SlideShare ist ein Scribd-Unternehmen logo
1 von 33
Securing Web 2.0
with Next Generation
Web Security

©2013 Check Point Software Technologies Ltd.
Let’s take a
minute…

©2013 Check Point Software Technologies Ltd.

2
In an Internet Minute:

1.9 Million
Likes

92,593 Hours
Viewed

694,444 Files
Uploaded
©2013 Check Point Software Technologies Ltd.

3
The Web Evolves as Attack Vector:
Sites compromised to spread malware

Applications might pose security risk

Sensitive data might be lost

Social networks used in attacks

©2013 Check Point Software Technologies Ltd.

4
A New Approach
Is Needed!

©2013 Check Point Software Technologies Ltd.

5
Multi-Layered
Web Security

©2013 Check Point Software Technologies Ltd.

6
Check Point’s
Next Generation
Secure Web
Gateway

Educate and
Engage Users
Block Use of
Dangerous Applications
Prevent Malicious
Downloads
Block Access
to Malicious
Sites

©2013 Check Point Software Technologies Ltd.

7
Legitimate Sites Compromised to Spread Malware

“NBC Websites Hacked To Serve Citadel
Financial Malware”
Information Week, February 22, 2013 09:50 AM

©2013 Check Point Software Technologies Ltd.

8
Does Your Secure Web Gateway Download
Protection Updates Once a Day?!

Sometimes old is fine…

…Not in security!
©2013 Check Point Software Technologies Ltd.

9
Check Point’s Next Gen Secure Web Gateway

Powered by Threat Intelligence

URL Filtering
constantly updated

Antivirus uses ThreatCloud—
a vast, collaborative threat
intelligence repository
©2013 Check Point Software Technologies Ltd.

10
But Web is More Than Just URLs…

In

61% of organizations,

a P2P file sharing application is used
Heavily used to spread malware

Open back doors to the network

Legal liability for illegal downloads
©2013 Check Point Software Technologies Ltd.

11
Anonymizers Used to Bypass the Security Policy

Some Applications are
Highly Evasive!

©2013 Check Point Software Technologies Ltd.

12
Does Your Secure Web Gateway
Look only at URLs?!

You Can’t
Afford
to Look Only
Under the
Lamppost!

©2013 Check Point Software Technologies Ltd.

13
Check Point’s Next Gen Secure Web Gateway

Control Thousands of Applications
Over 300 P2P file sharing apps

Over 90 anonymizers
Identify and control even
highly evasive applications

appwiki.checkpoint.com
©2013 Check Point Software Technologies Ltd.

14
Why Use Separate Solutions to Control
Applications and Sites?!

Websites

Applications
Not URL-based

www.hackthissite.org

www.fantasyfootball.com

Facebook Chat

Granularity
beyond URLs

©2013 Check Point Software Technologies Ltd.

15
Check Point’s Next Gen Secure Web Gateway

The Only Solution to Offer
Unified Security!

Unified control, analysis and reporting
over all aspects of Web.
©2013 Check Point Software Technologies Ltd.

16
Sharing is Not Always Caring…

80%

of organizations use file storage
and sharing applications

“Our investigation found that usernames and passwords
recently stolen were used to sign in to Dropbox accounts”
Dropbox blog, July 31, 2012

©2013 Check Point Software Technologies Ltd.

17
Check Point’s Next Gen Secure Web Gateway

Granularly Control Features
Within Applications

Add DLP for extended data protection!
©2013 Check Point Software Technologies Ltd.

18
Social Media Used as Attack Vector

Spread malware

Gather information to be
used in targeted attacks
©2013 Check Point Software Technologies Ltd.

19
Blocking Won’t Help…
I need
to stay in
touch with
customers, partners and
colleagues

Sales

I need
to get the
latest industry
news, articles and
reviews

Social media increasingly
used in the business!

Engineer

©2013 Check Point Software Technologies Ltd.

20
Does Your Secure Web Gateway Allow
Business Continuity While Maintaining Security?

Kids know not to take
candy from strangers…

…Education is key!
©2013 Check Point Software Technologies Ltd.

