CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership ©2019 Check Point Software Technologies Ltd. [Highly Restricted] ONLY for designated individuals 1
2017 was a Cyber-Security Wake-up Call WannaCry Thousands of enterprises impacted in over 99 countries NotPetya Completely shut down an entire country and impacted over 60 more 2
ENTERPRISE‘S ARE NOT PROTECTED TO CURRENT LEVEL ATTACKS Gen IV MEGA Gen III Gen I Gen II PAYLOAD ! Enterprises APPLICATIONS are protected VIRUS NETWORKS for Gen 2-3 2.8 attacks ©2019 Check Point Software Technologies Ltd. 3
#3MUCH COMPLEXITY TOO Too many different solutions 2007 2018 Threat Actors 1,000 Threat Types 1,000,000 Alerts / Day (Average Per Firm) 1,000,000 Too manySecurity different Vendors Solutions do not cooperate 2,600 management solutions Security Spending no shared intelligence $90B architecture impossible ©2019 Check Point Software Technologies Ltd. 4
COMPLEXITY - PREVENTING INFECTED FILES 9 ATTACK VECTORS Mobile Web Corporate Shared End Point Messaging SaaS Private Devices Downloads Email Folder Device FTP Apps. Apps Email Anti Virus 9 S ECU RI TY TECHNOL OGIES Sandbox File Extraction Static Analysis DLP SSL Inspection This is a Anti Ransomware 9 9 X problem Machine learning Complexity 81 Technologies ©2019 Check Point Software Technologies Ltd. 5
COMPLEXITY – BROADER VIEW 16 ATTACK VECTORS Business Perimeter End Mobile Web Data Cloud Cloud Messag- Branch Web IoT USB Data- FTP/ Private Vector Vector Vector Email Point Browsing Center IaaS SaaS ing Office Server Storage base File Email 1 2 3 Apps Share Firewall Identity Access Management 2 6 S E C U RI T Y T E C H N O L O GI ES Remote Access DDOS Site to Site IPSec URLF App Control IPS OWASP Anti Virus Anti Bot File Emulation & Anti-Exploit File Extraction Anti Ransomware DLP Doc Security Phishing This is a Complexity Account Take Over Man in the Middle 26 X 16 problem Doubles Password Leak in 3 years! Micro Segmentation SSL & TLS Inspection Complexity Compliance Application Scan = 416! (Adding 3 vectors Disk & Media Encryption and technologies Forensics Future 1 per year) Future 2 Future 3 66 ©2019 Check Point Software Technologies Ltd.
HOW DO WE PROACTIVELY ADDRESS WHAT’S COMING? 16 ATTACK VECTORS Messag- FTP/ Business End Web Data Cloud Cloud ing Branch Web USB Data- File Private Vector Vector Vector Email Perimeter Point Mobile Browsing Center IaaS SaaS Apps Office Server IoT Storage base Share Email 1 2 3 Firewall Identity Access Management Remote Access 2 6 S E C U RI T Y T E C H N O L O GI ES DDOS Site to Site IPSec URLF App Control IPS OWASP Anti Virus Network, Cloud, Anti Bot Quick Adoption for File Emulation & Anti-Exploit Mobile File Extraction Anti Ransomware Security Innovation DLP Doc Security Phishing Account Take Over Man in the Middle Password Leak Micro Segmentation SSL & TLS Inspection Compliance Everywhere Application Scan Disk & Media Encryption Forensics Future 1 Future 2 Future33 Future 7 ©2019 Check Point Software Technologies Ltd.
THE TRADITIONAL APPROACH to SECURITY Virus Anti-Virus Malicious Websites URL Filtering Intrusion Intrusion Prevention Botnet Anti Bot High Risk Applications Application Control Cloud Cloud security 8
ENTERPRISES ARE ONE STEP BEHIND THE ATTACKER PATCHWORK OF POINT SOLUTIONS. COMPLEX TO MANAGE Looking for yesterday’s signatures Detection instead of prevention! 11
INFINITY ARCHITECTURE [Restricted] for designated teams 12
T H E C Y B ER S E C URI TY A R C H ITE CTURE O F T H E F U T URE REAL TIME THREAT SHARED THREAT CONSOLIDATED PREVENTION INTELLIGENCE MANAGEMENT Block the most Unified threat intelligence Single Management, sophisticated attacks and open interfaces block Modular Policy before they infiltrate the attacks on all platforms Management & integrated network threat visibility A C R O S S A L L N E T W O R K S , E N D P O I N T, C L O U D S A N D M O B I L E 13
CLOUD MOBILE Infrastructure Applications Shared Threat Intelligence Capsule W orkSpace/Docs Ad vanced Threat Prevention Z ero-Day Threat Protection Ap p Protection R emote Access Ad aptive Security S ensitive Data Protection Net work Protection S ecure Business Data Aut omation and Orchestration End -to-end SaaS Security Cro ss Environment D y namic Policies Id entity Protection D evice Protection Pro tect Docs Everywhere Mult i & Hybrid Cloud NETWORK ENDPOINT He adquarters Branch Access/Data Security Access Control Access Control Threat Prevention Access Control D a t a Protection Mult i Layered Security Ant i-Ransomware S ecure Media Mult i Layered Security Ad vanced Threat Prevention Ad vanced Threat Prevention W i- Fi, DSL, PPoE Ready Consolidated F o rensics S ecure Documents Security Management 14
A GLIMPSE TO THE WORLD OF TWO CISOs 15 ©2019 Check Point Software Technologies Ltd.
