30
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010

Endpoint Security Current portfolio and looking forward

  • Upload
    quasar

  • View
    18

  • Download
    0

Embed Size (px)

DESCRIPTION

Endpoint Security Current portfolio and looking forward. October 2010. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80. Conclusion. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80. - PowerPoint PPT Presentation

Citation preview

Page 1: Endpoint  Security Current  portfolio and  looking forward

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Endpoint SecurityCurrent portfolio and looking forward

October 2010

Page 2: Endpoint  Security Current  portfolio and  looking forward

22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Background: Current Endpoint Portfolio

2 Looking Forward: Endpoint Security R80

3 Conclusion

Page 3: Endpoint  Security Current  portfolio and  looking forward

33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Background: Current Endpoint Portfolio

2 Looking Forward: Endpoint Security R80

3 Conclusion

Page 4: Endpoint  Security Current  portfolio and  looking forward

44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Security today

Our current portfolio

R73 (HFA1) Abra Mobile clients(VPN, Encryption)

Page 5: Endpoint  Security Current  portfolio and  looking forward

55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R73 Evolution

ZoneLabs Acquisition

20072004 2008 2009 2010

Pointsec Acquisition

R70

R71 / R72

R73 / HFA1R7xUnified Client Project

Page 6: Endpoint  Security Current  portfolio and  looking forward

66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Security R73

Unified Endpoint Protection Best of breed Components

► Data Security► Network Security► Remote Access components

Provides full security coverage

Flexible & Modular Deploy what you need now, add what you need in

the future Multiple component and suite deployment options

Page 7: Endpoint  Security Current  portfolio and  looking forward

77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R73 – Data Security

Full Disk Encryption protects data at rest Combines full hard drive encryption and pre-boot

authentication Media Encryption protects your removable

medias Combines Media Encryption and Port Protection

Page 8: Endpoint  Security Current  portfolio and  looking forward

88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R73 HFA1 – Network Protection

Not just a firewall Innovative Network Protection Technologies

Program Advisor, WebCheck Complementary Anti-Malware

Award-winning, high-performance

Page 9: Endpoint  Security Current  portfolio and  looking forward

99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R73 HFA1 - Remote Access

Choice of two VPN clients: Endpoint Connect

► Smart connection, whatever the network or connectivity challenges

► Transparent “in the office” user experience► Embedded hot-spot handling► 32- and 64-bit client support

Legacy SecureClient ► Ensuring topology and deployment compatibility

Page 10: Endpoint  Security Current  portfolio and  looking forward

1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Security R73 – New features

Support of Windows 7 New Anti Malware engine   ME new features

Serial ID device filtering Nero v9+ support for CD/DVD encryption Local File & Folder Encryption

FDE Support of IRRT enabled laptops (Dell E-Series)

Improved client-side performance

Page 11: Endpoint  Security Current  portfolio and  looking forward

1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Fast User Experience

Lowest CPU and Memory Utilization

CheckPoint

McA

fee

Sym

ante

c

CheckPoint

McA

fee

Symantec

System Boot Time Memory footprint

130 -

100 -

70 -

40 -

10 -

Seco

nds

Endpoint and Data Security on Windows XP SP3Source: Check Point Labs

175 -

160 -

145 -

130 -

115 -M

egab

ytes

Page 12: Endpoint  Security Current  portfolio and  looking forward

1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Fast User Experience

Fastest Anti-malware Scan Time

CheckPoint

McA

fee

Sy

man

tec

CheckPoint

Mc

Afe

e

Sy

man

tec

Anti-malware INITIAL scan time

Anti-malware RECURRING scan time

1600 -

1200 -

800 -

400 -

0 -

Seco

nds

Anti-malware tests on Windows 7 Source: Check Point Labs

1600 -

1200 -

800 -

400 -

0 -Se

cond

s

Page 13: Endpoint  Security Current  portfolio and  looking forward

1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Endpoint Security R73 HFA1 – What's new Support of Windows Server 2003 and 2008 32bit FDE new features

Supports latest intel chipset Supports hibernation on 64bits OS

ME new features Encrypted client-side logs & profiles Temp folder drive/location definition Remote Help for non-AD users