21
Check Point’s Next Gen Secure Web Gateway
Using Social Media Safely

Easily EducateSocial Networks
Stay safe on and
Engage End-Users
Dear John Smith,

Before proceeding to use Facebook, please
be aware:
•

•

Fake Rihanna videos are actually a virus don't click!
Cyber-criminals might use Social
Networks to gather information in
preparation for an attack - don't accept
friends you don't personally know!
OK, I Understand

Safe browsing,
Maintain business continuity
IT Department
without compromising security!

©2013 Check Point Software Technologies Ltd.

22
Elementary…

Monitoring, analysis and reporting—
a critical part of Web security
©2013 Check Point Software Technologies Ltd.

23
Check Point’s Next Gen Secure Web Gateway

©2013 Check Point Software Technologies Ltd.

24
Check Point’s Next Gen Secure Web Gateway
Executive Summary Reports:

©2013 Check Point Software Technologies Ltd.

25
Check Point’s Next Gen Secure Web Gateway

Detailed user and group activity reports:

©2013 Check Point Software Technologies Ltd.

26
Last But Not Least…

Web security doesn’t have to cost a fortune!
©2013 Check Point Software Technologies Ltd.

27
Check Point’s Next Gen Secure Web Gateway
Example: Web Security for 1,000 users, 1st Year Cost
Traditional
Secure Web Gateway

Check Point
SWG 4800

Only
Subscription Renewal:
$38,990
(street price)

First year – HW+SW:
$31,100
(list price)

©2013 Check Point Software Technologies Ltd.

28
Check Point’s Next Gen Secure Web Gateway
Example: Web Security for 1,000 users, 3 Years’ Cost
Traditional
Secure Web Gateway

Check Point
SWG 4800

HW + SW:
$99,760
(street price)

HW+SW:
$42,150
(list price)

More security—for 57% less!
©2013 Check Point Software Technologies Ltd.

29
Check Point Secure Web Gateway
is Your Safety Net

Enabling you to leverage the power of Web
in your business!
©2013 Check Point Software Technologies Ltd.

30
Educate and Engage
Users

Check Point’s
Next Generation
Secure Web
Gateway

Block Use of
Dangerous Applications
Prevent Malicious
Downloads
Block Access to
Malicious Sites

©2013 Check Point Software Technologies Ltd.

31
Check Point’s
Next Generation
Secure Web
Gateway

Educate and
Engage Users
Block Use of
Dangerous Applications
Prevent Malicious
Downloads
Block Access
to Malicious
Sites

©2013 Check Point Software Technologies Ltd.

32
Thank You

©2013 Check Point Software Technologies Ltd.

Weitere ähnliche Inhalte

Was ist angesagt?

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
SecPod Technologies
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
internetbrasil
 

Was ist angesagt? (19)

NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Why Check Point - Top 4
Why Check Point - Top 4Why Check Point - Top 4
Why Check Point - Top 4
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Why check point win top 4 facts
Why check point win   top 4 factsWhy check point win   top 4 facts
Why check point win top 4 facts
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Check point Infinity Overview
Check point Infinity OverviewCheck point Infinity Overview
Check point Infinity Overview
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 

Andere mochten auch

Andere mochten auch (15)

10 consigli per farsi imprenditore 4. Disponibilità
10 consigli per farsi imprenditore  4. Disponibilità10 consigli per farsi imprenditore  4. Disponibilità
10 consigli per farsi imprenditore 4. Disponibilità
 
Mdd 4-5
Mdd 4-5 Mdd 4-5
Mdd 4-5
 
Nuevo presentación de microsoft power point olga uapa
Nuevo presentación de microsoft power point olga uapaNuevo presentación de microsoft power point olga uapa
Nuevo presentación de microsoft power point olga uapa
 
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazioneSegmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
Segmentazione 5. Sette domande per verificare la bontà della nuova segmentazione
 
NGIPS: Market Drivers, Architecture, and NSS Test Results
NGIPS: Market Drivers, Architecture, and NSS Test ResultsNGIPS: Market Drivers, Architecture, and NSS Test Results
NGIPS: Market Drivers, Architecture, and NSS Test Results
 
Lehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HUG- Marketing and Sales Technology LandscapeLehigh Valley HUG- Marketing and Sales Technology Landscape
Lehigh Valley HUG- Marketing and Sales Technology Landscape
 
10 consigli per farsi imprenditore 1. Così vuoi diventare imprenditore?
10 consigli per farsi imprenditore  1. Così vuoi diventare imprenditore?10 consigli per farsi imprenditore  1. Così vuoi diventare imprenditore?
10 consigli per farsi imprenditore 1. Così vuoi diventare imprenditore?
 
