Check Point End Point ATEA Sikkerhetsdag



Similar documents
Capabilities Statement

Electronic Crime Scene Investigation: A Guide for First Responders, Second Edition

Managing Devices. Lesson 5

Driving Company Security is Challenging. Centralized Management Makes it Simple.

The User is Evolving. July 12, 2011

Enforcing PCI Data Security Standard Compliance

Windows 7, Enterprise Desktop Support Technician

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Best Practice Document Hints and Tips

Personal WiFi Hotspot

FortiClient dialup-client configurations

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Configure Posture. Note. Cisco AnyConnect Secure Mobility Client Administrator Guide, Release 4.1 1

BASIC INSTRUCTIONS TO CONFIGURE ZYXEL P8701T CPE USING THE WEB INTERFACE

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Embracing Complete BYOD Security with MDM and NAC

COURCE TITLE DURATION CompTIA A+ Certification 40 H.

A new Secure Remote Access Platform from Giritech. Page 1

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel Fax Page 1 of 14

Strategic Road Map for Network Access Control

MaaS360 Mobile Service

Installing, Configuring and Administering Microsoft Windows

Industrial Security for Process Automation

Using a VPN Connection

CLEARPASS ONGUARD CONFIGURATION GUIDE

McAfee Endpoint Protection Products

Wireless Networking for Small Businesses, Branches and Home Offices

SSL VPN Service. Once you have installed the AnyConnect Secure Mobility Client, this document is available by clicking on the Help icon on the client.

Server must be connected to the internet via high-speed internet connection.

Redefining Endpoint Security: Symantec Endpoint Protection Russ Jensen

Advanced Diploma In Hardware, Networking & Server Configuration

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05

Chapter 1 The Principles of Auditing 1

Global Endpoint Security Products Market: Protecting the Last Line of Defense from Emerging Threats. N July 2011

Home Networking MR-002. ABC s of Home Networking User s Guide to Understanding the Basics of Home Networks

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

Emerging Trends in the Network Security Market in India, CY 2013

What s New in PCI DSS Cisco and/or its affiliates. All rights reserved. Cisco Systems, Inc 1

Course: Information Security Management in e-governance

Client Security Risk Assessment Questionnaire

Simple, secure content sharing on the move: the evolved portable wireless server from Sony that s made for your mobile

13 Ways Through A Firewall

Mobile Devices and Systems Lesson 02 Handheld Pocket Computers and Mobile System Operating Systems

RouterBOARD product overview. September, Gon Tel: +44 (0) Fax: +44 (0)

Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment

USER GUIDE: MaaS360 Financial IT Reg Enforcement Service

USER GUIDE: MaaS360 Services

Thecus N2100 FAQ. 1. NAS Management

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts

Three steps to the best technology: 1. The Assessment 2. The Dialogue 3. The Recommendation

AP ENPS ANYWHERE. Hardware and software requirements

Mobile device Management mit NAC

PCI DSS. Get Compliant, Stay Compliant Seminar

Endpoint Security Client for Mac

Before you start your SKE course:

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:

I.T. Assurance. Letting you do what you do best... run your business

How To Improve Your Network Security

Who s Endian?

RuggedCom Solutions for

IT Networking and Security

SUPPORT GUIDE FOR USING WLAN AND UPNP

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

Systems Manager Cloud Based Mobile Device Management

Intel(R) IT Director User's Guide

Chapter 02: Computer Organization. Lesson 04: Functional units and components in a computer organization Part 3 Bus Structures

NetLeverage UK ThinPoint Solution Overview Version 2 Copyright 2012 NetLeverage UK

Medical Networks and Operating Systems

NETWORK USER S GUIDE. Multi-Protocol On-board Ethernet Multi-function Print Server and Wireless Ethernet Multi-function Print Server

20688 Managing and Maintaining Windows 8

safend Securing Your Endpoints

Using Remote Desktop Software with the LAN-Cell

Movie Cube. User s Guide to Wireless Function

Kaseya IT Automation Framework

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Student Halls Network. Connection Guide

Solutions for admission control and data loss prevention in a modern corporate network

Lesson 6: 6 EXAMPLES OF EMBEDDED SYSTEMS. Chapter-1L06: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

