Pełne bezpieczeństwo sieci i uŝytkowników końcowych.



Similar documents
Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Cisco Small Business ISA500 Series Integrated Security Appliances

Sophos Certified Architect Course overview

Unified Threat Management Throughput Performance

The Attacker s Target: The Small Business

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

Data Sheet: Messaging Security Symantec Brightmail Gateway Award-winning messaging security for inbound protection and outbound control

Appliance Comparison Chart

White Paper. ZyWALL USG Trade-In Program

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

ANNEXURE TO TENDER NO. MRPU/IGCAR/COMP/5239

Firewall and UTM Solutions Guide

McAfee Endpoint Protection Products

Symantec Endpoint Protection

Astaro Gateway Software Applications

Cisco ISR Web Security with Cisco ScanSafe

How To Protect Endpoints From Attack

The Cisco ASA 5500 as a Superior Firewall Solution

How UTM-1, DLP and Application Control Protect your IT environment

KASPERSKY ANTI-MALWARE PROTECTION SYSTEM BE READY FOR WHAT S NEXT. Kaspersky Open Space Security

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Symantec Messaging Gateway powered by Brightmail

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Symantec Protection Suite Small Business Edition

Network protection and UTM Buyers Guide

Quick Heal Exchange Protection 4.0

Next Gen Firewall and UTM Buyers Guide

INFORMATION PROTECTED

Network Security. Intertech Associates, Inc.

Gateway Security at Stateful Inspection/Application Proxy

Check Point Positions

Networking for Caribbean Development

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

Lesson 5: Network perimeter security

CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.

CYBEROAM UTM s. Outbound Spam Protection Subscription for Service Providers. Securing You. Our Products.

Web Security Update. A Radicati Group, Inc. Webconference. The Radicati Group, Inc. Copyright March 2010, Reproduction Prohibited

Automate your IT Security Services

Cisco Cloud Security Interoperability with Microsoft Office 365

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Firewall Testing Methodology W H I T E P A P E R

Unified Threat Management, Managed Security, and the Cloud Services Model

Next Generation Firewalls and Sandboxing

Securing the Small Business Network. Keeping up with the changing threat landscape

+ web + DLP. Secure 1, 2, or all 3 with one powerful solution. The best security you can get for one or for all.

Your Security Partner of Choice

CHECK POINT. Software Blade Architecture

Cisco Security Appliances

:: Protecting your infrastructure ::

Cyberoam Perspective BFSI Security Guidelines. Overview

IBM Internet Security Systems

Worry-Free Business Security 6.0. External FAQ

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Cisco ASA and Cloud Web Security: Best-in-Class Network Security Combined with Best-in-Class Web Security

Today's security needs in networking

Cyberoam Next-Generation Security. 11 de Setembro de 2015

Symantec Protection Suite Small Business Edition

Software Blade Architecture

Hope is not a strategy. Jérôme Bei

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Symantec Protection Suite Small Business Edition

Small and Midsize Business Protection Guide

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Kaspersky Endpoint Security 8 for Windows and Kaspersky Security Center

USG6300 Next-Generation Firewall

Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Security. Quick Sales Guide

Zone Labs Integrity Smarter Enterprise Security

Proactively protecting your messaging infrastructure with the IBM Lotus Protector for Mail Security solution.

Results of Testing: Juniper Branch SRX Firewalls

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

V1.4. Spambrella Continuity SaaS. August 2

Dell SonicWALL Next Generation Firewall(Gen6) and Integrated Solution. Colin Wu / 吳 炳 東 Colin_Wu1@dell.com

Symantec Messaging Gateway 10.5

Move over, TMG! Replacing TMG with Sophos UTM

Check Point Corporate Logo Usage Guidelines

Powerful and reliable virus and spam protection for your GMS installation

Small Business Protection Guide. Don t Leave Your Business at Risk Protect it Completely

Proven LANDesk Solutions

Cisco ASA 5500 Series Content Security Edition for the Enterprise

USG6600 Next-Generation Firewall

How To Protect Your Computer From A Malicious Virus

Symantec Endpoint Protection

IBM Lotus Protector for Mail Security 2.5. Empower users and extend your IBM Lotus Notes and Lotus Domino security features

Simple security is better security Or: How complexity became the biggest security threat

WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8

PRODUCT CATEGORY BROCHURE. Juniper Networks Integrated

How To Sell Security Products To A Network Security Company

Cisco ASA 5500 Series Business Edition

Endpoint protection for physical and virtual desktops

Check Point Endpoint Security. Single agent for endpoint security delivering total protection and simplified management

