CHECK POINT Mobile Security Revolutionized. [Restricted] ONLY for designated groups and individuals

Similar documents
BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Mobile Workforce. Connect, Protect, and Manage Mobile Devices and Users with Junos Pulse and the Junos Pulse Mobile Security Suite.

Mobile Device Management

Chris Boykin VP of Professional Services

Defending Behind The Device Mobile Application Risks

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Secure Your Mobile Workplace

Securing mobile devices in the business environment

Practical Attacks against Mobile Device Management (MDM) Michael Shaulov, CEO Daniel Brodie, Security Researcher Lacoon Mobile Security

Simple security is better security Or: How complexity became the biggest security threat

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

User Documentation Web Traffic Security. University of Stavanger

Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing

Guideline on Safe BYOD Management

Securing Corporate on Personal Mobile Devices

The Key to Secure Online Financial Transactions

How To Protect Your Mobile Device From Attack

Cisco Advanced Malware Protection. Ross Shehov Security Virtual Systems Engineer March 2016

Security Best Practices for Mobile Devices

ENTERPRISE MOBILITY USE CASES AND SOLUTIONS

Assuring Application Security: Deploying Code that Keeps Data Safe

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite

Kaspersky Security for Mobile

The Incident Response Playbook for Android and ios

Practical Attacks against Mobile Device Management Solutions

Uncover security risks on your enterprise network

What Do You Mean My Cloud Data Isn t Secure?

Kaspersky Security 10 for Mobile Implementation Guide

Introducing KASPERSKY ENDPOINT SECURITY FOR BUSINESS.! Guyton Thorne! Sr. Manager System Engineering!

Marble & MobileIron Mobile App Risk Mitigation

Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus

The dramatic growth in mobile device malware. continues to escalate at an ever-accelerating. pace. These threats continue to become more

Tutorial on Smartphone Security

PULSE SECURE FOR GOOGLE ANDROID

BYOD: BRING YOUR OWN DEVICE.

Endpoint protection for physical and virtual desktops

Answers to these questions will determine which mobile device types and operating systems can be allowed to access enterprise data.

Five Trends to Track in E-Commerce Fraud

Cloud Services Prevent Zero-day and Targeted Attacks

The Secure Web Access Solution Includes:

EndUser Protection. Peter Skondro. Sophos

CEH Version8 Course Outline

Why you need. McAfee. Multi Acess PARTNER SERVICES

BYPASSING THE ios GATEKEEPER

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

The Benefits of SSL Content Inspection ABSTRACT

RFI Template for Enterprise MDM Solutions

[CEH]: Ethical Hacking and Countermeasures

Internet threats: steps to security for your small business

Enabling Seamless & Secure Mobility in BYOD, Corporate-Owned and Hybrid Environments

Symantec Mobile Management 7.1

ONE STEP AHEAD of hackers, cybersecurity, threats and the competition

Cloud App Security. Tiberio Molino Sales Engineer

Trend Micro Incorporated Research Paper Adding Android and Mac OS X Malware to the APT Toolbox

Data Security on the Move. Mark Bloemsma, Sr. Sales Engineer Websense

Readiness Assessments: Vital to Secure Mobility

Protecting Android Mobile Devices from Known Threats

Next Gen Firewall and UTM Buyers Guide

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Cyber Security Metrics Dashboards & Analytics

Cryptography and Network Security Chapter 21. Malicious Software. Backdoor or Trapdoor. Logic Bomb 4/19/2010. Chapter 21 Malicious Software

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

Windows Phone 8.1 Mobile Device Management Overview

isheriff CLOUD SECURITY

The Hillstone and Trend Micro Joint Solution

IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

Breaking the Cyber Attack Lifecycle

Data Protection Act Bring your own device (BYOD)

Conducting a Risk Assessment for Mobile Devices

Symantec Advanced Threat Protection: Network

Cisco Advanced Malware Protection for Endpoints

Cortado Corporate Server

Storgrid EFS Access all of your business information securely from any device

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

Symantec Mobile Management 7.2

Impact of Data Breaches

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Malicious Software. Malicious Software. Overview. Backdoor or Trapdoor. Raj Jain. Washington University in St. Louis

Mobile Security and Management Opportunities for Telcos and Service Providers

GiftWrap 4.0 Security FAQ

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Keystroke Encryption Technology Explained

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

BYOD: End-to-End Security

Transcription:

CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 1

Rapidly Expanding Mobile Threats MOBILE THREATS are ESCALATING in frequency and sophistication EVERY YEAR First mobile virus 1 2004 2005 2007 First iphone 2008 First Android SMS Trojans 2010 1 st malware for Android and ios 11.6 million mobile devices infected 2 2012 Root exploits Banking malware 2014 CABIR worm, Infecting Symbian OS via Bluetooth connection 1 Source: Symantec, A Brief History of Mobile Malware February 2014 2 Source: Kindsight Security Labs Malware Report 2013 Spyware Ransomware [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 2

Expanding Network for the CIO Protecting Across ALL Networks Protect Documents Everywhere Protect Devices on Other Networks Protect Own Network [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 3