Transcription:

Check Point End Point ATEA Sikkerhetsdag 25:e Mars 2009 Peter Lönnqvist EndPoint Security Nordic

Check Point - A Global Security Leader Leader Global leader in firewall/vpn* and mobile data encryption More than 100,000 protected businesses More than 60 million consumers 100% of Fortune 100 customers 100% security 100% focus on information security >1,000 dedicated security experts Protecting networks and enterprise data Global ~2,400 employees 71 offices, 28 countries 3,000 partners, 88 countries HQ in Israel and U.S. * Frost & Sullivan 2

Mobilitet en utmaning Utmaningen Mobil utrustning USB-minnen Okontrollerade nätverk Kommunikation på nya sätt» Ny riskexponering» Nya kostnader Recent Incidents of Data Loss Where lost is found at Gardemoen 3

Verksamhetens krav en utmaning Lagar, EuroSOX PCI, PUL, konkurrens...$$$$ Policys, Cobit, PCI, ISO 27000, ITIL, granskningar, konsolidering, budget Executive nivå Administration...$ Kryptering...$ Management nivå Operationell nivå Antivirus...$ VPN...$ Mobilitet...$ FW...$ WEB...$ 4

Hur behandlar ni era slutanvändare? Where lost is found at Gardemoen 5

Endpoint En del av helheten 6

Check Point Klientsäkerhet 7

Check Point Endpoint Security En modulär och enhetlig Endpoint -klient Sammanhållet management Personal Firewall Host-IPS / 802.1x NAC Antivirus Anti-spyware VPN Client Full Disk Encryption Port protection Media Encryption Endpoint Security Client R70 Sammanhållet GUI och tray Förenklad Utrullning Förenklad Felsökning Ökad användar -vänlighet 8

EndPoint Access kontroll Säker åtkomst VPN Integration Corporate Enforcement NAC 802.1x Integration Påtvingad uppdatering Klientskydd Personlig FW Applikations kontroll Antivirus Anti-spyware Host IPS 9

EndPoint Datasäkerhet Dataskydd Hårdiskkryptering Portkontroll USB kryptering Flyttbart media Mobiltelefoner 10

Hårdiskkryptering en överblick Boot Records Highly Sensitive Files User Data Unprotected Open Information MBR PBR Operating System Files Data System (PW Swap etc.) Secured Information File Encryption MBR PBR Operating System Files Data System (PW Swap etc.) Check Point Full Disk Encryption Whole Disk Encryption Master Boot Record Mandatory Access Control Modified Partition Boot Record Operating System System Files (PW Swap etc.) Data 11

Mediakryptering & Portkontroll Mediakryptering & Portkontroll Endpoint PC Wired Wireless Devices USB Bluetooth Memory cards Firewire Infrared Digital cameras Serial WiFi Music players Printer IDE Aktivitetskontroll över följande: Modems Smart phones Printers Keyloggers 12

Sammanhållen Administration Säker åtkomst FDE ME AV/AS Skydd NAC VPN Hårdisk kryptering Media Kryptering Unified Management Grafisk Dash board Antivirus & Anti-spyware regler Reglerverk för NAC Antivirus Rapporter Rapporter Compliance Rapporter - Anslutningar 13

Endpoint En del av helheten PCI Krav https://portal.sslvpn.checkpoint.com/ics/scanpage 14

Check Points fördel Kontroll 15

Summering Klient Minimera antalet agenter (installera, konfigurera, updatera) Funktion (felsökning, interoperabilitet, komplexitet) Administration (Utbildning,kompetens, funktion) Effektivare dator och slutanvändare Helheten Konsolidering - Nätverk och Klient Teknologi som gör jobbet och är beprövad Översikt och enklare rapportering beslutsstöd och compliant 16

Endpoint säkerhetspacketeringar Check Point Endpoint Security Bundles Operating Systems Secure Access F ull Disk Encryption Port Protection Total Security Windows Mac Linux Desktop Firewall Program Control NAC Remote Access VPN 1 1 Antivirus/Antispyware Full Disk Encryption Port Protection Media Encryption 17

Abra 18

Summary ENDPOINT MANAGEMENT GATEWAY One single security client One single console One unified product line totalsecurity from Check Point 19