] for everyone check point endpoint...
TRANSCRIPT
©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Check Point Endpoint Security, 3D malware protection and data security
Michael Amselem
Head of Sales Europe Data Security and protection
22©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Market Trends
2 R80 – Manage Your users
3 Success stories
33©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Market Trends
Anti Malware$955M
(30%)
Threat Manage-ment (Firewall, HIPS)
$271M(9%)
Data Security$797M
(25%)
Security Suites$1,107M
(36%)
IDC World Wide Enterprise Endpoint Security forecast
Total Market Estimation in 2010/11: $2.8B -$3.1B
CAGR: +20.2% CAGR:
-8.5%
CAGR: +12.6%
CAGR: +10.7%
44©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Top 10 Trends of 2011
Cloud Computing
Virtualization
Threat Landscape
IT Consumerization
Consolidation & Complexity
Data Security and Loss
Web 2.0 & Social Media
Governance, Risk & Compliance (GRC)
Cost Reduction
Green IT
6
5
43
21
78
910
55©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
2011 Security Trends
Threat Landscape4
66©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Today’s Threat Landscape
IncreasingSophistication
Multi-vector
Polymorphic
Blended and multi-variant
StuxnetAurora
BotnetsXSS
Zeus
TrojansWorms
Crime and Profit-driven
Cyber Crimeware Financial theft Intellectual
property Criminal networks
Cyber-warfare and Hactivists
Cyber-warfare Iran and Stuxnet Wikileaks Cyber ‘Hactivists’
77©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
2011 Security Trends
Consolidation and Complexity
5
88©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
InformationWeek2010 Survey of security decision makers
Biggest IT Security ChallengesWhich of the following are the biggest information/network security challenges facing your company?
Managing the complexity of security 51%
Enforcing security policies 35%
Preventing data breaches from outside attackers 29%
Preventing data theft by employees or other insiders 23%
The requirementto manage security complexitygrows steadily each year.
On Complexity and Point-product Sprawl
99©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
IPS Firewall
VPN
Antivirus/ Anti-spam
NAC
DLP
URL Filtering
IPS
Network
FW
VPN
AV / Anti-spam
NAC
DLP
URL Filtering
Client
VPNHost FW
Encry
ption
ProgramControl
Por
t P
rote
ctio
n
On Complexity and Point-product Sprawl
Top network security technologies and point products deployed
Your world:
And don’t forget endpoint—nearly doubling the number of point products…
1010©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
2011 Security Trends
Governance, Risk and Compliance
8
1111©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Regulatory OverloadS
OX
PC
I DS
S
GL
BA
E.U
. D
ata
Pri
vacy
Dir
ecti
ve
BA
SE
L II
HIP
AA
-HIT
EC
H
SE
C
STA
TE
LA
WS
Prevalent IT GRC Standards
1212©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
“Compliance has the greatest influence on information security costs”
InformationWeek2010 Survey of security decision makers
Most Influential Factors On Security ProgramWhich of the following factors have the greatest influence on your information security program?