Infection or Loss Easy as 1, 2, 3 SURF THE INTERNET FORGET DEVICE UPLOAD FILES TO THE CLOUD [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 4

So maybe you only did one of these Now By the number of Employees = C O N S E R V A T I V E number of potential B R E A C H E S on your network [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 5

Today s Solutions Leave Security Gaps Device management focused No protection for data once it leaves the device No capability to secure devices from threats Complex management requiring multiple consoles How do you protect devices from T H R E A T S? How do you protect D A T A wherever it goes? [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 6

Introducing. Establishes a secure business environment on mobile devices Secures your documents everywhere they go Protects devices from threats everywhere SEAMLESS security for everywhere you go [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 7

A Secure Business Environment SECURELY log-in EASILY ACCESS business applications ***** PLACE ONLY business information under IT s control Protect business data E V E R Y W H E R E [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 8

Bring Your Own Device - BYOD Personal data & apps Business information Use Personal Devices for Business Data NOT MANAGED MANAGED Only Business Data is Managed Remotely Wipe Business Data 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 9

Secure documents at your organization My-Company NO passwords SEAMLESS access for authorized users GRANULAR document permissions Secure documents E V E R Y W H E R E they go [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 10

Protected Document Structure Protected document is an envelope with friendly explanation and real protected content Protection Information Content Encryption Keys, Protection Setting Friendly Document Explaining the user how to get started with system Real Document in Hidden Encrypted Part 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 11

Capsule Cloud IPS Application Control URL Filtering Anti-Bot Anti-Virus Threat Emulation Security as a Cloud Service All of Check Point s blades as a service 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 13

Cloud.Checkpoint.com 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 14

Single Security Management for On Premise and Cloud On Premise Security Gateways Check Point Capsule [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 15

Integrated IT Experience and Management Know WHERE documents are sent Know WHEN unauthorized access is attempted Know WHO is accessing files Know WHAT actions are taken [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 16

Introducing Capsule Mobile Threat Prevention MOST advanced mobile threat prevention solution BEST catch rate in the industry HIGHLY experienced technology team LEADING PROVIDER of comprehensive enterprise mobile threat detection, prevention and mitigation for ios and Android 2015 Check Point Software Technologies Ltd. [Restricted] ONLY for designated groups and individuals 17

Threat Technologies Advanced App Analysis Sandboxing (Emulation) Advanced Static Code Analysis Uncovers new malware and targeted exploits Network Anomaly Detection Wi-Fi Man-inthe-Middle (MitM) attacks Evasive botnets and time bomb malware Host Threat Analysis Malicious Configurations Exploits and file system manipulation Threat Framework Multidimensional Risk/Trust assessments Accurate risk classifications to effectively mitigate risk 2015 Check Point Software Technologies Ltd. Restricted] ONLY for designated groups and individuals 18

Identifies Malicious Applications 2015 Check Point Software Technologies Ltd. 19

Runs on All Platforms PLATFORMS ios Android Mac OS X Windows DOCUMENTS Microsoft Office Adobe PDF Only solution providing C O M P R E H E N S I V E coverage [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 20

Single Solution for Mobile Security NEW Protecting devices from threats Protect Network Traffic Secure Business Environment Encrypt Business Documents SINGLE SOLUTION FOR MOBILE SECURITY 2015 Check Point Software Technologies Ltd. Restricted] ONLY for designated groups and individuals 23

Capsule Workspace 2015 Check Point Software Technologies Ltd. 46

Capsule Workspace Remote Terminal/App access over Web Sockets 2015 Check Point Software Technologies Ltd. 47

MDMs Needs and Gaps The Need: Protect the business environment Allow secure access to corporate data The Gap: Managing the whole device rather than securing the data Keeping the user experience ActiveSync apps data and credential leakage Separate management solution for mobile security 2015 Check Point Software Technologies Ltd. 55

Is containing the data enough? Is it enough to work alone? Do you need to share information? 2015 Check Point Software Technologies Ltd. 63

MAM/Container Needs vs. Gaps The Needs: Sharing business data securely Making sure mobile devices are not compromised The Gaps: Data is only secured when stored in a container No threat prevention Duplicate remote access infrastructure 2015 Check Point Software Technologies Ltd. 67

The Sony Hack Hackers infiltrated the computer network of Sony Pictures Attackers stole a huge number of confidential documents Those documents were password protected Sony held passwords in a file named 'passwords' 2015 Check Point Software Technologies Ltd. 69

What does it mean? Using file password protection(zip, PDF, etc.) Using the same password over and over Keeping passwords in one file Send password in the email body 2015 Check Point Software Technologies Ltd. 70

The Need The Need: Prevent loss of sensitive data (documents) The Gap: No widely-deployed secure solutions (definitely not password-protection) 2015 Check Point Software Technologies Ltd. 71

Our vision Single solution End to end protection Evolving with the threats Intuitive UI Making security simple and faster 2015 Check Point [Restricted] Software ONLY Technologies for designated Ltd. groups and individuals 90 2014 Check Point Software Technologies Ltd. 90

Try it now [Restricted] ONLY for designated groups and individuals [Restricted] ONLY for designated groups and individuals 2014 Check Point Software Technologies Ltd. 93