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

KERIO TECHNOLOGIES KERIO WINROUTE FIREWALL 6.4 REVIEWER S GUIDE. (Updated April 14, 2008)

Check Point Security Administrator R70

Transcription:

Pełne bezpieczeństwo sieci i uŝytkowników końcowych. Rozwiązania Check Point klasy UTM i endpoint security Piotr Stępniak Channel Manager

The customer environment Impossible to manage Complicated Complex Too many vendors Identity, Access * Prepared May 2007, Data based on our subjective assessment, Size of bubble represents relative size, Data not accurate, nor conclusive. Management Endpoint security Authorization, Authentication Data security Can such complexity deliver a deliver Network a security high level of security? Security management Threat management 2

Introducing Network & Gateways MANAGEMENT Data & Endpoint totalsecurity from Check Point 3

Check Point 2008 Unified Gateways Most scalable Total security solutions From $300 to 20Gbps All protections, one package one price for 3 years 20 SMB Mid Market Enterprise Integrated Appliances Virtualized Solutions (VSX) 12 7 M8 Throughput (Gbps) 4 2.4 1.2 UTM-1 2050 M2 M6 0.4 UTM-1 1050 UTM-1 450 0.2 UTM-1 Safe@Offi Edge ce Price 4

Check Point 2008 Coming now! Introducing the industry s only single solution for endpoint security Firewall / NAC / program control Anti-virus / anti-spyware Data security Single endpoint security agent Remote access / VPN Replaces multiple vendors with a single, simple solution Lower deployment cost Better security 5

Check Point 2008 Policy definition Deployment Provisioning Monitoring Reporting Compliance Single security management console Network gateways Remote access Endpoint PCs Data security Auditing 6

Check Point Total Security Gateways

Check Point Q12008 Most scalable From $300 to 20Gbps Unified Gateways SMB Mid Market Enterprise Integrated Appliances Virtualized Solutions (VSX) 20 12 7 M8 Throughput (Gbps) 4 2.4 1.2 UTM-1 2050 M2 M6 0.4 UTM-1 1050 UTM-1 450 0.2 UTM-1 Safe@Offi Edge ce Price 8

The Expanded Appliance Line Small Office / Branch SMB / Medium Branch Enterprise Perimeter / Core / Large Branch Power-1 9070 FW Throughput (Gbps) 12 7 4 UTM-1 3070 Power-1 5070 M6 M8 2.4 UTM-1 2050 M2 1.2 UTM-1 570 UTM-1 1050 0.4 0.2 UTM-1 270 UTM-1 Edge X32 UTM-1 450 puresecurity $2.5K $5K $10K $15K $20K $25K $35K $45K $55K List Price9

3 new UTM-1 Total Security appliances New entry level model and increased performance range UTM-1 270 UTM-1 570 UTM-1 3070 Introduces new entry level model under $5,000 Delivers high performance from 400 Mbps to over 4 Gbps Comprehensive security Firewall, VPN, intrusion prevention, antivirus, anti-spyware, Web filtering, Web security, and anti-spam All-inclusive security updates for up to three years Built-in centralized management for multiple sites 10

UTM-1 Appliance Specifications UTM-1 270 UTM-450 UTM-1 570 UTM-1 1050 UTM-1 2050 UTM-1 3070 Software Edition NGX R65 NGX R65 NGX R65 NGX R65 NGX R65 NGX R65 10/100 Ports - - - 4 4-10/100/1000 Ports 4 4 4 4 4 10 Firewall Throughput 400 Mbps 400 Mbps 1.1 Gbps 1.2 Gbps 2.4 Gbps 4.5 Gbps VPN Throughput 100 Mbps 200 Mbps 250 Mbps 220 Mbps 380 Mbps 1.1 Gbps Concurrent Sessions 400,000 700,000 500,000 800,000 1.1 Million 1.1 Million VLANs 256 256 256 256 256 256 Storage Capacity 160 Gbps 80 Gbps 160 Gbps 80 Gbps 80 Gbps 160 Gbps Managed Sites 2 3 3 3 5 5 List Price $4,800 $7,500 $8,500 $13,000 $17,000 $24,000 11

What does Total Security look like? Leader in Firewall Market VoIP SQL IM E-mail P2P HTTP FTP VPN (site-to-site, remote access) Gateway Anti-Virus Intrusion Prevention Web Filtering Anti-Spyware SSL VPN Messaging Security NEW! 12

