Alfa Romeo 156 · PDF fileAlfa Romeo 156. table of contents 156
156-215.77 Check Point Certified Security Administrator
Transcript of 156-215.77 Check Point Certified Security Administrator
11©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Check Point Security Offering
Unified ManagementIntegrated Solutions
on Appliances, Servers and VM
softwareblades
SimplerSimplerMore, Better, Simpler SecurityMore, Better, Simpler Security
©2010 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties
MORE, BETTER, SIMPLER Security
44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Check Point - Global Security Leader
100% Security100%
Security
► 100% focus on security► 1,500 security experts► 66,000 Check Point certified professionals
worldwide
► 100% focus on security► 1,500 security experts► 66,000 Check Point certified professionals
worldwide
LeaderLeader
► Global firewall/VPN leader and mobile data encryption leader
► 170,000 protected businesses, 100% of Fortune 100► 60 million users► 2009 – Revenues: $924M, Net: $505M
► Global firewall/VPN leader and mobile data encryption leader
► 170,000 protected businesses, 100% of Fortune 100► 60 million users► 2009 – Revenues: $924M, Net: $505M
Global FootprintGlobal
Footprint
► 2,300 employees, HQ in Israel and USA, 80 offices in 30 countries
► 3,000 partners in 88 countries► 120 authorized training centers
► 2,300 employees, HQ in Israel and USA, 80 offices in 30 countries
► 3,000 partners in 88 countries► 120 authorized training centers
55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Track Record of Innovation
2009 Software Blades
93 94 95 96 97 98 99 00 01 02 03 04 05 06 07 08
Establishment
FireWall-1 1.0,Stateful Inspection
VPN-1
Small business
Application Intelligence
IDS/IPSSSL VPN
Websecurity
Acquisition of
Architecture
VPN-1 Power,VPN-1 UTM
Pointsecacquisition
1994FW
1998VPN
2004UTM
09 10
Power-1, UTM-1
Virtualization security
Nokia securtiyacquisition
FacetimeTechnologyacquisition
66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Challenge #1: Security Everywhere
Customers: From Consumer & Small business (5 sites) to Huge sites
(1000’s sites, 100K nodes) Users:
From my dad (one out of 30,000,000 ZoneAlarm users) to the security experts
System size: From SmartPhone to High-end Multi CPU machines
Performance: From 100Kbit to over 100Gigabit
77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Challenge #2: Understanding your products and customers
Successful products are developed for real customers Try it yourself
Ask your peers for feedback on your products We use our own products
Check Point IT uses Check Point Products At Home with Consumer and Small Office Products
Early Availability Program – In Production Products are for sale… - Under why customer paid?
What was the value for them?
99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Challenge #3: Distributed development groups
Leverage & integrate products & technology developed by distributed groups Learn to work within distant teams and time zones.
Operate as teams rather than client-service provider Give ownership of important parts to remote teams Pick up the phone, find counter parts Bridge culture, integrate different development
terminology/methods
1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Challenge #4: Innovation
- Innovation Lab
+ + x =
1 idea 2 PassionateEntrepreneurs
( )1 month of the innovation
lab powered by the mentor
GreatSuccess
…And many other innovation tools
- 3-3-3 System
1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For Everyone |
Product and Sales Functions in Check Point
Development Development
Customer Reach
Customer Reach
► Marketing► Sales (Business, Technical)► Support & Professional Services
► Marketing► Sales (Business, Technical)► Support & Professional Services
► Product Management► R&D and QA► Security Content Development
► Product Management► R&D and QA► Security Content Development