Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe mkoldov@checkpoint.com



Similar documents
How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Deploying Cisco ASA VPN Solutions Exam.

Proven LANDesk Solutions

Best Practices for Outdoor Wireless Security

Whitepaper. Securing Visitor Access through Network Access Control Technology

Check Point Positions

Endpoint Security Considerations for Achieving PCI Compliance

ARCHITECT S GUIDE: Comply to Connect Using TNC Technology

Delivering Control with Context Across the Extended Network

How To Improve Your Network Security

Chapter 1 The Principles of Auditing 1

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

This chapter covers the following topics: Network admission control overview NAC Framework benefits NAC Framework components Operational overview

Cisco TrustSec Solution Overview

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

Check Point Endpoint Security. Single agent for endpoint security delivering total protection and simplified management

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Strategic Road Map for Network Access Control

ForeScout CounterACT. Device Host and Detection Methods. Technology Brief

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

PURE Security. Revolutionising the way you think about IT Security. Protected infrastructure and data. Unified security architecture

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Best Practices for Secure Remote Access. Aventail Technical White Paper

ARCHITECT S GUIDE: Mobile Security Using TNC Technology

Embracing Complete BYOD Security with MDM and NAC

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

CHECK POINT. Software Blade Architecture

SSL-Based Remote-Access VPN Solution

Next Gen Firewall and UTM Buyers Guide

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

Cisco ASA 5500 Series Business Edition

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network security strategy to meet new threats and simplify IT security operations

IP Telephony Management

Frank Andrus WHITEPAPER. CTO, Bradford Networks. Evolve your network strategy to meet new threats and achieve expanded business imperatives

Unified Threat Management, Managed Security, and the Cloud Services Model

Tech Brief. Enterprise Secure and Scalable Enforcement of Microsoft s Network Access Protection in Mobile Networks

Securing BYOD With Network Access Control, a Case Study

NAC at the endpoint: control your network through device compliance

Technology Blueprint. Enforcing Endpoint Compliance on the network. Police your managed and unmanaged systems with Network Access Control (NAC)

Network Access Control (NAC) and Network Security Standards

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

SonicWALL Secure Wireless Network

CA Anti-Virus r8.1. Benefits. Overview. CA Advantage

Did you know your security solution can help with PCI compliance too?

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

Sygate Secure Enterprise and Alcatel

How to Implement an Integrated GRC Architecture

On and off premises technologies Which is best for you?

Policy Management: The Avenda Approach To An Essential Network Service

Data Protection McAfee s Endpoint and Network Data Loss Prevention

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Remote Vendor Monitoring

Network protection and UTM Buyers Guide

Avaya Identity Engines Portfolio

» WHITE PAPER X and NAC: Best Practices for Effective Network Access Control.

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Solutions for admission control and data loss prevention in a modern corporate network

The ForeScout Difference

Network Control Meets Endpoint Security

InfoExpress Cyber Gatekeeper. How to quote? Günter Neuleitner. März 2009

Braindumps QA

Cisco ASA 5500 Series Content Security Edition for the Enterprise

End Point Security & Network Access Control

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Security Considerations for DirectAccess Deployments. Whitepaper

Meraki: Introduction to Cloud Networking

Endpoint Security for DeltaV Systems

Clean VPN Approach to Secure Remote Access

Cisco Small Business ISA500 Series Integrated Security Appliances

PCI Solution for Retail: Addressing Compliance and Security Best Practices

AVeS Cloud Security powered by SYMANTEC TM

ForeScout MDM Enterprise

Cisco IOS SSL VPN: Router-Based Remote Access for Employees and Partners

Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper

TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

Fortigate Features & Demo

Netzwerkvirtualisierung? Aber mit Sicherheit!

Transcription:

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe mkoldov@checkpoint.com

NAC is Here to Enforce identity-based access policies Control who is accessing what Prevent guests from unauthorized access Allow demonstrable compliance with growing body of regulatory requirements Mitigate the risks of endpoint-borne attacks Check endpoint compliance as a precondition for network access Quarantine and remediate non-compliant endpoints Monitor devices connected on the network Protect against attacks on critical resources 2

Context: NAC and The disappearing perimeter Flat networks are gone. Networks are becoming functionally segmented Internet Partner DMZ Internal Access Network Internal Applications Employee Finance Partner Employee Wireless Database Sales Access controls are being deployed between segments NAC brings identity and compliance awareness into segmentation and access control 3

Network Access Confusion NAC has been over-hyped! Now we re in the trough of disillusionment The rate of pilot-to-production is very low (and these pilots don t come cheap!) The initial promise of clientless NAC is proving to be a mirage Standards are slow to take hold 4

Check Point NAC 199x Identity aware firewall in VPN-1 1999 SecureClient SCV (desktop configuration verification) 2002 Integrity Client Network Access Control (Client Self-Enforcement) Leveraging Existing Investment Integrity & VPN Gateway Access Control Integration (CP Endpoint Security and Cisco VPN Gateways) 2003 Integrity/802.1x LAN Access Control Integration Founding Member of Trusted Network Connect (TNC) Initiative 2004 Clientless Security for Enforcement of Unmanaged PCs Cooperative Enforcement with Connectra 2005 Secure Automated Remediation Cooperative Enforcement with VPN-1 Edge (802.1x) 2007 Unified Management of NAC, Endpoint, and Network Security Infrastructure Enforcement with Intel AMT 2008 CP EPS with VPN-1 UTM/Power 5

You can do it today with Endpoint Security Secure Employee Access with: Endpoint Security Self-Enforcement 802.1x support for VLAN steering Cooperative Enforcement for VPN-1 and UTM-1 All transparent to users! Use Connectra portal for Guest/Partner access Endpoint Security On-Demand (ICS) provides posture checking For partners seeking access to internal applications, Check Point Secure Workspace provides a sanitized virtual platform the organization can trust Use SNX to deliver applications to partners, when needed 6

Summary Endpoint Security one of key NAC components single agent with unified management With Check Point NAC you maximize the value of your investment with Check Point s network and endpoint products Check Point NAC allows you to enter NAC gradually Unified Internal and external (VPN) NAC 802.1x, inline enforcement and client enforcement NAC features enhanced by: Expanded identity and compliance aware firewall Integrated guest management system Easy deployment with minimal impact on users and network 7

Check Point Endpoint Security

Challenges in Endpoint Security Management Too many security agents to manage Multiple administrator consoles to manage one for each agent Administrators require specialized training 9

1st Enterprise Endpoint Security Solution Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access 15 years leadership in firewalls Based on awardwinning ZoneAlarm Market-leading Pointsec technology 12 years leadership in remote access VPN Mitigates the broadest range of endpoint risks Unifies all essential components Only solution that includes both data security and remote access 10

Single Agent for Endpoint Security Unified Management Single Agent for Endpoint Security Firewall/NAC Program Control Antivirus Anti-spyware Data Security Remote Access Easy to Deploy and Manage Only comprehensive endpoint security solution: Firewall, NAC & Program Control Antivirus and anti-spyware Data security Remote Access Single installation Single, intuitive interface Small agent footprint Only solution that includes both data security and VPN 11

Intuitive Dashboard View Infection Alerts Download Packages Direct access to most recent policies Endpoint status & Client connections Antivirus & Antispyware Updates Current License Status Agent Updates 12

Highest-rated Technologies 15 years firewall leadership Rated Highest of 6 Endpoint Products Leader in Gartner Mobile Data Protection Magic Quadrant 7 years in a row Common Criteria EAL 4 certified Over 100 million VPN clients installed Over 80 million PCs protected Best Remote Access IPSec VPN solution 13

Questions? Thank You