WebRH AD integration Support of SQL Server 2008

SA new features Server Support for Anti-malware Check Point R71 management support

Page 14: Endpoint  Security Current  portfolio and  looking forward

1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Abra R70

Turn any PC into a corporate desktop USB-based form factor with HW/SW encryption Requires no admin, host OS, or reboot On- and off-line working modes supported

Keep mobile data secure Secure Workspace isolates/protects data from host Central SW policy controls applications & features

Maintain secure connectivity Provide flexible, secure access to corporate

resources, info repositories, and applications Leverage existing CP gateway protections/features

Page 15: Endpoint  Security Current  portfolio and  looking forward

1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Mobile Clients

VPN client is available on the following platforms: Windows Mobile Symbian And now iPhone (SecureConnect)

Encryption is available on the following: Windows Mobile Symbian

Page 16: Endpoint  Security Current  portfolio and  looking forward

1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Background: Current Endpoint Portfolio

2 Looking Forward: Endpoint Security R80

3 Conclusion

Page 17: Endpoint  Security Current  portfolio and  looking forward

1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80 Evolution

ZoneLabs Acquisition

20072004 2008 2009 2010

Pointsec Acquisition

R70

R71 / R72

R73 / HFA1R7x

R8xR80Unified Management Project

Unified Client Project

2,5 years of development

Page 18: Endpoint  Security Current  portfolio and  looking forward

1818©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

A new era in Endpoint Security!

FDE

ME

Central Management Simple, Flexible Enhanced Monitoring

Coming Soon

Q4

Page 19: Endpoint  Security Current  portfolio and  looking forward

1919©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Unique Core Values

Truly Unified Management Organization-centric Management Simple, efficient policy definition Flexible client deployment Enhanced Monitoring Leveraging CP Infrastructure Comprehensive & Innovative

Page 20: Endpoint  Security Current  portfolio and  looking forward

2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Truly Unified Management

►All endpoint blades and policies managed from the same place

►Consistent look and feel

►No nested admin console

►One component to install

Page 21: Endpoint  Security Current  portfolio and  looking forward

2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Organization-Centric Management

►Assignment Policy Model based on organization

►Policies can be assigned based on connectivity state and/or compliance level

►Leverage current AD architecture to manage & monitor endpoints

Page 22: Endpoint  Security Current  portfolio and  looking forward

2222©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Simple, Efficient Policy Definition

►Best practice out of the box policies protect endpoints quickly

►Advanced configuration options always available for added granularity

Page 23: Endpoint  Security Current  portfolio and  looking forward

2323©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Flexible Client Deployment

►Ability to create MSI package for deployment

►Device Agent only or featured package

►Full handling of client deployment based on policy

Page 24: Endpoint  Security Current  portfolio and  looking forward

2424©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Enhanced Monitoring

►Full view on current endpoint status and events

►Customizable & Exportable

►Adaptable Drill-down reporting based on organization level

Page 25: Endpoint  Security Current  portfolio and  looking forward

2525©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Leveraging CP Infrastructure

►Combined Network & Endpoint Log Management provides total security view – useful for compliance

►Sharing of Network Objects and Administration provides stronger, simpler security

Page 26: Endpoint  Security Current  portfolio and  looking forward

2626©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

R80: Comprehensive and Innovative

►Comprehensive features: Media Encryption, Integrated FW, Integrated VPN, and Data Security

►Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebCheck secure browsing

Page 27: Endpoint  Security Current  portfolio and  looking forward

2727©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Agenda

1 Background: Current Endpoint Portfolio

2 Looking Forward: Endpoint Security R80

3 Conclusion

Page 28: Endpoint  Security Current  portfolio and  looking forward

2828©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Conclusion

Check Point continues to improve its portfolio with innovative and performant solutions R73, Abra, SecureConnect for iPhone

Later this year, R80 will bring us to a new way of managing Endpoint Security

After being the first one to release a (really) unified client to the market, no doubt that we will be the first one to release a (really) unified management

Page 29: Endpoint  Security Current  portfolio and  looking forward

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Questions?

Page 30: Endpoint  Security Current  portfolio and  looking forward

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Thank you!