Resume Velez
Resume VelezResume Velez
Resume Velez
 
Time Management
Time ManagementTime Management
Time Management
 
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategiaEsecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
Esecuzione di Strategie 1. abilità di dare seguito operativo alla strategia
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)PT3 English Mid Year Exam Form 3 2016 (A)
PT3 English Mid Year Exam Form 3 2016 (A)
 
Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)Poisoned Talk (Quiz Show)
Poisoned Talk (Quiz Show)
 
Tips & Techniques of Answering PT3 English Paper 2015
Tips & Techniques of Answering PT3 English Paper 2015Tips & Techniques of Answering PT3 English Paper 2015
Tips & Techniques of Answering PT3 English Paper 2015
 
Summary of Learning
Summary of Learning Summary of Learning
Summary of Learning
 

Ähnlich wie Check Point: Securing Web 2.0

Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
crussell79
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
David Berkelmans
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
Careerera
 

Ähnlich wie Check Point: Securing Web 2.0 (20)

19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf19BCP072_Presentation_Final.pdf
19BCP072_Presentation_Final.pdf
 
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud... Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
Security from the Start: Optimizing Your Acquia Experience with Acquia Cloud...
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?How Can I Reduce The Risk Of A Cyber-Attack?
How Can I Reduce The Risk Of A Cyber-Attack?
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Web Security and Network Security
Web Security and Network SecurityWeb Security and Network Security
Web Security and Network Security
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
How do I activate my Webroot keycode?
How do I activate my Webroot keycode?How do I activate my Webroot keycode?
How do I activate my Webroot keycode?
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Advantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdfAdvantages and Disadvantages of Network Security.pdf
Advantages and Disadvantages of Network Security.pdf
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Watch Guard Reputation Enabled Defense (White Paper)Dna
Watch Guard   Reputation Enabled Defense (White Paper)DnaWatch Guard   Reputation Enabled Defense (White Paper)Dna
Watch Guard Reputation Enabled Defense (White Paper)Dna
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
Research Paper
Research PaperResearch Paper
Research Paper
 

Mehr von Group of company MUK

Mehr von Group of company MUK (15)

Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

Check Point: Securing Web 2.0

  • 1. Securing Web 2.0 with Next Generation Web Security ©2013 Check Point Software Technologies Ltd.
  • 2. Let’s take a minute… ©2013 Check Point Software Technologies Ltd. 2
  • 3. In an Internet Minute: 1.9 Million Likes 92,593 Hours Viewed 694,444 Files Uploaded ©2013 Check Point Software Technologies Ltd. 3
  • 4. The Web Evolves as Attack Vector: Sites compromised to spread malware Applications might pose security risk Sensitive data might be lost Social networks used in attacks ©2013 Check Point Software Technologies Ltd. 4
  • 5. A New Approach Is Needed! ©2013 Check Point Software Technologies Ltd. 5
  • 6. Multi-Layered Web Security ©2013 Check Point Software Technologies Ltd. 6
  • 7. Check Point’s Next Generation Secure Web Gateway Educate and Engage Users Block Use of Dangerous Applications Prevent Malicious Downloads Block Access to Malicious Sites ©2013 Check Point Software Technologies Ltd. 7
  • 8. Legitimate Sites Compromised to Spread Malware “NBC Websites Hacked To Serve Citadel Financial Malware” Information Week, February 22, 2013 09:50 AM ©2013 Check Point Software Technologies Ltd. 8
  • 9. Does Your Secure Web Gateway Download Protection Updates Once a Day?! Sometimes old is fine… …Not in security! ©2013 Check Point Software Technologies Ltd. 9
  • 10. Check Point’s Next Gen Secure Web Gateway Powered by Threat Intelligence URL Filtering constantly updated Antivirus uses ThreatCloud— a vast, collaborative threat intelligence repository ©2013 Check Point Software Technologies Ltd. 10
  • 11. But Web is More Than Just URLs… In 61% of organizations, a P2P file sharing application is used Heavily used to spread malware Open back doors to the network Legal liability for illegal downloads ©2013 Check Point Software Technologies Ltd. 11
  • 12. Anonymizers Used to Bypass the Security Policy Some Applications are Highly Evasive! ©2013 Check Point Software Technologies Ltd. 12
  • 13. Does Your Secure Web Gateway Look only at URLs?! You Can’t Afford to Look Only Under the Lamppost! ©2013 Check Point Software Technologies Ltd. 13
  • 14. Check Point’s Next Gen Secure Web Gateway Control Thousands of Applications Over 300 P2P file sharing apps Over 90 anonymizers Identify and control even highly evasive applications appwiki.checkpoint.com ©2013 Check Point Software Technologies Ltd. 14
  • 15. Why Use Separate Solutions to Control Applications and Sites?! Websites Applications Not URL-based www.hackthissite.org www.fantasyfootball.com Facebook Chat Granularity beyond URLs ©2013 Check Point Software Technologies Ltd. 15
  • 16. Check Point’s Next Gen Secure Web Gateway The Only Solution to Offer Unified Security! Unified control, analysis and reporting over all aspects of Web. ©2013 Check Point Software Technologies Ltd. 16
  • 17. Sharing is Not Always Caring… 80% of organizations use file storage and sharing applications “Our investigation found that usernames and passwords recently stolen were used to sign in to Dropbox accounts” Dropbox blog, July 31, 2012 ©2013 Check Point Software Technologies Ltd. 17
  • 18. Check Point’s Next Gen Secure Web Gateway Granularly Control Features Within Applications Add DLP for extended data protection! ©2013 Check Point Software Technologies Ltd. 18
  • 19. Social Media Used as Attack Vector Spread malware Gather information to be used in targeted attacks ©2013 Check Point Software Technologies Ltd. 19
  • 20. Blocking Won’t Help… I need to stay in touch with customers, partners and colleagues Sales I need to get the latest industry news, articles and reviews Social media increasingly used in the business! Engineer ©2013 Check Point Software Technologies Ltd. 20
  • 21. Does Your Secure Web Gateway Allow Business Continuity While Maintaining Security? Kids know not to take candy from strangers… …Education is key! ©2013 Check Point Software Technologies Ltd. 21
  • 22. Check Point’s Next Gen Secure Web Gateway Using Social Media Safely Easily EducateSocial Networks Stay safe on and Engage End-Users Dear John Smith, Before proceeding to use Facebook, please be aware: • • Fake Rihanna videos are actually a virus don't click! Cyber-criminals might use Social Networks to gather information in preparation for an attack - don't accept friends you don't personally know! OK, I Understand Safe browsing, Maintain business continuity IT Department without compromising security! ©2013 Check Point Software Technologies Ltd. 22
  • 23. Elementary… Monitoring, analysis and reporting— a critical part of Web security ©2013 Check Point Software Technologies Ltd. 23
  • 24. Check Point’s Next Gen Secure Web Gateway ©2013 Check Point Software Technologies Ltd. 24
  • 25. Check Point’s Next Gen Secure Web Gateway Executive Summary Reports: ©2013 Check Point Software Technologies Ltd. 25
  • 26. Check Point’s Next Gen Secure Web Gateway Detailed user and group activity reports: ©2013 Check Point Software Technologies Ltd. 26
  • 27. Last But Not Least… Web security doesn’t have to cost a fortune! ©2013 Check Point Software Technologies Ltd. 27
  • 28. Check Point’s Next Gen Secure Web Gateway Example: Web Security for 1,000 users, 1st Year Cost Traditional Secure Web Gateway Check Point SWG 4800 Only Subscription Renewal: $38,990 (street price) First year – HW+SW: $31,100 (list price) ©2013 Check Point Software Technologies Ltd. 28
  • 29. Check Point’s Next Gen Secure Web Gateway Example: Web Security for 1,000 users, 3 Years’ Cost Traditional Secure Web Gateway Check Point SWG 4800 HW + SW: $99,760 (street price) HW+SW: $42,150 (list price) More security—for 57% less! ©2013 Check Point Software Technologies Ltd. 29
  • 30. Check Point Secure Web Gateway is Your Safety Net Enabling you to leverage the power of Web in your business! ©2013 Check Point Software Technologies Ltd. 30
  • 31. Educate and Engage Users Check Point’s Next Generation Secure Web Gateway Block Use of Dangerous Applications Prevent Malicious Downloads Block Access to Malicious Sites ©2013 Check Point Software Technologies Ltd. 31
  • 32. Check Point’s Next Generation Secure Web Gateway Educate and Engage Users Block Use of Dangerous Applications Prevent Malicious Downloads Block Access to Malicious Sites ©2013 Check Point Software Technologies Ltd. 32
  • 33. Thank You ©2013 Check Point Software Technologies Ltd.

