Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up for a Security Checkup assessment in order to uncover security threats they are exposed to so that they can be aware of any hidden threats and be able to protect themselves on time. The main benefit of the assessment that it is conducted by a security expert who will follow thought-out the process: conduct the security assessment, analyze the findings and advice on how improve security if needed. 1
SOMETIMES, YOUR NETWORK IS FULL OF SURPRISES Your corporate network offers access to valuable and sensitive information. Information that must never fall into the wrong hands. Can you be sure there aren t any hidden surprises threatening your most precious data assets? No stealthy malware, back doors, data leaks or other security vulnerabilities? 2
2014 SECURITY REPORT reveals In order to understand what are the critical security threats organizations are exposed to today and should be addressed in 2014 and beyond, the Check Point security research team analyzed event data from more than 10,000 organizations world wide in 2013. The Check Point 2014 Security Report presents the results of our research. 3
73% 75% 56% 88% 33%? INFECTED WITH BOTS USING P2P APPLICATIONS USING PROXY ANONYMIZERS EXPERIENCED DATA LOSS UNKNOWN MALWARE ORGANIZATIONS ARE VULNERABLE The highlights of our research: 73% of organizations were found infected with bots. In 75% of organizations P2P file sharing applications were detected in use by employees. P2P applications open a backdoor into the corporate network might cause data leakage and malware infections. In 56% of organizations Proxy Anonymizer applications were detected in use by employees. Anonymizers applications bypass security and hide user s web activity. 88% of organizations experienced at least one potential data loss incident. Our research found that 33% of organizations downloaded at least one unknown form of malware. The malware was embedded mainly into PDF, EXEs, archives or Microsoft Office files. Unknown malware refers to zero-days or new forms of malicious code that exploit software vulnerabilities and cannot be detected at the time of exploitation, even by up-todate antivirus, anti-bot or Intrusion Prevention System (IPS) solutions. According to these statistics, most organizations are vulnerable to security threats. 4
WHICH SECURITY THREATS YOUR ORGANIZATION IS EXPOSED TO? Which security threats your organization is expose to? Early exposure of hidden threats will enable you to and address these risks on time and enhance the security your organization. 5
Introducing Check Point introduces it s Security Checkup assessment. In a similar way that a doctor gives you a medical health check to help you understand your health status, a Security Checkup provides a security status of your organization s networks. It will uncover security threats your organization is exposed to. 6
SECURITY CHECKUP THREAT ANALYSIS REPORT At the end of this assessment, you will get a threat analysis report that includes all the security incidents detected during the assessment and a set of recommendations on how to protect against these threats. A security expert will discuss the findings with you and how they can be prevented. 7
SECURITY CHECKUP HELPED ALREADY THOUSANDS OF ORGANIZATIONS SINCE 2012 More than 4,000 Security Checkup assessments have been conducted so far world wide helping organizations of any size and industry be more secure. We offer you the opportunity to conduct a Security Checkup in your organization as well. 8
THE REPORT RISKY WEB APPLICATIONS AND SITES MALWARE INFECTED COMPUTERS EXPLOITED VULNERABILITIES DATA LOSS INCIDENTS BANDWIDTH ANALYSIS COMPLIANCE & SECURITY POLICY CHECK The report covers a full range of security risks: High risk web applications and websites used by employees such as: P2P File Sharing applications, Proxy anonymizers, File Storage applications, malicious websites and more. Analysis of malware threats which include computers infected with bots, viruses and also unknown malware (zero days and malwares that cannot be detected by traditional antivirus systems. Exploited vulnerabilities of servers and computers in the organization indicating possible attacks. Sensitive data sent from inside the organization outside the organization via emails or web. Bandwidth analysis listing the top bandwidth consuming applications and accessed websites that can help organizations understand who and what is hogging your network bandwidth. Compliance and best practices, this section is only relevant to existing Check Point customers with an active Security Management. This section compares the current rule base configuration with Check Point best practices recommendations and also provides a compliance check of the rule base with many of the known industry standards (such as PCI, HIPAA, ISO etc ). 9
PROTECTION RECOMMENDATIONS RISKY WEB APPLICATIONS AND SITES MALWARE INFECTED COMPUTERS EXPLOITED VULNERABILITIES DATA LOSS INCIDENTS BANDWIDTH ANALYSIS COMPLIANCE & SECURITY POLICY CHECK The report also helps to understand what is needed in order to protect against the detected risks. The report includes a section with recommendations on how to protect the organization from these threats. 10