Industry and/or government compliance mandates 60%
Our security group’s assessment of threats and risks the company faces
42%
Information security best practices 37%
Threats and risks associated with business models or processes
26%
On Governance, Risk and Compliance
1313©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
On key CSO priorities for 2011
The 2011 Global State of Information Security Survey
Increasing the focus on data protection 71%
Prioritizing security investments based on risk 69%
Strengthening the company’s governance, risk and compliance programs 67%
Refocusing on core of existing strategy 66%
Accelerating the adoption of security-related automation technologies to increase efficiencies and cut costs 66%
Pursuing more complete configuration of DLP tools 65%
1414©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Market Trends
2 R80 – Manage your users
3 Success stories
1515©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
3DSECURITY
1616©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Consolidated into a single view
Security that involves people
Policy that focuses on business needs
Security as a business process
1717©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unique Visibility and Control
Monitor… Manage… Enforce…
…everything that’s important to you
…policy and exceptions on the fly
…compliance before the network is accessed
1818©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Best User Experience
InterfaceSingle
AgentSingle
UpdateSingle
ScanSingle
LogonSingle
CheckPoint
M
cAfe
e
Sy
man
tec
Anti-malware Scan Time
1600 -
1200 -
800 -
400 -
0 -
Sec
on
ds
CheckPoint
McA
fee
Sym
ante
c
System Boot Time
130 -
100 -
70 -
40 -
10 -
Sec
on
ds
CheckPoint
McA
fee
Symantec
Memory Footprint
175 -
160 -
145 -
130 -
115 -
MB
ytes
Fastest Scan Time Fastest Boot Time Smallest Footprint
1919©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Software Blades
LaptopsDesktops
Quickly deploy the right level of protection for the right machines
2020©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
HR machines have many users
Manage Security of Users, Not Just Machines
Security policy follows the user
Rose has many machines
2121©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Drill down on groups, users and all their machines in a few clicks
Manage Security of Users, Not Just Machines
Quickly determine
Rose’s status
Search or click AD to investigate group or
user status
Find Rose’s machines
quicklyView Rose’s
policies
2222©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Market Trends
2 R80 – Manage your users
3 Success stories
2323©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Security Management R80…
…wins opportunities in 5 continents
2424©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Supermarket Chain – South Europe
ApproachApproach
► Introduction to desktop team► Unified client, Unified
management and blades► SE Started a PoC
ResultsResults
► Installed 100 seats Total Security in a week
► McAfee footprint was higher► Bought 600 total security,
removing McAfee AV
BackgroundBackground
► Network security customer, but have different groups for network and desktop admins
► Ask for a full security suite with a single management
► McAfee AV incumbent
2525©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Military Equipment Manufacturer – UK
ResultsResults
► Successful PoC with pre-GA► Customer impressed with blade
deployment and its flexibility► Started deployment with GA► 1500 FDE and 500 TS seats
BackgroundBackground
► Customer runs Secure Client. Bought endpoint security for 2,000 endpoints
► Deployment was held due to complexity and prioritizations
► Following a successful rollout at the partner’s site, performed a PoC at the customer’s site
2626©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
New York Department of State
Approach & ResultsApproach & Results
► Already upgraded to GA► Customer’s trust has re-gained!
QuoteQuote
BackgroundBackground
► Bought 1,000 Total security seats in the past
► Never completed deployment, due to complexity internally
“We're able to unify our security policies across the entire organization; from groups to users and devices. We can manage our encryption, AV and other solutions in one place.“
Rob Stevens, Supervisor of User Services
2727©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Gas explorer and producer - Australia
ApproachApproach
► Complete solution of data security with DLP, Liquid Machines and Abra
ResultsResults► Deployed 150 seats for PoC,
for pilot groups tests.► Got top performance results► Acquired and deployed 10,000
seats► Next steps: 5,000 Abra, Liquid
Machines and DLP-1
BackgroundBackground
► Not a Check Point customer.► Issued an RFP for data security
due to some security incidents► Centralized management a
must► All competitors answered ► Symantec provides AV
2828©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Gartner’s feedback on R80
2929©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Questions?
3030©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Thank You!
3131©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
RF Technology company - Middle East
ApproachApproach
► Broke Microsoft’s solution with discussions about incomplete security and administration
► Engaged the EA team to install the management and 3 seats
ResultsResults
► The customer installed independently 80 seats
► Found Symantec’s solution as not complete
► Bought 100 seats► Upgraded to GA already
BackgroundBackground
► Network security customer ► Looked for Media Encryption
and Full Disk Encryption ► Competition with Symantec and
Microsoft► Centralized management: must
3232©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Financial Consultant Firm – South Africa
ApproachApproach
► Endpoint Security and DLP
ResultsResults
► Installed 102 seats in 4 days► Like the blade approach ► McAfee failed in PoC► Bought 400 TS seats & DLP-1,
and replacing McAfee AV
BackgroundBackground
► Network security customer► Customer mentioned a need to
protect their data► McAfee customer
3333©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
6 Month Period Detection Comparison