Hinweis der Redaktion

  1. http://www.istockphoto.com/stock-photo-3675907-analogue-stop-watch-isolated-on-white.php
  2. http://www.istockphoto.com/stock-photo-4020428-five-seconds.php?st=d78456bhttp://www.businessweek.com/articles/2012-10-04/facebook-the-making-of-1-billion-users#p2 - Each day, Facebook processes 2.7 billion “Likes”, 2.5 billion content items sharedHours of Video watched on YouTube 4,000,000,000 a month 133,333,333 a day 5,555,556 an hour 92,593 a minutehttp://www.youtube.com/yt/press/statistics.html – Over 4 billion hours of video are watched each month on YouTubehttp://youtube-global.blogspot.ca/2013/03/onebillionstrong.html – March 20, 2013: YouTube Hits a Billion Monthly Usershttp://thenextweb.com/insider/2013/02/27/1-billion-files-are-now-being-uploaded-to-dropbox-every-day/ - Dropbox: 1 billion files are now being uploaded every day
  3. http://www.istockphoto.com/stock-photo-3844961-top-secret-file.php?st=1fe26daTwitter: It’s you on photo http://www.zdnet.com/twitter-malware-warning-its-you-on-photo-or-its-about-you-7000001736/
  4. http://www.istockphoto.com/stock-photo-5091675-light-bulb.php?st=9bb1045Threats are coming from different direction – a new approach is needed: multi-layered Web Security
  5. http://www.istockphoto.com/stock-photo-19905144-brushed-metal-shield.php?st=24b2fc0
  6. http://www.istockphoto.com/stock-photo-19905144-brushed-metal-shield.php?st=24b2fc0
  7. How does Ultrasurf Anonymizer Work?Ultrasurf is a very sophisticated anonymizer that worksas a proxy client, creating an encrypted HTTP tunnelbetween the user’s computer and a central pool of proxyservers, enabling users to bypass firewalls and censorship.Ultrasurf has a very resilient design for discovering proxyservers including a cache file of proxy server IPs, DNSrequests, which return encoded IPs of proxy servers,encrypted documents on Google Docs and a hard codedlist of proxy server IPs built into the program. Thesetechniques make it even more difficult to be detected bysecurity devices.
  8. Security 1.0 can’t handle these applications –Can block websites providing proxy avoidance services, but what about Vtunnel, UltraSurf…?“Block UDP on the FW, turn on SSL inspection – all non-standard SSL traffic will be blocked”Not practical…
  9. collect personal information in preparing for a spear phishing attack
  10. Or: Social Media is now an essential business tool
  11. http://www.istockphoto.com/stock-photo-21037762-sherlock-holmes-silhouette-computing.php?st=b5274ebAlternative: http://www.istockphoto.com/stock-illustration-11975852-detective-holding-a-magnifier-and-showing-something.php?st=b5274eb
  12. http://www.istockphoto.com/stock-photo-2765246-money-bags.php?st=e063e67
  13. http://www.istockphoto.com/stock-photo-17147167-scales-of-justice.php?st=0b6931bhttp://www.istockphoto.com/stock-photo-17147227-scales-of-justice.php?st=0b6931b
  14. http://www.istockphoto.com/stock-photo-17147167-scales-of-justice.php?st=0b6931bhttp://www.istockphoto.com/stock-photo-17147227-scales-of-justice.php?st=0b6931b
  15. This safety net can only be achieved by incorporating multiple lines of defense, a multi-layered approach to Web Security
  16. http://www.istockphoto.com/stock-photo-19905144-brushed-metal-shield.php?st=24b2fc0