[Unrestricted]—For everyone Check Point Software Technologies Ltd. All rights reserved. Check Point Endpoint Security Secure. Fast. Simple
Jan 21, 2016
[Unrestricted]—For everyone©2009 Check Point Software Technologies Ltd. All rights reserved.
Check Point Endpoint SecuritySecure. Fast. Simple
2[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Endpoint Security Challenges Today The Check Point Solution
– Comprehensive endpoint security– Secure, fast and simple to use– Market leading data security– Optimized Total Security
Summary
AgendaAgenda
3[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
2009~9 solutions
19941 solution
The Evolution of Endpoint SecurityThe Evolution of Endpoint Security
Antivirus
Remoteaccess/
VPN
Data leakage
Firewall
Antivirus
Anti-spam
Full DiskEncryption
MediaEncryptionAnti-
malwareNAC
More threatsMore threats
More technologiesMore technologies
More complexityMore complexity
4[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Too Much End User ComplexityToo Much End User Complexity
Security updates and patching
Repeated security logons
Multiple security applications
Reconnecting to VPN
Multiple passwords
Trying to reconfigure VPN
5[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Fast-Growing Web ThreatsFast-Growing Web Threats
VC's automated Twitter feed spreads malware
BusinessWeek site hacked, serving drive-by exploits
Drive-By Download Poisons
Google Search ResultsMay, 2009
September, 2008
June, 2009
Malware now spreads through the web not email
Forrester June, 2008
6[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
The Headache of Data SecurityThe Headache of Data Security
53%
65%
12,000
61%
of professionals have confidential data on their laptop
don’t protect them
stolen laptops in U.S. airports/week
of data breaches due to lack of policy enforcement
Dell & Ponemon Institute, Airport Insecurity: the case of lost laptops, June 30, 2008
7[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
More Regulations, More ComplianceMore Regulations, More Compliance
PIPEDA
PCIHIPAA SOX Gramm-Leach-Bliley Act
95/46/EC European Union Directive
DPA Data Protection ActIndian IT Act of 2000
Privacy Act 1988
Japanese Law Personal Information Protection Law
8[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Endpoint Security NeedsEndpoint Security Needs
Highest level of endpoint protection
Simplified user experience
Corporate data loss prevention
Reduced complexity
9[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Endpoint Security Challenges Today The Check Point Solution
– Comprehensive endpoint security– Secure, fast and simple to use– Market leading data security– Optimized Total Security
Summary
AgendaAgenda
10[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Check Point Endpoint SecurityCheck Point Endpoint Security
2008 The First and Only Single Agent
for Endpoint Security
2009 Introducing Endpoint Security R73
11[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Check Point Endpoint SecurityCheck Point Endpoint Security
Market-Leading Data Security
Transparent and Simple to Use
Comprehensive Endpoint Protection
Optimized Total Security
12[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
ComprehensiveEndpoint Protection
13[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Complete Endpoint SecurityComplete Endpoint Security
Most comprehensiveendpoint solution in asingle agent Integrated VPN Integrated data security
Innovative levelsof protection WebCheck Secure
Browsing Program Control
14[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Most Secure Endpoint SecurityCheck Point WebCheckMost Secure Endpoint SecurityCheck Point WebCheck
http://www.mywebsite.comhttp://www.cheap-software.com
Dual browser mode
Segregates corporate data from the Internet
Isolates potential threats in the virtual browser sandbox
Protects against drive-by downloads and phishing attacks
Trusted siteUntrusted siteWebCheck enabled
Stops Web threats at the browser
15[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Check Point WebCheckCheck Point WebCheck
Threat DescriptionTraditional
Endpoint Security
Drive-by downloads
Stealth download of malware via browser vulnerability Secure virtual
browsing Signature update (if available)
Drive-by downloads via external plug-in
Stealth download of malware via plug-in process launched outside the browser Secure virtual
browsing Signature update (if available)
Drive-by download via toolbar plug-in
Stealth download of malware via vulnerable toolbar plug-in Secure virtual
browsing Signature update (if available)
Highest level of protection
16[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Authorized Applications
Check Point Program ControlCheck Point Program Control
Protect from malware by controlling endpoint applications
Lock down endpoint to reduce support costs and complexity
Easy to maintain with Program Advisor service automating application policy decisions