TWO CISOS, TWO COMPANIES CISO A: Steve CISO B: Marcus INVESTMENT COMPANY: 3,500 Employees INSURANCE COMPANY: 6,500 Employees ©2019 Check Point Software Technologies Ltd. 16
COMPANY A: MULTI-SECURITY VENDORS 16 ATTACK VECTORS Business Perimeter End Mobile Web Data Cloud Cloud Messag- Branch Web IoT USB Data- FTP/ Private Email Point Browsing Center IaaS SaaS ing Office Server Storage base File Email Apps Share Firewall 2 6 S E C U RI T Y T E C H N O L O GI ES Identity Access Management Remote Access DDOS Site to Site IPSec URLF App Control IPS OWASP Complex Old Technology Anti Virus Anti Bot File Emulation & Anti-Exploit Over 16 Security Can’t prevent Gen Steve File Extraction Anti Ransomware Vendors 5 attacks DLP Doc Security Phishing Account Take Over Exposed Man in the Middle Password Leak Many attack vectors are Micro Segmentation SSL & TLS Inspection not protected Compliance Application Scan Disk & Media Encryption Forensics ©2019 Check Point Software Technologies Ltd. 17
COMPANY B: SECURITY CONSOLIDATION 16 ATTACK VECTORS Business Perimeter End Mobile Web Data Cloud Cloud Messag- Branch Web IoT USB Data- FTP/ Private Email Point Browsing Center IaaS SaaS ing Office Server Storage base File Email Apps Share Firewall 2 6 S E C U RI T Y T E C H N O L O GI ES Identity Access Management Remote Access DDOS Site to Site IPSec URLF App Control IPS OWASP Anti Virus Anti Bot Marcus File Emulation & Anti-Exploit File Extraction Simple Latest Technology Anti Ransomware DLP Doc Security 1 Security Prevent Gen 5 Phishing Account Take Over Architecture Covered attacks Man in the Middle Password Leak All attack vectors are Micro Segmentation SSL & TLS Inspection protected Compliance Application Scan Disk & Media Encryption Forensics ©2019 Check Point Software Technologies Ltd. 18
STEVE VS. MARCUS Steve Marcus Number of Security Vendors 16 1 architecture Security Coverage Partial Complete Solution Cost $$$$ $$ IT Security Engineers 28 6 Shared intelligence Weak Strong ©2019 Check Point Software Technologies Ltd. 19
INTRODUCING TOTAL PROTECTION ALL INCLUSIVE CONSUMPTION MODEL FOR GEN-V OF CYBER SECURITY 20
Consume all Check Point Infinity Products & Solutions Advanced Threat Check Point Network Endpoint and Mobile 24x7 Premium Prevention and Zero and Cloud security protection for all support included day protection gateways* employees TOTAL PROTECTION * Appliance budget is calculated as 50% of total annual price. Consumption is done at list price against the budget amount 21
Infinity Total Protection Pricing model 50% 5% 24x7 Price per user % of spend towards % of spend towards Threat prevention & per year Hardware Purchase Training, Incident 24X7 Premium Response, and PS Support Simple, Predictive, All Inclusive Existing install-base will continue to require separate support and services. 22
Infinity Key Messaging Industry’s only Security Architecture protecting Network, Cloud, Endpoint & Mobile Consolidated security management (Gartner’s Gold Standard) Security and single threat repository (ThreatCloud) Agile and flexible model, allowing access to all Agility Check Point Infinity Products & Solutions Simple, fixed and predictable consumption-based model Simplicity Check Point commitment – Industry fastest time to respond to big impact vulnerabilities 23
50% REDUCTION in HUMAN INVESTMENT with single management platform 20% REDUCTION in SECURITY SPEND consolidating on single architecture Simplicity PREDICTABLE SPEND One platform, one business model 24
• Maximum security ̶ Fully consolidated cyber security architecture including the most advanced threat prevention technologies • All Inclusive ̶ Protecting your network, endpoint, cloud and mobile; and including hardware, software, subscription and support • Simple pricing per user per year ̶ Predictive spend 25
THANK YOU Come to our booth Nr. 03 Mirko Kürten mirko@checkpoint.com +49 151 42214915 ©2019 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees 26
You can also read