Securing Virtualization with Check Point and Consolidation with Virtualized Security



Similar documents
Cloud and VM Based Security

Check Point taps the power of virtualization to simplify security for private clouds

Securing the private cloud

雲 端 發 展 與 安 全 趨 勢. 陳 建 宏 Jovi Chen 技 術 顧 問 2011 Check Point Software Technologies Ltd. [Unrestricted] For everyone

Proactively Secure Your Cloud Computing Platform

Virtualized Security: The Next Generation of Consolidation

DOWNTIME CAN SPELL DISASTER

Meeting the Challenges of Virtualization Security

WHO ARE WE AND WHAT WE DO?

Zscaler Internet Security Frequently Asked Questions

Cisco-Citrix Alliance

Vyatta Network OS for Network Virtualization

How Solace Message Routers Reduce the Cost of IT Infrastructure

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Aerohive Networks Inc. Free Bonjour Gateway FAQ

Imperva SecureSphere Appliances

VMware vcloud Networking and Security Overview

Astaro Gateway Software Applications

HAWAII TECH TALK SDN. Paul Deakin Field Systems Engineer

MANAGED EXCHANGE SOLUTIONS Secure, Scalable and Compliant Hosted Environments

Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers

CHECK POINT. Software Blade Architecture

VMware Software Defined Network. Dejan Grubić VMware Systems Engineer for Adriatic

Virtual Machine in Data Center Switches Huawei Virtual System

50. DFN Betriebstagung

Successfully Deploying Globalized Applications Requires Application Delivery Controllers

Netzwerkvirtualisierung? Aber mit Sicherheit!

SDN PARTNER INTEGRATION: SANDVINE

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Unified Threat Management, Managed Security, and the Cloud Services Model

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Hyper-V Network Virtualization Gateways - Fundamental Building Blocks of the Private Cloud

Business Case for a DDoS Consolidated Solution

Data Center Virtualization and Cloud QA Expertise

Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015

APV9650. Application Delivery Controller

Secure Cloud-Ready Data Centers Juniper Networks

VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION

A Case for Overlays in DCN Virtualization Katherine Barabash, Rami Cohen, David Hadas, Vinit Jain, Renato Recio and Benny Rochwerger IBM

The first agentless Security, Virtual Firewall, Anti- Malware and Compliance Solution built for Windows Server 2012 Hyper-V

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

SOFTWARE DEFINED NETWORKING

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

Top 10 Reasons Enterprises are Moving Security to the Cloud

Keith Luck, CISSP, CCSK Security & Compliance Specialist, VMware, Inc. kluck@vmware.com

Security Administration R77

Networking and High Availability

Providing Secure IT Management & Partnering Solution for Bendigo South East College

TRILL Large Layer 2 Network Solution

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

StoneGate. High Availability Firewall and Multi-Link VPN. Security Availability Manageability Scalability

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Chapter 11 Cloud Application Development

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

OVERLAYING VIRTUALIZED LAYER 2 NETWORKS OVER LAYER 3 NETWORKS

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Securing Virtual Applications and Servers

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Outgoing VDI Gateways:

How Network Virtualization can improve your Data Center Security

The Cisco ASA 5500 as a Superior Firewall Solution

SOLUTION BRIEF Citrix Cloud Solutions Citrix Cloud Solution for On-boarding

Purpose-Built Load Balancing The Advantages of Coyote Point Equalizer over Software-based Solutions

Networking and High Availability

Silver Peak s Virtual Acceleration Open Architecture (VXOA)

SofaWare Management Architecture Basics

The Application Front End Understanding Next-Generation Load Balancing Appliances

Junos Space Virtual Control

Forcepoint Stonesoft Management Center

Content Scanning for secure transactions using Radware s SecureFlow and AppXcel together with Aladdin s esafe Gateway

PRODUCTS & TECHNOLOGY

Routing Security Server failure detection and recovery Protocol support Redundancy

McAfee Next Generation Firewall (NGFW) Administration Course

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

F5 and VMware Solution Guide. Virtualization solutions to optimize performance, improve availability, and reduce complexity

INTRODUCTION TO FIREWALL SECURITY

Enterprise Buyer Guide

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution

Lecture 02b Cloud Computing II

Securing Networks with PIX and ASA

A10 Networks IPv6 Overview. November 2011

February Considerations When Choosing a Secure Web Gateway

JUNIPER. One network for all demands MICHAEL FRITZ CEE PARTNER MANAGER. 1 Copyright 2010 Juniper Networks, Inc.

VMware vcloud Networking and Security

Huawei One Net Campus Network Solution

Getting More Performance and Efficiency in the Application Delivery Network

Network Segmentation in Virtualized Environments B E S T P R A C T I C E S

Move over, TMG! Replacing TMG with Sophos UTM

74% 96 Action Items. Compliance

Emerging Trends in the Network Security Market in India, CY 2013

Transcription:

Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized infrastructure with Check Point Virtual Edition (VE) August, 2012

Increasing Network Complexity Need More Simplicity and Less Complexity More complex networks with increasing segmentation drives up cost More advanced threats requiring multi-layered defense Sales Policy 6 VPN Customer Policy 7 Policy 5 More policies with many rules to meet growing business demands Web Partner Internet Policy 1 Policy 2 Policy 3 Email Policy 8 Finance Policy 13 Legal Engineering Policy 4 Data Center Marketing Policy 10 HR Policy 9 Policy 12 Policy 11

