People - Information Security Leaders

Report
Transforming Security
– People, Policy and
Enforcement
January 2011
Caroline Ikomi
Technical Director
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For Everyone
Boundaries are disappearing
Users Have Different
Use
Work
Use
Different
Share
from
Internet
Anywhere
Data
Devices
Tools
Needs
Boundaries
are disappearing
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
2
2
New environment, new challenges
To secure this new environment,
IT needs to do more
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
3
3
More Security….
…with Less:
Less Resources
Less Time
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
4
4
Introducing…
Policy
People
Enforcement
3D SECURITY
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
5
5
Security as a Business Process
Policy that supports business needs
Policy
Security that involves people
People
Easily enforce security policies
Enforcement
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
6
6
Policy Definition
Legacy:
Now:
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
7
7
People
are an integral part of security
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
8
8
Check Point UserCheck Technology
Educate and Engage end-users
Application Usage Alert
Educates users
on risk and
usage policies
You are trying to access YouTube.
http://www.youtube.com
Corporate application use policy limits YouTube
access to business use only in order to save
bandwidth.
Please select and confirm your use-case:
Makes control
more practical
Personal , Business , or Cancel
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
9
9
Granular Control of all Security layers
Mobile
Access
Granular Visibility
DLP
Application
Control
IPS
SmartEvent
Identity
Awareness
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
10
10
Industry-Leading IPS
Check Point Sets a New
Standard in Latest
NSS Group IPS Test
The Check Point IPS
Software Blade
outperformed nearly every
vendor in overall accuracy
and blocking:



©2011 Check Point Software Technologies Ltd.
|
97.3% Security
Effectiveness
Multi-Gigabit rated
throughput of 2.4Gbps
100% anti-evasion
coverage
[Unrestricted] For everyone
11
11
There’s no Control without Visibility
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
12
12
360º Visibility into All Security Events
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
13
13
Security is about People, not Numbers
Security Is about People, not Numbers
©2011 Check Point Software Technologies Ltd.
|
[Unrestricted] For everyone
14
14

similar documents