Upload
quasar
View
18
Download
0
Embed Size (px)
DESCRIPTION
Endpoint Security Current portfolio and looking forward. October 2010. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80. Conclusion. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80. - PowerPoint PPT Presentation
Citation preview
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Endpoint SecurityCurrent portfolio and looking forward
October 2010
22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Background: Current Endpoint Portfolio
2 Looking Forward: Endpoint Security R80
3 Conclusion
33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Background: Current Endpoint Portfolio
2 Looking Forward: Endpoint Security R80
3 Conclusion
44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Security today
Our current portfolio
R73 (HFA1) Abra Mobile clients(VPN, Encryption)
55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R73 Evolution
ZoneLabs Acquisition
20072004 2008 2009 2010
Pointsec Acquisition
R70
R71 / R72
R73 / HFA1R7xUnified Client Project
66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Security R73
Unified Endpoint Protection Best of breed Components
► Data Security► Network Security► Remote Access components
Provides full security coverage
Flexible & Modular Deploy what you need now, add what you need in
the future Multiple component and suite deployment options
77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R73 – Data Security
Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot
authentication Media Encryption protects your removable
medias Combines Media Encryption and Port Protection
88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R73 HFA1 – Network Protection
Not just a firewall Innovative Network Protection Technologies
Program Advisor, WebCheck Complementary Anti-Malware
Award-winning, high-performance
99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R73 HFA1 - Remote Access
Choice of two VPN clients: Endpoint Connect
► Smart connection, whatever the network or connectivity challenges
► Transparent “in the office” user experience► Embedded hot-spot handling► 32- and 64-bit client support
Legacy SecureClient ► Ensuring topology and deployment compatibility
1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Security R73 – New features
Support of Windows 7 New Anti Malware engine ME new features
Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption
FDE Support of IRRT enabled laptops (Dell E-Series)
Improved client-side performance
1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Fast User Experience
Lowest CPU and Memory Utilization
CheckPoint
McA
fee
Sym
ante
c
CheckPoint
McA
fee
Symantec
System Boot Time Memory footprint
130 -
100 -
70 -
40 -
10 -
Seco
nds
Endpoint and Data Security on Windows XP SP3Source: Check Point Labs
175 -
160 -
145 -
130 -
115 -M
egab
ytes
1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Fast User Experience
Fastest Anti-malware Scan Time
CheckPoint
McA
fee
Sy
man
tec
CheckPoint
Mc
Afe
e
Sy
man
tec
Anti-malware INITIAL scan time
Anti-malware RECURRING scan time
1600 -
1200 -
800 -
400 -
0 -
Seco
nds
Anti-malware tests on Windows 7 Source: Check Point Labs
1600 -
1200 -
800 -
400 -
0 -Se
cond
s
1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and 2008 32bit FDE new features
Supports latest intel chipset Supports hibernation on 64bits OS
ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users
WebRH AD integration Support of SQL Server 2008
SA new features Server Support for Anti-malware Check Point R71 management support
1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Abra R70
Turn any PC into a corporate desktop USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported
Keep mobile data secure Secure Workspace isolates/protects data from host Central SW policy controls applications & features
Maintain secure connectivity Provide flexible, secure access to corporate
resources, info repositories, and applications Leverage existing CP gateway protections/features
1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Mobile Clients
VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect)
Encryption is available on the following: Windows Mobile Symbian
1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Background: Current Endpoint Portfolio
2 Looking Forward: Endpoint Security R80
3 Conclusion
1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80 Evolution
ZoneLabs Acquisition
20072004 2008 2009 2010
Pointsec Acquisition
R70
R71 / R72
R73 / HFA1R7x
R8xR80Unified Management Project
Unified Client Project
2,5 years of development
1818©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
A new era in Endpoint Security!
FDE
ME
Central Management Simple, Flexible Enhanced Monitoring
Coming Soon
Q4
1919©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Unique Core Values
Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative
2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Truly Unified Management
►All endpoint blades and policies managed from the same place
►Consistent look and feel
►No nested admin console
►One component to install
2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Organization-Centric Management
►Assignment Policy Model based on organization
►Policies can be assigned based on connectivity state and/or compliance level
►Leverage current AD architecture to manage & monitor endpoints
2222©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Simple, Efficient Policy Definition
►Best practice out of the box policies protect endpoints quickly
►Advanced configuration options always available for added granularity
2323©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Flexible Client Deployment
►Ability to create MSI package for deployment
►Device Agent only or featured package
►Full handling of client deployment based on policy
2424©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Enhanced Monitoring
►Full view on current endpoint status and events
►Customizable & Exportable
►Adaptable Drill-down reporting based on organization level
2525©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Leveraging CP Infrastructure
►Combined Network & Endpoint Log Management provides total security view – useful for compliance
►Sharing of Network Objects and Administration provides stronger, simpler security
2626©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
R80: Comprehensive and Innovative
►Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security
►Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing
2727©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Agenda
1 Background: Current Endpoint Portfolio
2 Looking Forward: Endpoint Security R80
3 Conclusion
2828©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Conclusion
Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone
Later this year, R80 will bring us to a new way of managing Endpoint Security
After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Questions?
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Thank you!