check point ©2000 check point software technologies ltd. -- proprietary & confidential robert...

19
Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point in the Finance Sector Case Studies

Upload: madeleine-snow

Post on 17-Dec-2015

232 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Robert ŻelazoCheck Point Software Technologies Ltd.

Check Point in the Finance SectorCase Studies

Robert ŻelazoCheck Point Software Technologies Ltd.

Check Point in the Finance SectorCase Studies

Page 2: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Enterprise ManagementEnterprise Management

Page 3: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Meeting the Business Needs …Meeting the Business Needs …

No physical boundaries in Corporate networks

Business requires authorized access anytime - anywhere - (24x7x365)

Expectations are for higher levels of speed and transparency

Requires enterprise wide security policies / services to effectively manage risks.

Page 4: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Firewall Services / Electronic TransactionsFirewall Services / Electronic Transactions

WEB Browsing - HTTP (Hypertext Transfer Protocol) – Electronic Transactions: Instantly Generate Auto Loan

Payments, Generate Multi-Term Payment Quotes, and Generate Car Lease Quotes

Secured WEB Browsing - HTTPS (Hypertext Transfer Protocol Secured) – Electronic Transactions: Apply for a car loan

application, car lease, and inquiries in a secured manner for mortgage banking rates

Page 5: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Firewall Services / Electronic Transactions Cont.Firewall Services / Electronic Transactions Cont.

Mail - SMTP(Simple Mail Transfer Protocol)

– Electronic Transactions: Send and receive mailto your customers

Electronic File Distribution - FTP(File Transfer Protocol)

– Electronic Transactions: Transfer bank payroll for customer accounts, and transfer lettersto your customers

Page 6: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

To Meet the Demands ...To Meet the Demands ...

Deployed 8 Internet DMZs in strategic geographic locations

Deployed 6 Extranet DMZs in strategic geographic locations

Deployed 4 development labs in strategic geographic locations

Deployed 1 Staging DMZ for quality assurance

Page 7: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Dresdner Bank Corporate VPNsDresdner Bank Corporate VPNs

Dresdner Bank

Page 8: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Challenges of VPNsChallenges of VPNs

Access

Controls

Isolation

Policy

Privacy

Identity

Administration

Availability and Quality of ServiceSecurity

Costs

Page 9: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Strategy of Dresdner Bank GroupStrategy of Dresdner Bank Group

Global and Local Corporate VPNs

Rio de Janeiro

M exico City

M iam i

Toronto

BostonChicago

Los Angeles

M ontevideoM elbourne

Beijing

St. Petersburg

M oscow

Sydney

M um bai

Sao Paulo

New York

FrankfurtLondon

Paris

Shanghai

Hongkong

Tokyo

Bangkok

Singapore

San Francisco

Page 10: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

New YorkC heck Point

VPN -1

SingaporeC heck Point

VPN -1

LondonC heck Point

FW -1

W orldw ide Dresdner GroupCorporate Netw ork

Internal Classified LAN

Public W W W , FTP,M ail and

Proxy Server

Private External Segment

External Routeror RSM to the Public

CN

CentralFirewall

Public External Segment

Public DM Z

Private W W W , FTP,M ail and

Proxy Server

Internal Clients andServers

Private DM Z

External Routeror RSM to the internal VPN

Internal VPN (168 Bit 3DES)via Corporate Netw ork

Frankfurt HeadQuarter

C heck P o in tFW -1

Case 1 - Corporate Intranet VPNCase 1 - Corporate Intranet VPN

Page 11: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Wrapping UpWrapping Up

Why Corporate VPNs? We can’t control external

Networks and Systems Many Threads from Hackers,

Crackers, Cyberjunkies and Active Content

Data may be modified during Transmit

Unauthorized Access to classified Data

What kind of VPNs? Intranet VPNs Extranet VPNs Remote Access VPNs Combinations

Page 12: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Closing WordsClosing Words

Just use VPNs!

Otherwise, your business will soon be...

Page 13: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Dow Jones

Page 14: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Corporate FactsCorporate Facts Founded in 1882 by Charles H. Dow, Edward T. Jones and

Charles Bergstresser Headquarters:

– 200 Liberty Street, New York, New York

Preliminary 2000 Revenue:

– $ 2.32 Billion Preliminary 2000 Net Income:

– $ 294.6 Million Worldwide Employees:

– 8,100 Listed NYSE, DJ

Dow Jones

Page 15: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Our ChallengeOur Challenge

Build a new corporate infrastructure Major objectives

– Internet Access

– Access to Parent Company Resources

– 24x7x365 Availability

– Secure Remote Access over the Internet

– Protect Parent Company

Dow Jones

Page 16: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

High Level SolutionHigh Level Solution

Security Requirement:– Firewall of choice must meet ICSA, and DOD

criteria for a firewall.

– Check Point VPN-1 meets that requirement.

Ease of Manageability:– Must have a user friendly graphical interface.

– Check Point VPN-1 meets that requirement.

Must be capable of generating log files:– Check Point VPN-1 meets that requirement.

Dow Jones

Page 17: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

High Level SolutionHigh Level Solution

Firewall must support a VPN:– Check Point VPN-1 meets that requirement

with SecuRemote.

Firewall must support hardware based encryption:– NOKIA IP-650 meets that requirement.

Firewall hardware must be easy to configure and maintain:– NOKIA IP-650 meets that requirement.

Dow Jones

Page 18: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

Benefits GainedBenefits Gained

Fast, reliable Internet access. Secured access to parent companies

resources (Expense System, HR and AP system). This provides the new company a significant cost savings.

Remote access allows the sales force secured access to all corporate resources.

Dow Jones

Page 19: Check Point ©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential Robert Żelazo Check Point Software Technologies Ltd. Check Point

Check Point

©2000 Check Point Software Technologies Ltd. -- Proprietary & Confidential

eBankaeBankaCustomer needs met

– Connect remote branch offices

– Allow eBanka customers to securely access information via the Internet

Check Point products implemented– VPN-1 Pro

– VPN-1 SecureClient

– SmartCenter