17[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Transparent and Simple to Use
18[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Transparent User ExperienceTransparent User Experience
InterfaceSingle
AgentSingle
UpdateSingle
ScanSingle
LogonSingle
19[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Data security
Endpoint
Windows
VPN
Check Point OneCheck Single LogonCheck Point OneCheck Single Logon
OneCheck
Reduce complexity of
multiple authentications
Transparentand simple
to use
20[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Stay connected on the move
Connect securely from hotspots
Configure new connections automatically
VPN Auto ConnectVPN Auto Connect
Automatically reconnect when moving between
networks (LAN, WiFi, GPRS)
Automatically open hotspot registration page immediately upon connection
Determine the correct
configuration and connect
automatically
Transparentand simple
to use
21[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Transparent and FastTransparent and Fast
Smallest disk footprint after install
Smallest memory footprint (before, during and after scan)
Fastest scan in the industry(62% faster than closest competitor)
Fastest Web page download with WebCheck enabled
22[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Market Leading Data Security
23[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Check Point Data SecurityCheck Point Data Security
Full Disk Encryption
Complete data security with 256-bit
encryption
File /folder encryption
Pre-boot authentication
Enforce password policies with more than 100 different smartcard models
Media Encryption
Control all activities and access on ports Transparently encrypt all removable media
Control data loss on all endpoints
24[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Secure data on all platforms
Highest level of certification
Recognized across the industry
Data Security Market LeaderData Security Market Leader
Mac
Linux Smartphones
Windows 7
Best MobileDevice Solution
Product ExcellenceEncryption
Solution
Leader in Magic Quadrant9 Years in a Row
Gold Medal 2009 Reader’s Choice Awards
25[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Rapid Large-Scale DeploymentRapid Large-Scale Deployment
EW modeEliminate management
scalabilityserverless management
Flexible agentDeploy only what
you need
Open architectureCo-exist with
3rd-party products
Windows-integratedlogon
Data security with no user disruption
Endpoint distribution utility
Use existinginstallation tools
Meet compliance objectives and secure corporate data now!
150,000 endpoints encrypted, .00066 failure rate
Telecommunications Company
50,000 endpoints secured in 30 daysGovernment Agency
26[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Optimized Total Security
27[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Total Security Challenge TodayTotal Security Challenge Today
Lack of policy orchestration
Weak threatcoverage
Infrastructure duplication
Separation of endpoint and network
security
28[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Cooperative EnforcementCooperative Enforcement
Built-in Network Access Control Control endpoint access
to corporate network Coordinate network and
endpoint security policies
Enforce endpoint compliance Quarantine non-compliant
systems
QUARANTINED
29[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Security Infrastructure OptimizationSecurity Infrastructure Optimization
Network Security Endpoint Security
Server consolidation
Simplemanagement
Simpledeployment
30[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Worldwide coordinated network and endpoint threat research
Unified Threat ResearchUnified Threat Research
Update Protection against Microsoft Office Web Components Multiple ActiveX Controls Remote Code Execution Vulnerability (MS09-043)
Endpoint Security R72
Security Gateway R70
VPN-1 NGX R65
IPS-1
Protection Provided by:
CVE-2009-0562
CVE-2009-1136
Industry Reference
MSFT Security BulletinSource:
CriticalSeverity:
15-Jul-09Date Published:
CPAI-2009-1029Check Point Reference:
Overview Details ProtectionSubscribe
Check PointProtection Update
Unified notifications for new threats
Multi-layered protection across endpoint and network security
Common threat definitions across endpoint and network
31[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Endpoint Security ManagementEndpoint Security Management
Easy Deployment, Easy Management with Single Console
ComingSoon
32[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
Corporate data loss prevention
Your Opportunity with Check PointYour Opportunity with Check Point
User transparency and ease of use
Best endpoint security
Reduced complexity
33[Unrestricted]—For everyone
©2009 Check Point Software Technologies Ltd. All rights reserved.
SummarySummary
Market-Leading Data Security
Transparent and Simple to Use
Comprehensive Endpoint Protection
Optimized Total Security