©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новинки Check Point Антон Разумов arazumov@checkpoint.com Check Point Software Technologies.

Презентация:



Advertisements
Похожие презентации
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Evaluating Security Solutions for the Network Selecting Network Security Solutions.
Advertisements

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Комплексные решения безопасности масштаба предприятия. Решения от компании Check.
© 2007 Cisco Systems, Inc. All rights reserved.SNRS v Secured Connectivity Examining Cisco IOS VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. SND v Configuring a Cisco IOS Firewall Defending Your Network with the Cisco Firewall Product Family.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Identifying Voice Networking Considerations Identifying Design Considerations for Voice Services.
Designing Security Services © 2004 Cisco Systems, Inc. All rights reserved. Implementing Network Security Using the SAFE Security Blueprints ARCH v
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 15 Configure the Cisco Virtual Private Network 3000 Series Concentrator for LAN-to-LAN.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 10 Configure the Cisco VPN 3002 Hardware Client for Remote Access Using Pre-Shared.
© 2003, Cisco Systems, Inc. All rights reserved. CSVPN Lesson 7 Configure the Cisco VPN Firewall Feature for IPSec Software Client.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Remote Connectivity Design Review Analyze network requirements: –Type of applications, the.
© 2006 Cisco Systems, Inc. All rights reserved.SNRS v Adaptive Threat Defense Examining Cisco IOS Firewall.
Designing Virtual Private Networks © 2004 Cisco Systems, Inc. All rights reserved. Designing Site-to-Site VPNs ARCH v
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Cisco High Availability Options.
Designing Network Management Services © 2004 Cisco Systems, Inc. All rights reserved. Designing the Network Management Architecture ARCH v
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Structuring and Modularizing the Network Using a Modular Approach in Network Design.
Designing Virtual Private Networks © 2004 Cisco Systems, Inc. All rights reserved. Designing Remote- Access VPNs ARCH v
Introducing Cisco Network Service Architectures © 2004 Cisco Systems, Inc. All rights reserved. Introducing the Cisco AVVID Framework ARCH v
© 2006 Cisco Systems, Inc. All rights reserved. SND v Module Summary IDS technology is passive; it monitors the network for suspicious activity and.
© 2006 Cisco Systems, Inc. All rights reserved.ISCW v IPsec VPNs Configuring IPsec Site-to-Site VPN Using SDM.
© 2007 Cisco Systems, Inc. All rights reserved.DESGN v Introducing the Cisco Service-Oriented Network Architecture Applying a Methodology to Network.
Транксрипт:

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новинки Check Point Антон Разумов Check Point Software Technologies Консультант по безопасности

2 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Компании развиваются 2 Tele- working Application sharing Connecting branch offices ing with outsiders on PDAs Web applications Extranets Instant messaging IP Telephony Mobile workers

3 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. IPS UTM VPN Firewall Развитие интегрированных шлюзов

4 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. IPS UTM VPN Firewall Personal firewall Disk Encryption Anti-Virus VPN Client Защита в едином агенте на конечных точках

5 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. SMART Security Management Architecture Management Compliance Reporting Monitoring IPS Personal firewall UTM Disk Encryption VPNAnti-Virus FirewallVPN Client Единая консоль управления

6 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. 31% Others 33% Cisco 25% Juniper 11% Source: Frost & Sullivan, World Firewall IPSec VPN Gateway Markets, 2006 Only major 100% pure security-focused software provider Essential products, services and partners to lead industry Longevity and experience to better defend against existing and emerging threats Frost & Sullivan ranks Check Point as #1 in worldwide market share in the firewall & IPSec VPN market Worldwide Leader in Firewall and IPSec VPN Gateways

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Шлюзы безопасности Total Security UTM-1 Power-1

8 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Механизмы защиты Total Security Intrusion prevention subscription Anti spyware subscription Web application firewall expansion SSL VPN expansion Web Filtering subscription VPN (site-to-site, remote access) standard Antivirus (at the gateway) subscription The best Firewall in the market HTTPFTP Instant Msg P2P VoIPSQL standard * End of Q Messaging security subscription NEW!

