SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Check Point Endpoint Security



IBM Insight Forum 09   Make change work for you
                                                  ®
2

     Agenda
     A   d
        Endpoint security challenges
            p           y        g
        What is Check Point TotalSecurity
        Demonstration of Technical Functionalities
        Live Demo of WebCheck




IBM Insight Forum 09          Make change work for you
                                                             ®
3

     Issues with Endpoint Security
     I       ith E d i t S     it
        Difficult for administrators
             Complexity and Manageability
             Evolving Vulnerabilities
             Too many point solutions

        Users see it as a hassle
             Everything looks different, difficult for end users
             ‘Stops me doing what I need to’
             Performance




IBM Insight Forum 09                Make change work for you
                                                                       ®
4
     So what is in the End Point Total
     Security?


            Personal Firewall   Antivirus                   Full Disk
                                               VPN Client                  Port protection   Media Encryption
            Host-IPS / NAC      Anti-spyware                Encryption




IBM Insight Forum 09                            Make change work for you
                                                                                                                    ®
5




IBM Insight Forum 09   Make change work for you
                                                      ®
6
     When you g into the office….
          y get




IBM Insight Forum 09   Make change work for you
                                                      ®
7
     When you move some sensitive
           y
     data home….




IBM Insight Forum 09   Make change work for you
                                                      ®
8
     USB Key Enrolment
           y




IBM Insight Forum 09   Make change work for you
                                                      ®
9
     When you g home…..
          y get




IBM Insight Forum 09   Make change work for you
                                                      ®
10
     What the admin sees




IBM Insight Forum 09   Make change work for you
                                                       ®
11




IBM Insight Forum 09   Make change work for you
                                                       ®
12




                       Thank you
                              o

                       Questions?




IBM Insight Forum 09   Make change work for you
                                                       ®

Weitere ähnliche Inhalte

Was ist angesagt?

Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk guptaEMC Forum India
 
Kiwibank: From Startup to Enterprise in 7 years
Kiwibank:  From Startup to Enterprise in 7 yearsKiwibank:  From Startup to Enterprise in 7 years
Kiwibank: From Startup to Enterprise in 7 yearsVincent Kwon
 
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra ProjectBreaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra ProjectVincent Kwon
 
CDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business IntelligenceCDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business IntelligenceVincent Kwon
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008eLiberatica
 
Présentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSOPrésentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSOIBMInfoSphereUGFR
 
IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...Vincent Kwon
 

Was ist angesagt? (9)

Track 1, session 5, beat the backup blues pk gupta
Track  1, session 5, beat the backup blues pk guptaTrack  1, session 5, beat the backup blues pk gupta
Track 1, session 5, beat the backup blues pk gupta
 
Kiwibank: From Startup to Enterprise in 7 years
Kiwibank:  From Startup to Enterprise in 7 yearsKiwibank:  From Startup to Enterprise in 7 years
Kiwibank: From Startup to Enterprise in 7 years
 
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra ProjectBreaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
Breaking Down the Last Bastion of IT Cost - IBM's DB2 Cobra Project
 
CDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business IntelligenceCDP - Global Outlook for Business Intelligence
CDP - Global Outlook for Business Intelligence
 
Z vm-faq
Z vm-faqZ vm-faq
Z vm-faq
 
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
"SocrateOpen after two years" by Remus Cazacu @ eLiberatica 2008
 
Présentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSOPrésentation IBM DB2 Blu - Fabrizio DANUSSO
Présentation IBM DB2 Blu - Fabrizio DANUSSO
 
IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...IBM Cloudburst: Integrated hardware, software and services for simplified clo...
IBM Cloudburst: Integrated hardware, software and services for simplified clo...
 
What is the latest from the IBM OMEGAMON portfolio?
What is the latest from the IBM OMEGAMON portfolio?What is the latest from the IBM OMEGAMON portfolio?
What is the latest from the IBM OMEGAMON portfolio?
 

Andere mochten auch

Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Corporation
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMCourion Corporation
 
PDFCertification
PDFCertificationPDFCertification
PDFCertificationGene Berger
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacksCourion Corporation
 
Check Point Certified Security Admin
Check Point Certified Security AdminCheck Point Certified Security Admin
Check Point Certified Security AdminGene Berger
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Duane Bodle
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Auditkeyuradmin
 
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Javier Ortega
 

Andere mochten auch (15)

10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Phishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAMPhishing: How to get off the hook using Intelligent IAM
Phishing: How to get off the hook using Intelligent IAM
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
PDFCertification
PDFCertificationPDFCertification
PDFCertification
 
4 ways to defend against internal attacks
4 ways to defend against internal attacks4 ways to defend against internal attacks
4 ways to defend against internal attacks
 
Check Point Certified Security Admin
Check Point Certified Security AdminCheck Point Certified Security Admin
Check Point Certified Security Admin
 
Firewall audit
Firewall auditFirewall audit
Firewall audit
 
Forti web
Forti webForti web
Forti web
 
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
Cisco ASA Firewall Interview Question "aka Stump-the-Chump" Question # 01
 