The Shift to Private Clouds Check Point Virtual Systems Added Partner Sales VS Policy 2 Internet Policy 1 Datacenter Web email Finance HR Legal VS Policy 3 VS Policy 4 VPN Customer Marketing Engineering Policy 1 VS Policy 5 VS Policy 6 Virtualized Gateways Simplify Private Cloud Security

Virtualization Can Simplify Security Consolidation Maximize Investment with Optimized Hardware Utilization Lower costs by consolidating multiple security gateways Simplified management from a single management console Scalability Easily expand security protection by adding more virtual systems Seamlessly expand security capacity for future business and network growth Multi-Tenancy Secure multiple networks from a single gateway Customized security and policy per virtual system

The Power of Virtualization for Security For 10 Years, Check Point VSX on dedicated hardware has delivered value and security for hundreds of our customers Consolidate Up to 250 Gateways to Secure Many Customers & Networks Multi-VSs with Central Management Using Check Point SM and MDSM Highly Scalability and Full Redundancy with VSLS Check Point VSX Appliances

Software Blades for Virtual Systems Firewall IPS Application Control Identity Awareness URL Filtering Antivirus Anti-Bot Mobile Access* Software Blades on Virtual Systems Virtual System on any Platform and Open Servers Software Blade Security on Every Virtual System * SSL VPN available in later release

Simplify and Consolidate Security One-Click Virtual System Creation Simple Virtualization Wizard and provisioning templates ONE Gateway Security with Virtual Systems Finance HR Partners Dedicated Policy Per Virtual System Customized security functions with granular security policies Web Customers Ease of Operation Resource monitoring on each Virtual System Software upgrades without downtime Inter-VS traffic redirecting via integrated virtual routers and switches Enterprise INTRANET

Performance Boost and Scalability High Connection Capacity 8X concurrent connections with 64-bit GAiA OS Advanced routing options with multiple routing and multicasting protocols Multi-Core Performance Check Point CoreXL technology Enhanced deep packet inspection throughput with security acceleration Linear Scalability Patented VSLS technology Scale up to 8 cluster members

R75.40VS Virtual System Packaging Free VS License VSs x1 Security Gateway + Software Blades + VS License VS VSs License x3 VS VSs License x10 VS VSs License x25 VSs x50 Additional VS Licenses Virtual System price the same for all appliances and open servers Software Blades priced per gateway, can use on all VS instances One complementary Virtual System* per gateway * Available for: 4800, 12200, 12400, 12600, 21400, Power-1 9000, Power-1 1000, IP-1280, IP-2450 and open servers with 4 cores or more

Summary Check Point Virtual Systems Maximize Security Gateway Investment Advanced Security with Software Blades High Scalability and Performance Simple Deployment and Provisioning Simplifying Security for Private Clouds

Private Cloud Cost Reduction Shrinking 1,000 servers that use 100K watts into 100 servers that uses 10K watts IT as a Service IT becomes an ISP within the corporation

Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically

Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically Hypervisor

Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically Ensure Security in dynamic environment

Check Point Virtual Edition R75.20 Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual

Secure the Virtual Infrastructure Protects Virtual Machines VE Hypervisor security Certified by Ware Hypervisor Hypervisor Connector Audit virtualization system

Virtual Edition Features Best Security Check Point Software Blades All Software Blades Firewall Anti-Virus IPS URL Filtering VPN Flexible Security Mobile Access DLP Application Control Identity Awareness VE Hypervisor Connector Hypervisor

Virtual Edition Features Best Security s Protection All Software Blades Flexible Security Securing New s Automatically Secure Dynamic Environment VE Inspecting Inter- Traffic Hypervisor Connector Hypervisor

Virtual Edition Features Best Security s Protection All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment VE Hypervisor Connector Hypervisor

Virtual Edition Features Best Security s Protection Unified Management All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment Same management for Physical and Virtual Virtualize the Management

Virtual Edition Features Best Security s Protection Unified Management All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment Same management for Physical and Virtual Virtualize the Management Hypervisor Connector Hypervisor

Cloud Providers Security Needs Multi-tenancy: Servicing Multiple Customers From the Same Environment Cloud Secure connection to the Cloud Security of the Cloud Security within the Cloud

Check Point Cloud Security Check Point Secures the Public Clouds Use VSX for secure connectivity with the Public Cloud Secure s and Inter-s connection with Security Gateway Virtual Edition Offer Multi-tenancy management and customized policy via Multi-Domain Management

Virtualized Security Scenarios VE Hypervisor Connector Hypervisor Securing the Virtual Environment Use the new Virtualization Software Blade to apply granular Firewall and IPS policy on traffic between virtual machines. VE Hypervisor Office in a Box Use the Security Gateway VE with FW, IPS, VPN and any other software blade to secure your office networks and assets VE VE VE Enterprise Security Gateways Hypervisor Consolidate your Security Gateways deployment into a virtualized environment.

Cloud Security Best Practices Use Firewall to segment between Virtual Machines Use IPS to secure s from External and Internal threats Let the same security Admin manage both physical and virtual policy from a single console Ensure full security with zero downtown-time during live migration Log and audit all Virtualization events and traffic

Summary Check Point Pioneers the Cloud Security Virtual Security Gateway For Multi-Tenant Cloud Environments Best Hypervisor security for Virtual Machines The only solution with unified management for Physical and Virtual