SECURITY CHECKUP ASSESSMENT conducted on-site by security experts SETTING UP A SECURITY GATEWAY CONNECTING TO NETWORK ANALYZING THE FINDINGS DISCUSSING THE FINDINGS using Check Point latest technology to inspect traffic and generating a report and advising how to enhance security Let s see how the Security Checkup assessment works. The assessment is conducted on-site by security experts and includes four main steps: 1. The first step sees the security expert set up a Check Point Security Gateway on which the assessment will be conduced. All relevant Check Point Software blades are being activated and configured (For example: Application Control, URL Filtering, IPS, Anti-Bot, Anti-Virus, Threat Emulation, DLP, Identity Awareness if required, SmartEvent etc ) 2. Next, the device arrives on-site and is plugged into the organization's network to inspect network traffic, without any network downtime and without any need for changes in network configuration. We will discuss how this is being done on the following slides. It is recommended to leave the unit to inspect traffic for at least a week so enough traffic is monitored (but a few days can be enough in some instances). The longer the time period, the better. The assessment can be conducted to either existing Check Point customers or net new customers. 3. In the next step, the security expert will remove the device from the network, analyze the results, and generate the Security Checkup report. 4. In the final step the security expert will present the findings and have an open discussion about security technologies and about security solutions to protect your network and address the weak points detected in the report. 11
EVERYONE BENEFITS FROM THE CHECKUP C-LEVEL EXECUTIVES SECURITY OFFICERS SECURITY ADMINISTRATORS SOC OPERATORS awareness checkup security policy checkup security configuration checkup visibility checkup The report is designed to bring value to anyone in the organization that has a concern with the current security status. It is designed to be easy to read on all levels, even by non security experts. It makes C-level executives aware of the security status within their organization and helps them find out if there are any critical risks that require immediate attention. The report also helps security officers validate the organizational security policy and check whether there are any gaps which require urgent actions, enabling enhancement of their current security architecture. In addition, security administrators can check their current security configuration. Security incidents might indicate that there are some misconfigurations, over permissive security configurations or even limitations in current security solutions. And finally, the report provides operators of the Security Operation Center (SOC) an additional source of visibility into the organizational security posture. Uncovering new security risks they were not aware of such as malware infected computers, might indicate that the existing SOC systems does not provide the security coverage they need. 12
ORGANIZATIONS CANNOT AFFORD NETWORK DOWNTIME Connecting a Security Checkup device into a network might raise the concern of network downtime. We are aware of organizations policies for zero network downtime. We also know that IT network teams are usually reluctant about plugging an external device into their network and/or changing their current network configuration. 13
ZERO RISK TO THE NETWORK vs. connected to Mirror Port or TAP Inline To avoid any risk of downtime and eliminate the need to change network configuration, the Security Checkups have the option of using a Monitor Port (configured on the Security Checkup device). To inspect traffic, the Monitor Port connects to a Mirror Port (also known as Span Port) on a network switch or to a TAP device (Test Access Point). It means that only copied network traffic is being inspected and by that it removes all the challenges of inline connectivity. The Monitor Port does not transmit any traffic to the network and in this way there is no downtime risk and no change to the existing network configuration. 14
WHAT ABOUT PRIVACY? The Security Checkup assessments exposes security incidents and risks which is usually sensitive information for organizations. What about the privacy of this information and what if your policy does not allow us to plug 3 rd party devices into your network? 15
WE RESPECT OUR CUSTOMERS PRIVACY We fully respect our customer's privacy. After all, we are a security company. After monitoring traffic, usually the analysis of the findings and the report creation are done off premise to save customer's time while analyzing the results, however the report can also be generated on-site and the logs can be deleted before the security expert leaves the premises. To make is even more private, the whole assessment can been done on-site, end to end including the setup stage. If the organizational policy does not permit a 3 rd party device plugged into the network, there is also an option to install the Security Checkup device on-site by using a server which will be provided by you (the Hardware needs to be supported by Check Point s Hardware Compatibility List, list available at http://www.checkpoint.com/services/techsupport/hcl/). This way nothing is being brought from outside the organization and nothing is leaving the premises. Only under customer's agreement we collect anonymized information for statistical purposes. This data does not include any information that can reveal the organization identity. 16
WHAT S IN IT FOR YOU? What are the main benefits for you? 17
YOUR BENEFITS AWARENESS of security risks FOCUS and priority on where security needs improvement TECHNOLOGY introduction into new security capabilities These are your key benefits: Better awareness of the security risks you are exposed to and may not have been aware of. The Security Checkup also helps to point out and prioritize the security gaps that require improvement. And finally, you are being introduced to the latest security technology that covers all aspects of network security. 18
GET AN EXPERT S ADVICE This is the part where our expert will help you to address any security issues and can make your organization more secure. Our security experts can be your advisor. 19
SIGN UP FOR YOUR ON-SITE SECURITY CHECKUP WATCH THE VIDEO FILL IN THE REQUEST FORM DOWNLOAD SAMPLE REPORT checkpoint.com/securitycheckup Visit the Security Checkup public landing page. It includes some information about the assessment, a short video and a form to submit a request for a Security Checkup. checkpoint.com/securitycheckup 20
UNCOVER SECURITY RISKS ON YOUR ENTERPRISE NETWORK. SIGN UP FOR CHECK POINT S ON-SITE SECURITY CHECKUP. Uncover security risks on your enterprise network. Sign up for check point s on-site security checkup at checkpoint.com/securitycheckup 21