Check Point and Security Best Practices. December 2013 Presented by David Rawle

Similar documents
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Critical Controls for Cyber Security.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

THE TOP 4 CONTROLS.

Looking at the SANS 20 Critical Security Controls

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

The Protection Mission a constant endeavor

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

SANS Top 20 Critical Controls for Effective Cyber Defense

Security Management. Keeping the IT Security Administrator Busy

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

Jumpstarting Your Security Awareness Program

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

5 Steps to Advanced Threat Protection

Cybersecurity Health Check At A Glance

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Patch Management Policy

Information Security for the Rest of Us

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

Assessing the Effectiveness of a Cybersecurity Program

Leveraging SANS and NIST to Evaluate New Security Tools

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Defending Against Data Beaches: Internal Controls for Cybersecurity

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

Top 20 Critical Security Controls

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Managing Enterprise Devices and Apps using System Center Configuration Manager

STREAM FRBC

Network and Security Controls

Hardening Guide. Installation Guide

Client Security Risk Assessment Questionnaire

White Paper: Consensus Audit Guidelines and Symantec RAS

Managed Services Agreement. Hilliard Office Solutions, Ltd. PO Box Phone: Midland, Texas Fax:

HIPAA Privacy and Security Risk Assessment and Action Planning

Security Controls in Service Management

McAfee Endpoint Protection Products

Keyfort Cloud Services (KCS)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

20696B: Administering System Center Configuration Manager and Intune

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

Information Technology Solutions

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Altus UC Security Overview

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Windows Operating Systems. Basic Security

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

A Rackspace White Paper Spring 2010

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Hands on, field experiences with BYOD. BYOD Seminar

Industrial Security for Process Automation

Connecticut Justice Information System Security Compliance Assessment Form

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager

Workflow Templates Library

IT Networking and Security

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Exactly the Same, but Different

INCIDENT RESPONSE CHECKLIST

Cyber Essentials KAMI VANIEA 2

SANS Institute First Five Quick Wins

Information Technology Risk Management

Computer Security: Principles and Practice

Retention & Destruction

INFORMATION SECURITY FOR YOUR AGENCY

Stephen Coty Director, Threat Research

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

End-user Security Analytics Strengthens Protection with ArcSight

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

UMHLABUYALINGANA MUNICIPALITY IT PERFORMANCE AND CAPACITY MANAGEMENT POLICY

GFI White Paper PCI-DSS compliance and GFI Software products

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Protecting the Irreplacable. November 2013 Athens Ian Whiteside, F-Secure

Policy Document. Communications and Operation Management Policy

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Cloud Security Who do you trust?

THE BLUENOSE SECURITY FRAMEWORK

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

28400 POLICY IT SECURITY MANAGEMENT

Managed Security Services

SCAC Annual Conference. Cybersecurity Demystified

MSP Service Matrix. Servers

Ovation Security Center Data Sheet

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Transcription:

Check Point and Security Best Practices December 2013 Presented by David Rawle

Housekeeping o Mobiles on Silent o No File Alarms planned o Fire exits are in front and behind and down the stairs o Downstairs and through the shop

What is the concept of today?

Agenda About us Concepts of Data Security Security Best Practices Check Point Best Practices

About us All the benefits of a small independent reseller with the security of being backed by a large group Ingenuity Agility Responsiveness Passionate and proud about what we do

About us 2.3 Billion 700 Million UK Business 20 Million 150 Million 14 Million

Concepts of Data Security The game has changed Business can t just keep building walls Users want access to Data from everywhere You need to do everything you can to prevent access from malicious sources

Concepts of Data Security Businesses need to do everything they can to make data available in a secure manner With the best will in the world at this time you can t do this with one product; you need a tiered approach If a breach happens you need to know: How that data was accessed What the data was Where that data went

Concepts of Data Security This years RSA Security Keynote themes were around Big Data transforming security What does that mean?

Security best practices

SANS Critical Top 20

SANS Critical Top 20

SANS Critical Top 20

SANS Critical Top 20 Critical Control 1: Inventory of Authorized and Unauthorized Devices Critical Control 2: Inventory of Authorized and Unauthorized Software Critical Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Critical Control 4: Continuous Vulnerability Assessment and Remediation Critical Control 5: Malware Defenses Critical Control 6: Application Software Security Critical Control 7: Wireless Device Control Critical Control 8: Data Recovery Capability Critical Control 9: Security Skills Assessment and Appropriate Training to Fill Gaps Critical Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches

SANS Critical Top 20 Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control Critical Control 17: Data Loss Prevention Critical Control 18: Incident Response and Management Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises

Critical Control 1: Inventory of Authorised and Unauthorised Devices Critical Control 2: Inventory of Authorised and Unauthorised Software

Windows XP End of support 8 th April 2014 So what? If a vulnerability is found in Windows 8, 7 or Vista then it is almost certain that vulnerability will be in XP XP WILL NOT be patched Every patch Tuesday is a list of Zero Day vulnerabilities for Windows XP

Patching Over 70% of vulnerabilities are in Applications WSUS is a great start How do you patch your other software?

Demo

Check Point versions

Which version should you be on? R75.47 Solid build with all current hotfixes R76 Seems to have memory leak issues R77 Newest build but also seemingly more stable than R76

Which version should you be on? R75.47 or R77 is our current recommendation (05/12/13)

Virtual Management Servers

Virtual Management Servers If you are backing up the VM you don t need much space for backups within Gaia Run a separate SmartEvent/Logging box (Not VM) Thick provision where possible

Demo

Multi Domain Management What is it? Do you need it?

Demo

Use the latest build

Software updates in R77 Set to manual it is a useful way of getting hotfixes and upgrade images

Demo

Stay on top of your Rulebase

Demo

Central Device Management in R77

Demo

CPVIEW in R77

Demo

Backups

Demo

Threat Emulation

Demo

SmartLog

Demo

Mobile Enterprise Client More BYOD than MDM Just works up to R77 Will break in R77.10 as it needs a license

Mobile Enterprise Client

Mobile Enterprise Client

Demo

Check Point VS Virtual Firewalling Far more complex Free on high end appliances But.

Demo

Endpoint Deployments We get a disparate amount of Endpoint tickets Why??

Endpoint Deployments IT Security people are used to isolated systems that they control Often they do not consider the end-user element when deploying software Training is essential Reseller to Administrator Administrator to end-user

Endpoint Deployments Do you know how to? Use the one time password feature? Reset a machine in Check Point when it is rebuilt? Recover a machine if the OS becomes corrupt? Even if you know do your Desktop Admin people? That s just FDE

Coming in R77.10? Hotfixes