Firewalking
FirewalkingFirewalking
Firewalking
 
How to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall AuditHow to Audit Firewall, what are the standard Practices for Firewall Audit
How to Audit Firewall, what are the standard Practices for Firewall Audit
 
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
Spam Detection with a Content-based Random-walk Algorithm (SMUC'2010)
 
Building a culture of security
Building a culture of securityBuilding a culture of security
Building a culture of security
 

Ähnlich wie Checkpoint - A Practical Demonstration of Endpoint Security

Cisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business TransformationCisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business TransformationVincent Kwon
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Vincent Kwon
 
How FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business OneHow FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business OneVincent Kwon
 
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...Vincent Kwon
 
IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...Vincent Kwon
 
Utility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementUtility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementVincent Kwon
 
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary EducationCyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary EducationVincent Kwon
 
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...Vincent Kwon
 
Certus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of PortalCertus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of PortalVincent Kwon
 
FORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent TimesFORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent TimesLKS, S. Coop.
 
WhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for GrowthWhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for GrowthVincent Kwon
 
Ability Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus NotesAbility Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus NotesVincent Kwon
 
Open systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedOpen systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedVincent Kwon
 
e-Com:Activate content in your business process
e-Com:Activate content in your business processe-Com:Activate content in your business process
e-Com:Activate content in your business processVincent Kwon
 
Granite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS UpdatesGranite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS UpdatesLuis Guirigay
 
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)bisg
 
Lessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionLessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionIBM India Smarter Computing
 
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...Stephan H. Wissel
 

Ähnlich wie Checkpoint - A Practical Demonstration of Endpoint Security (20)

Cisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business TransformationCisco - Collaboration Enabled Business Transformation
Cisco - Collaboration Enabled Business Transformation
 
Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...Macleans - NZ Business taking on the world with a world class IT infrastructu...
Macleans - NZ Business taking on the world with a world class IT infrastructu...
 
How FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business OneHow FrameCAD supported their growth with SAP Business One
How FrameCAD supported their growth with SAP Business One
 
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
IBM Optim - Unlocking the Business Value of Information for Competitive Advan...
 
IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...IBM Portal: Building better citizen services, lowering the cost of service to...
IBM Portal: Building better citizen services, lowering the cost of service to...
 
Utility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset ManagementUtility AP - Best Practice, out of the box with Maximo Asset Management
Utility AP - Best Practice, out of the box with Maximo Asset Management
 
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary EducationCyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
Cyclone Computer: Lessons Learned from Virtualisation in Tertiary Education
 
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
InfoSphere: Leading from the Front - Accelerating Data Integration through Me...
 
Certus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of PortalCertus - User Centred Design - Maximising the Use of Portal
Certus - User Centred Design - Maximising the Use of Portal
 
FORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent TimesFORO_FINANCIERO: Performance Management In Turbulent Times
FORO_FINANCIERO: Performance Management In Turbulent Times
 
WhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for GrowthWhereScape - Business Intelligence for Growth
WhereScape - Business Intelligence for Growth
 
Ability Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus NotesAbility Suite - At Last - easy email archiving for Lotus Notes
Ability Suite - At Last - easy email archiving for Lotus Notes
 
Open systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage ReinventedOpen systems Specialists: XiV Storage Reinvented
Open systems Specialists: XiV Storage Reinvented
 
e-Com:Activate content in your business process
e-Com:Activate content in your business processe-Com:Activate content in your business process
e-Com:Activate content in your business process
 
Granite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS UpdatesGranite Lotus User Group November 2012 ICS Updates
Granite Lotus User Group November 2012 ICS Updates
 
Top brand ibm
Top brand ibmTop brand ibm
Top brand ibm
 
Top brand ibm
Top brand ibmTop brand ibm
Top brand ibm
 
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
Annual Meeting 2010 -- Konczal, John (Sterling Commerce)
 
Lessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in ProductionLessons Learned From Putting Linux on System z in Production
Lessons Learned From Putting Linux on System z in Production
 
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
AD111 - The X Path: Practical guide to taking your IBM Lotus Notes applicatio...
 

Mehr von Vincent Kwon

Smarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattSmarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattVincent Kwon
 
Paul croft - Auckland Cloud Camp 2010
Paul croft  - Auckland Cloud Camp 2010Paul croft  - Auckland Cloud Camp 2010
Paul croft - Auckland Cloud Camp 2010Vincent Kwon
 
Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011Vincent Kwon
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurityVincent Kwon
 
Capitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceCapitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceVincent Kwon
 
IBM Maximo for Utilities
IBM Maximo for UtilitiesIBM Maximo for Utilities
IBM Maximo for UtilitiesVincent Kwon
 
IBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XIBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XVincent Kwon
 
VMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVincent Kwon
 
Turn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionTurn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionVincent Kwon
 
Keynote intelligence, innovation & best practice
Keynote    intelligence, innovation & best practiceKeynote    intelligence, innovation & best practice
Keynote intelligence, innovation & best practiceVincent Kwon
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisationVincent Kwon
 
