Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition...

20
1 ©2019 Check Point Software Technologies Ltd. ©2019 Check Point Software Technologies Ltd. Philipp Slaby | SE Team Leader C h e c k P o i n t I n f i n i t y Cloudy with a Chance of a Breach

Transcript of Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition...

Page 1: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

1©2019 Check Point Software Technologies Ltd. ©2019 Check Point Software Technologies Ltd.

Philipp Slaby | SE Team Leader

Check Point InfinityCloudy with a Chance of a Breach

Page 2: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

2©2019 Check Point Software Technologies Ltd.

Check Point: The Largest Global Cyber Security Company

Global Leader – 100,000+ Customers, 88+ Countries, 6,200+ Partners

Over 25 years of cutting edge technologies, Industry’s most visionary player

Traded on Nasdaq since 1996 - CHKP

5,100+ Employees worldwide, top talent

Innovation leadership – highest number of developers

T R U S T E D BY F O R T U N E 5 0 0 C O M PA N I E S

Page 3: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

3©2019 Check Point Software Technologies Ltd.

Where are we ?

Gen IV

PAYLOADGen II

Gen III

Gen I

NETWORKSAPPLICATIONS

VIRUS

MEGA

1990 2000 2010 2015 2017

Enterprises are protected for Gen 2-3attacks2.8

Page 4: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

4©2019 Check Point Software Technologies Ltd. 4©2019 Check Point Software Technologies Ltd.

WHAT INGREDIENTS DO WE NEED ?

Page 5: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

5©2019 Check Point Software Technologies Ltd.

Page 6: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

6©2019 Check Point Software Technologies Ltd.

Infinity Shared Intelligence Powered by ThreatCloud

Used by more than 100K Check Point Customers

• Emulates more than • 4 million files per day

• Stops 7,000 zero-day files per Day

• 86 billion • Transactions per day

Page 7: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

[Internal Use] for Check Point employees

Page 8: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

Services Technology Partners

Page 9: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

9©2019 Check Point Software Technologies Ltd.

25 Years of Recognition

Customers’ Choice for Unified Threat Management

Endpoint: Top Product Scoring: 17.5 / 18

Endpoint: A leader in Endpoint Security

Mobile: Highest Mobile security value

Network: Customers’ Choice for Unified Threat Management

Network: Highest cyber prevention score in NGFW

Network: 19th time Security Leader in Magic Quadrant

Cloud: Dome9, a cool vendor in Cloud Security

Page 10: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

10©2019 Check Point Software Technologies Ltd.

JUDY

MAJOR ATTACKS

Malware injectedinto benign

apps on Google Play

Connects to C&C server,

which delivers payload

Malware points browser to targeted websites

36m infected users installed with mobile

malware

Mobile Threat Prevention

Page 11: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

©2019 Check Point Software Technologies Ltd.

WHAT IS “THE CLOUD”?

Page 12: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

CLOUDdifferent things, to different people

IaaS

SaaS

PaaS

Page 13: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

The Shared Responsibility Model

Customer responsible for security in the cloud

Customer Data

Platform, Applications, IAM

Operating System, Network and FW Configs

Client-side Data Encryption & Data

Integrity Authentication

Server-side Encryption (File System / Data)

Network Traffic Protection (Encryption,

Integrity, Identity)

Cloud vendor responsible for security of the cloudCloud Global

InfrastructureRegions

Availability ZonesEdge Locations

Compute Storage Database Networking

Page 14: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

Security Challenges IN the Cloud

General IssuesShared ResponsibilityMinimal Native VisibilityEver-Changing WorkloadsMulti & Hybrid Cloud ArchitectureReal Time Prevention

Outside ThreatsMalware Zero-day ThreatsAccount TakeoverGen V Attacks

Inside ThreatsMisconfigurationCredentials ExploitInsider ThreatCompliance and Regulations

Page 15: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

Who Is Responsible For Your Cloud Security?

“Through 2020, 95% of cloud security

failures will be the customer’s fault.”

Is the Cloud Secure? March, 2018

Page 16: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

16©2019 Check Point Software Technologies Ltd.

The first 15 minutes!

Page 17: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

17©2019 Check Point Software Technologies Ltd.

From 0 to hacked in minutes

Page 18: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

18©2019 Check Point Software Technologies Ltd.

Guiding Principals for Cloud Security

[Internal Use] for Check Point employees

Advanced Threat Prevention

Automated Cloud Security Blueprint

Adaptive Cloud Security Operation

SECURITY AT THE SPEED OF DEVOPS

Page 19: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

19©2019 Check Point Software Technologies Ltd.

CloudGuard Includes Dome9

Comprehensive Security for Private, Public , Hybrid & Multi-Cloud

• Market-leading breach prevention

• Securely connect your hybrid cloud

• Adaptive policy for macro-segmentation

• Full security visibility and control

• Cloud services and applications are never exposed

• Continuous compliance for cloud native services

Page 20: Check Point Infinity - WKO.at · ©2 hec oint oftare Technologies Ltd 9 25 Years of Recognition Customers’ Choice for Unified Threat Management Endpoint: Top Product Scoring: 17.5

20©2019 Check Point Software Technologies Ltd. Services Technology Partners