1©2019 Check Point Software Technologies Ltd. ©2019 Check Point Software Technologies Ltd.
Philipp Slaby | SE Team Leader
Check Point InfinityCloudy with a Chance of a Breach
2©2019 Check Point Software Technologies Ltd.
Check Point: The Largest Global Cyber Security Company
Global Leader – 100,000+ Customers, 88+ Countries, 6,200+ Partners
Over 25 years of cutting edge technologies, Industry’s most visionary player
Traded on Nasdaq since 1996 - CHKP
5,100+ Employees worldwide, top talent
Innovation leadership – highest number of developers
T R U S T E D BY F O R T U N E 5 0 0 C O M PA N I E S
3©2019 Check Point Software Technologies Ltd.
Where are we ?
Gen IV
PAYLOADGen II
Gen III
Gen I
NETWORKSAPPLICATIONS
VIRUS
MEGA
1990 2000 2010 2015 2017
Enterprises are protected for Gen 2-3attacks2.8
4©2019 Check Point Software Technologies Ltd. 4©2019 Check Point Software Technologies Ltd.
WHAT INGREDIENTS DO WE NEED ?
5©2019 Check Point Software Technologies Ltd.
6©2019 Check Point Software Technologies Ltd.
Infinity Shared Intelligence Powered by ThreatCloud
Used by more than 100K Check Point Customers
• Emulates more than • 4 million files per day
• Stops 7,000 zero-day files per Day
• 86 billion • Transactions per day
[Internal Use] for Check Point employees
Services Technology Partners
9©2019 Check Point Software Technologies Ltd.
25 Years of Recognition
Customers’ Choice for Unified Threat Management
Endpoint: Top Product Scoring: 17.5 / 18
Endpoint: A leader in Endpoint Security
Mobile: Highest Mobile security value
Network: Customers’ Choice for Unified Threat Management
Network: Highest cyber prevention score in NGFW
Network: 19th time Security Leader in Magic Quadrant
Cloud: Dome9, a cool vendor in Cloud Security
10©2019 Check Point Software Technologies Ltd.
JUDY
MAJOR ATTACKS
Malware injectedinto benign
apps on Google Play
Connects to C&C server,
which delivers payload
Malware points browser to targeted websites
36m infected users installed with mobile
malware
Mobile Threat Prevention
©2019 Check Point Software Technologies Ltd.
WHAT IS “THE CLOUD”?
CLOUDdifferent things, to different people
IaaS
SaaS
PaaS
The Shared Responsibility Model
Customer responsible for security in the cloud
Customer Data
Platform, Applications, IAM
Operating System, Network and FW Configs
Client-side Data Encryption & Data
Integrity Authentication
Server-side Encryption (File System / Data)
Network Traffic Protection (Encryption,
Integrity, Identity)
Cloud vendor responsible for security of the cloudCloud Global
InfrastructureRegions
Availability ZonesEdge Locations
Compute Storage Database Networking
Security Challenges IN the Cloud
General IssuesShared ResponsibilityMinimal Native VisibilityEver-Changing WorkloadsMulti & Hybrid Cloud ArchitectureReal Time Prevention
Outside ThreatsMalware Zero-day ThreatsAccount TakeoverGen V Attacks
Inside ThreatsMisconfigurationCredentials ExploitInsider ThreatCompliance and Regulations
Who Is Responsible For Your Cloud Security?
“Through 2020, 95% of cloud security
failures will be the customer’s fault.”
Is the Cloud Secure? March, 2018
16©2019 Check Point Software Technologies Ltd.
The first 15 minutes!
17©2019 Check Point Software Technologies Ltd.
From 0 to hacked in minutes
18©2019 Check Point Software Technologies Ltd.
Guiding Principals for Cloud Security
[Internal Use] for Check Point employees
Advanced Threat Prevention
Automated Cloud Security Blueprint
Adaptive Cloud Security Operation
SECURITY AT THE SPEED OF DEVOPS
19©2019 Check Point Software Technologies Ltd.
CloudGuard Includes Dome9
Comprehensive Security for Private, Public , Hybrid & Multi-Cloud
• Market-leading breach prevention
• Securely connect your hybrid cloud
• Adaptive policy for macro-segmentation
• Full security visibility and control
• Cloud services and applications are never exposed
• Continuous compliance for cloud native services
20©2019 Check Point Software Technologies Ltd. Services Technology Partners