VPN Communities site2site, client2site VPNs easy management: add/remove GWs, define encryption settings for community, Apply 13

Intrusion Prevention Dedicated protections against network, applications & web servers targeted atacks SmartDefense Profiles allow flexible configurations per GW 14

AntiVirus Support for SMTP, POP3, FTP & HTTP protocols ability to Scan, Pass or Block required file types UTM Edge & regular VPN-1 gateways managed from same console 15

URL Filtering predefined categories On/Off & Monitor mode ability to allow/block IPs 16

Six Dimension, Best-in-class Messaging Security Check Point is the only UTM vendor offering 6 Dimension Protection covering ALL 3 threat categories Messaging Firewall and IPS POP3 SMTP IMAP Anti-Spam/Phishing Protection Pattern-based IP Reputation Anti-Virus Protection Signature-based Zero-Hour Protection 6 dimension protection for superior messaging security Protects against advanced spam (image-based, multi-language and zero-day) Easy to deploy and manage 17

A Closer Look at Simplified Management 1 Choose gateways 2 Enable protections 3 Set desired sensitivity 4 Additional details on protection 18

Open Choice Options Check Point Appliances Single vendor for hardware, software and support Includes Integrated Appliance Solutions custom integration of software and IBM hardware Secured by Check Point Appliances Leverage existing hardware vendor relationship Certified by Check Point for interoperability Check Point Software on Open Servers Standardize on a server vendor Leverage existing infrastructure investment 19

Check Point Endpoint Security Single agent for endpoint security

Introducing: Check Point Endpoint Security Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access 15 years leadership in firewalls Based on awardwinning ZoneAlarm Market-leading Pointsec technology 12 years leadership in remote access VPN Mitigates the broadest range of endpoint risks Unifies all essential components Only solution that includes both data security and remote access 21

Single Agent for Endpoint Security Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access Easy to Deploy and Manage Only comprehensive endpoint security solution: Firewall, NAC & Program Control Antivirus and anti-spyware Data security Remote Access Single installation Single, intuitive interface Small agent footprint Only solution that includes both data security and VPN 22

Industry-leading Firewall Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access 15 years of Firewall Leadership Proactive inbound and outbound protection Blocks unwanted traffic Stealth mode - makes endpoints invisible to hackers Segmentation contains outbreaks and enables high granularity network access control 23

Enhanced Program Control Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access Program Advisor Service Automatically enforces program permissions Immediately terminates known malicious programs Ensures only legitimate and approved programs run on PCs How do we do it? Known good application authenticity service Known bad malware identification Hundreds of thousands or applications in Program Advisor database Based on real-time data from millions of endpoints 24

Network Access Control Ensure Endpoint Policy Compliance Firewall/NAC Program Control Unified Management Single Agent for Endpoint Security Antivirus Anti-spyware Data Security Remote Access Internal and VPN NAC Ensures only safe PCs are allowed to access network Cooperative Enforcement with Check Point and 3 rd party gateways 802.1x support enables NAC in multi-vendor networking environments 25

Antivirus / Anti-spyware Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access Eliminate Viruses and other Malware Award-winning engine delivers the best malware protection Highest detection rates Fast antivirus response 12 hours (compared to 24-48 hours industry average) Hourly signature updates 26

Data Security Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access Protect Data from Loss or Theft Check Point is the most widely deployed solution for protecting valuable data Over 14 million seats deployed Based on Pointsec marketleading technology Full Disk Encryption provides the most complete & comprehensive protection for all data Port Protection Keeps data safe by controlling activity on ports and devices Media Encryption encrypts sensitive data transferred via portable media devices such as USB flash drives 27

Check Point Data Security Solutions Check PointMobile Check PointMobile Palm OS Symbian OS Check PointMobile Smartphone Endpoint Security Media Encryption Check PointMobile Pocket PC Media Encryption Endpoint Security Media Encryption Port Management Endpoint Security Full Disk Encryption Windows Endpoint Security Full Disk Encryption Linux 28

Remote Access Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access Ensure Confidential Remote Communications Secure remote VPN access through VPN-1 gateways Only endpoint security solution that includes unified remote access Applies full security policies to the VPN traffic Multiple VPN entry points provides high availability and flexible access 29

Summary Single Agent Single Console for Simplified Execution Powerful Security for Confident Protection Available in 4 options: SecureAccess, Full Disk Encryption, Media Encryption & Total Security 30

Questions? 31