9 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Pro-active Protection (ex: 2007)

10 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Gateway security landscape Point product providersRequirementsPure security Firewall IDS/IPS Messaging Security Remote access Content Security Firewall Vendors VPN Vendors IDS/IPS Vendors Msg Sec Vendors Content Vendors Market leading firewall with Application Intelligence IPS/IDS – dedicated and integrated VPN: site-to-site, access, client/clientless, IPSEC/SSL Unified, managed, integrated into the gateway Content & Messaging Security Data Leak Prevention* Any scale, size, performance, virtualization, availability Firewall with application awareness IDS/IPS VPN Site-to-site / remote access Data, content, messaging security Virtualization, availability, scalability Unified, managed, integrated with endpoint * planned Check Point is only company to integrate these security components into single gateway Scaleable for any size with Unified Management

11 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. List Price The Expanded Appliance Line 4 FW Throughput (Gbps) Small Office / Branch Small Office / Branch SMB / Medium Branch SMB / Medium Branch $5K$20K$55K Enterprise Perimeter / Core / Large Branch Enterprise Perimeter / Core / Large Branch UTM-1 Edge X32 $15K$45K$10K$35K$25K$2.5K UTM UTM UTM UTM UTM UTM M2 M6 M8 Power Power

12 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Новые модели начального уровня 3 новых UTM-1 Total Security Новые модели начального уровня с ценой от $5,000 Высокая производительность от 400 Mbps до 4 Gbps Комплексная безопасность Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam Обновления безопасности включены в стоимость Встроенное централизованное управление UTM-1 270UTM-1 570UTM

13 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Рекордное отношение цена/производительность –От $4/Mbps Высочайшая производительность и безопасность –Пропускная способность шлюзов до 14 Gbps –Предотвращение атак до 6 Gbps Удобное внедрение –ПО и железо от одного вендора High Security for High Performance Environments Power Power

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Внутренние угрозы. Что делать?

15 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Кто нас атакует? PriceWaterHouseCoopers : The Global State of Information Security (2007) Who attacked us? Security ExecutivesOnly Employee/former employee51%69%84% Hacker54%41%40%

16 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Проблемы безопасности рабочих станций Malware: viruses, worms, spyware, zero-day Простой систем, затраты на восстановление, кража паролей Secure Access: ensure control, confidentiality Неавторизованный доступ, перехват, неуправляемые ПК Data Loss: lost/stolen endpoint devices Соответствие законодательству, ущерб репутации Management: multiple agents, consoles Рост стоимости, трудозатрат, низкая производительность

17 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Единая система управления для контроля всей системы ИБ

18 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Наиболее полное решение Снижает риски на рабочих станциях Снижает риски на рабочих станциях Унифицирует основные компоненты защиты Унифицирует основные компоненты защиты Единственное решение, включающее и защиту данных и VPN Единственное решение, включающее и защиту данных и VPN Снижает риски на рабочих станциях Снижает риски на рабочих станциях Унифицирует основные компоненты защиты Унифицирует основные компоненты защиты Единственное решение, включающее и защиту данных и VPN Единственное решение, включающее и защиту данных и VPN Antivirus Anti-spyware Data Security VPNFirewall/NAC 15 years leadership in firewalls Based on award- winning ZoneAlarm Market-leading Pointsec ® technology 12 years leadership in remote access VPN Unified Management

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Выводы

20 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Perimetrix: Самые популярные средства ИБ Самые популярные средства ИБ

21 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

22 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

23 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

24 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

25 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

26 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

27 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point PURE Security

28 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Итог Простота, снижение расходов Но не в ущерб безопасности!!! –И все под контролем

29 [Public]For everyone ©2003–2008 Check Point Software Technologies Ltd. All rights reserved. ENDPOINT One single security client GATEWAY One unified product line MANAGEMENT One single console totalsecurity from Check Point

©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Антон Разумов Check Point Software Technologies Консультант по безопасности