Check Point Endpoint Security

Report
Introducing Check Point Endpoint Security
Single agent for endpoint security
Name
Title
puresecurity ™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
1
Agenda
Endpoint Security Solution
Overview
Security Challenges
Single Agent, Single Console
Powerful Security
Summary
Next Steps
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
2
Overview
Endpoint Security Solution
Single Agent
Single Console
Powerful Security
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
for Simplified Execution
for Confident Protection
[Public]—For everyone
3
Agenda
Endpoint Security Solution
Overview
Security Challenges
Single Agent, Single Console
Powerful Security
Summary
Next Steps
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
4
Endpoint Security Challenges
Too many security agents to manage
Multiple admin consoles – a console for each agent
Software compatibility issues between separate agents
Resulting in…
Never enough security
Increased administration time and costs
Multiple test cycles – every time an agent in updated
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
5
1st Enterprise Endpoint Security Solution
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
15 years
leadership in
firewalls
Based on awardwinning
ZoneAlarm
Market-leading
Pointsec®
technology
12 years leadership
in remote access
VPN
 Mitigates the broadest range of endpoint risks
 Unifies all essential components
 Only solution that includes both data security and remote access
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
6
Agenda
Endpoint Security Solution
Overview
Security Challenges
Single Agent, Single Console
Powerful Security
Summary
Next Steps
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
7
Single Agent for Endpoint Security
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Easy to Deploy and Manage
 Only comprehensive endpoint
security solution:
–
–
–
–
Firewall, NAC & Program Control
Antivirus and anti-spyware
Data security
Remote Access
 Single installation
 Single, intuitive interface
 Small agent footprint
Only solution that includes both data security and VPN
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
8
Single Console
Unified Management
Simplify Setup and Deployment
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Quickly and easily
install & update agents
Shared settings
streamlines deployment
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
9
Endpoint Policy Enforcement
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Tracks endpoint
compliance by rule
Enforces policy for 3rd
party antivirus
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
10
Unified Security Architecture
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Unified Endpoint and Network
Security Management
Endpoint Security logs can be
monitored from SmartCenter
Centralized security event correlation,
management and reporting with Eventia®
Suite
Shared management server, log-in, and
console
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
11
Agenda
Endpoint Security Solution
Overview
Security Challenges
Single Agent, Single Console
Powerful Security
Summary
Next Steps
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
12
Industry-leading Firewall
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
15 years of
Firewall Leadership
Proactive inbound and
outbound protection
Blocks unwanted network
traffic
Stealth mode - makes
endpoints invisible to hackers
Segmentation contains
outbreaks and enables high
granularity network access
control
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
13
Network Access Control
Ensure Endpoint Policy Compliance
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
 Internal and VPN NAC
 Ensures only safe PCs are
allowed to access network
Cooperative enforcement
with Check Point and 3rd
party gateways
802.1x support enables
NAC in multi-vendor
networking environments
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
14
Enhanced Program Control
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Program Advisor Service
Automatically protects against the latest
malicious programs
− Immediately terminates known
malicious programs
− Ensures only legitimate and approved
programs run on the PC
How do we do it?
− Known good application authenticity
service
− Known bad malware identification
− Over 300,000 applications in Program
Advisor database
− Based on real-time data from millions
of endpoints
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
15
Antivirus / Anti-spyware
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Eliminate Viruses and
other Malware
 Award-winning engine
delivers the best virus
protection
 Highest detection rates
 Fastest antivirus / antimalware response
− 12 hours (compared to 2448 hours industry
average)
 Hourly signature updates
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
16
Data Security
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Protect Data from Loss or Theft
 Check Point is the most widely
deployed solution for protecting
valuable data
− 14 million seats deployed
 Based on Pointsec® market-leading
technology
Full Disk Encryption – provides the most
complete & comprehensive protection
for all data
Port Protection – Keeps data safe by
controlling activity on ports and devices
Media Encryption – encrypts sensitive
data transferred via portable media
devices such as USB flash drives
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
17
Remote Access
Unified Management
Single Agent for Endpoint Security
Firewall/NAC
Program Control
Antivirus
Anti-spyware
Data
Security
Remote Access
Unified Remote Access
 Secure remote VPN
access through VPN-1®
 Only endpoint security
solution that includes unified
remote access
 Applies full security policies
to the VPN traffic
 Multiple VPN entry points
provides high availability and
flexible access
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
18
Agenda
Endpoint Security Solution
Overview
Security Challenges
Single Agent, Single Console
Powerful Security
Summary
Next Steps
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
19
Highest-rated Technologies
15 years firewall leadership
Rated Highest of 6
Endpoint Products
Leader in Gartner Mobile Data Protection
Magic Quadrant 7 years in a row
Common Criteria EAL 4 certified
Over 100 million VPN clients installed
Over 80 million PCs protected
Best Remote Access
IPSec VPN solution
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
20
Endpoint Security Comparison
Requirements
NetSec
Antivirus
Powerful Security
DataSec
Check Point
Small startups
Firewall/NAC
Program Control
Industry leading
firewall
Antivirus
Anti-spyware
Award-winning
antivirus
Data
Security
Check Point Endpoint Security
Point
is the first single agent
Solutions
for total endpoint security
Market leading
data security
VPN
Market leading
VPN
Unified
Management
Unified,
SMART integration
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
21
Summary
Single Agent
Single Console
Powerful Security
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
for Simplified
Execution
for Confident
Protection
[Public]—For everyone
22
Agenda
Endpoint Security Solution
Overview
Security Challenges
Single Agent, Single Console
Powerful Security
Summary Conclusions
Next Steps
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
23
Next Steps
 Any Questions?
 Additional Data Required?
 May we schedule a follow-up
discussion?
puresecurity™
©2003–2008 Check Point Software Technologies Ltd. All rights reserved.
[Public]—For everyone
24

similar documents