Enhanced business performance
Enhanced business performanceEnhanced business performance
Enhanced business performanceVincent Kwon
 
Drive business performance with information analytics
Drive business performance with information analyticsDrive business performance with information analytics
Drive business performance with information analyticsVincent Kwon
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentationVincent Kwon
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)Vincent Kwon
 
Acclerating jounrey to cloud computing
Acclerating jounrey to cloud computingAcclerating jounrey to cloud computing
Acclerating jounrey to cloud computingVincent Kwon
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationVincent Kwon
 
Wellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanWellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanVincent Kwon
 

Mehr von Vincent Kwon (20)

Smarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D WattSmarter Eduction - Higher Education Summit 2011 - D Watt
Smarter Eduction - Higher Education Summit 2011 - D Watt
 
Paul croft - Auckland Cloud Camp 2010
Paul croft  - Auckland Cloud Camp 2010Paul croft  - Auckland Cloud Camp 2010
Paul croft - Auckland Cloud Camp 2010
 
Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011Derek wilson - Cloud Camp 2011
Derek wilson - Cloud Camp 2011
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
The unprecedented state of web insecurity
The unprecedented state of web insecurityThe unprecedented state of web insecurity
The unprecedented state of web insecurity
 
Capitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross PearceCapitalising on Complexity - Ross Pearce
Capitalising on Complexity - Ross Pearce
 
IBM Maximo for Utilities
IBM Maximo for UtilitiesIBM Maximo for Utilities
IBM Maximo for Utilities
 
IBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System XIBM 'After 5' Session - IBM System X
IBM 'After 5' Session - IBM System X
 
VMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloudVMWare Sponsor Presentation: Accelerating the journey to cloud
VMWare Sponsor Presentation: Accelerating the journey to cloud
 
Turn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take actionTurn data into intelligence: Uncover insights. Take action
Turn data into intelligence: Uncover insights. Take action
 
Keynote intelligence, innovation & best practice
Keynote    intelligence, innovation & best practiceKeynote    intelligence, innovation & best practice
Keynote intelligence, innovation & best practice
 
It optimisation & virtualisation
It optimisation & virtualisationIt optimisation & virtualisation
It optimisation & virtualisation
 
Enhanced business performance
Enhanced business performanceEnhanced business performance
Enhanced business performance
 
Drive business performance with information analytics
Drive business performance with information analyticsDrive business performance with information analytics
Drive business performance with information analytics
 
Don't risk it presentation
Don't risk it presentationDon't risk it presentation
Don't risk it presentation
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
Acclerating jounrey to cloud computing
Acclerating jounrey to cloud computingAcclerating jounrey to cloud computing
Acclerating jounrey to cloud computing
 
Gen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisationGen-i: Business Continuity considering reputation, security and virtualisation
Gen-i: Business Continuity considering reputation, security and virtualisation
 
Wellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul CallaghanWellington Business Keynote - Paul Callaghan
Wellington Business Keynote - Paul Callaghan
 

Kürzlich hochgeladen

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Will Schroeder
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 

Kürzlich hochgeladen (20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
Apres-Cyber - The Data Dilemma: Bridging Offensive Operations and Machine Lea...
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
20150722 - AGV
20150722 - AGV20150722 - AGV
20150722 - AGV
 

Checkpoint - A Practical Demonstration of Endpoint Security

  • 1. Check Point Endpoint Security IBM Insight Forum 09 Make change work for you ®
  • 2. 2 Agenda A d Endpoint security challenges p y g What is Check Point TotalSecurity Demonstration of Technical Functionalities Live Demo of WebCheck IBM Insight Forum 09 Make change work for you ®
  • 3. 3 Issues with Endpoint Security I ith E d i t S it Difficult for administrators Complexity and Manageability Evolving Vulnerabilities Too many point solutions Users see it as a hassle Everything looks different, difficult for end users ‘Stops me doing what I need to’ Performance IBM Insight Forum 09 Make change work for you ®
  • 4. 4 So what is in the End Point Total Security? Personal Firewall Antivirus Full Disk VPN Client Port protection Media Encryption Host-IPS / NAC Anti-spyware Encryption IBM Insight Forum 09 Make change work for you ®
  • 5. 5 IBM Insight Forum 09 Make change work for you ®
  • 6. 6 When you g into the office…. y get IBM Insight Forum 09 Make change work for you ®
  • 7. 7 When you move some sensitive y data home…. IBM Insight Forum 09 Make change work for you ®
  • 8. 8 USB Key Enrolment y IBM Insight Forum 09 Make change work for you ®
  • 9. 9 When you g home….. y get IBM Insight Forum 09 Make change work for you ®
  • 10. 10 What the admin sees IBM Insight Forum 09 Make change work for you ®
  • 11. 11 IBM Insight Forum 09 Make change work for you ®
  • 12. 12 Thank you o Questions? IBM Insight Forum 09 Make change work for you ®