SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Stay One Step Ahead of Cyber Threats
Mobile is overtaking desktop, social is beating search, messaging
apps are challenging email, and everything around us is becoming
connected.
THE ERA OF DIGITAL TRANSFORMATION
©2016 Check Point Software Technologies Ltd. 3
CIO
Provide up to the second
information to everyone ,
everywhere
President
How can I create value to
my customer and
partners?
LEADERS MAKE MAJOR BUSINESS DECISIONS DAILY
EVERY MAJOR DECISION EVOKES SECURITY RISKS
CMO
New automated campaign
and demand generation will
make a difference!
CEO
How can Technology
transform my business
CFO
Do I comply with regulation?
©2016 Check Point Software Technologies Ltd. 4
HOW TO MAKE BUSINESS DECISIONS
WITHOUTCOMPROMISING SECURITY
©2016 Check Point Software Technologies Ltd. 5
THERE ARE MILLIONS AND MILLIONS OF
NEW CONNECTIONS CREATED EVERY SECOND
THERE ARE MORE AND MORE
THINGS WE DON’T CONTROL
©2016 Check Point Software Technologies Ltd. 6
CHANGES CREATE NEW
OPPORTUNITIES
BUT NOT EVERYONE HAS
GOOD INTENTIONS
©2016 Check Point Software Technologies Ltd. 7
THERE ARE MORE AND MORE
THINGS WE DON’T KNOW
ZERO DAY,
Virus
CVEs
Bad URLs
APTS,UNKNOWN MALWARE
Signatures
Exploits TrojansBotnets
THE GROWTH OF THE UNKNOWN MALWARE
©2016 Check Point Software Technologies Ltd. 8
BC
In an environment where there are
more and more things
THE RIGHT DECISION
TO RUN THE BUSINESS?
HOW DO YOU KNOW
YOU ARE MAKING
you DON’T CONTROL and more
things you DON’T KNOW
HOW DO YOU
INNOVATE,
INSPIRE
AND COMPETE
WHILE
REMAINING
SECURED?
©2016 Check Point Software Technologies Ltd. 10
80% of board members say that
cybersecurity is discussed at nearly
every board meeting*.
But still
66% of board members are
NOT CONFIDENT
[Restricted] ONLY for designated groups and individuals
$86B – 2016 projected global
enterprise IT security spending
(8.8% yearly increase) and will
grow to $101B by 2018* In 2015 38% more security
incidents were detected
than in 2014 *
©2016 Check Point Software Technologies Ltd. 11
Everybody’s talking about being secure
And yet…
BREACH
Most security companies focus on
Detection after the breach
Security Industry says they can’t stop the Breach
[Restricted] ONLY for designated groups and individuals​
©2016 Check Point Software Technologies Ltd. 12
So, should you just detect the breach and try to clean up after?
It’s true…
breaches are happening everywhere
[Restricted] ONLY for designated groups and individuals​
©2016 Check Point Software Technologies Ltd. 13
WHY THE DISCONNECT ?
Lack of an end-end security strategy
1400 security vendors in the market today – its’ complicated
Cybercrime is different than conventional warfare
THE CYBER THREAT
LANDSCAPE IS EVOLVING
WITH RAPID PACE
more sophisticated
and more advanced
Most security technologies are
PATCHWORK OF POINT SOLUTIONS
COMPLEX SOLUTIONS WITH
UNCERTAIN SECURITY COVERAGE
• Looking for yesterday’s signatures
• Detection instead of prevention
ONE STEP BEHIND
THE Almost, Sort of GREAT DEBATE ?
DETECT PREVENT
Focus on
PREVENTION
©2015 Check Point Software Technologies Ltd. 18
So…
ONE STEP
AHEAD
©2016 Check Point Software Technologies Ltd. 19
BLOCK attacks before they happen!
DEFEND with advanced tools that stop today, tomorrow’s threats
PROTECT every frontier – from mobile to cloud
ONE STEP AHEAD. THE PRINCIPLES
[Restricted] ONLY for designated groups and individuals
One SIMPLE system CONSOLIDATING all security solutions
USE SECURITY THAT PREVENTS BOTH THE
KNOWN UNKNOWN THREATS
©2015 Check Point Software Technologies Ltd. 21
Reconnaissance Delivery Exploitation Control
ONE STEP AHEAD MEANS
BLOCK/PREVENT THE ATTACK AT EVERY STAGE
©2015 Check Point Software Technologies Ltd. 22
PREVENTING THE KILL CHAIN
RECONNAISSANCE
Prevent suspicious
network activity
DELIVERY
Prevent malicious
downloads
EXPLOITATION
Prevent exploitation
of vulnerabilities
CONTROL
Prevent command
& control activity
©2015 Check Point Software Technologies Ltd. 23
PREVENT ATTACKS AT THE PRE-INFECTION STAGE
PREVENTING THE KILL CHAIN
©2015 Check Point Software Technologies Ltd. 24
ONE STEP AHEAD MEANS
BLOCKING ATTACKS EVERYWHERE
©2015 Check Point Software Technologies Ltd. 25
PREVENTION
ACROSS
ALL
BUSINESS
PLATFORMS
ONE STEP AHEAD MEANS
PREVENTING ATTACKS EVERYWHERE
BUILD
ARCHITECTURE
Integrated
Threat Management
Efficient,
Automated Operations
Unified
Policy Management
A SINGLE
MANAGEMENT
PLATFORM TO
CONSOLIDATE
ALL YOUR
SECURITY
20%REDUCTION in
consolidating on single architecture
SECURITY SPEND
50%REDUCTION in
HUMAN CAPITAL
With single management platform
Stops exploits of
known vulnerabilities
IPS
Prevents bot damage
from infected devicesAnti-Bot
Blocks download of
known malware infested filesAntivirus
Stops unknown
zero-day malware in filesThreat Emulation
Multi Layer Detection and Threat PreventionKNOWNUNKNOWN
Remove Zero Day malware in Zero
SecondsThreat Extraction
Successful Defense Components
[Restricted] ONLY for designated groups and individuals​
Reconnaissance Weaponization Delivery Exploitation Installation
Command &
Control
Act on
Objectives
P r e - C o m p r o m i s e C o m p r o m i s e P o s t - C o m p r o m i s e
DLP
Threat
Intelligence
Firewall Anti-Virus Anti-Bot Anti-BotIPS
Firewall
DLP
Document
Security
Anti-Spam
URL Filtering
Threat
Emulation
Threat
Extraction
Mobile Threat
Prevention
IPS
Threat
Emulation
Endpoint
Security
Endpoint
Security
Forensics
Mobile Threat
Prevention
Document
Security
Firewall
IPS
• Extensive research
• Collaboration with industry leading
services
• Sharing across users community
• Multi-layer architecture
• Evasion-resistant detection
• Best catch rate
• Proactive practical prevention
• Effective containment
• Clear visibility and insight
INTELLIGENCE DETECTION PREVENTION
YOU ARE
3 VECTORS OF
Network Attacks OS ExploitsInfected Apps
TURN ON THE
MICROPHONE
TURN ON THE
CAMERA
TRACK DEVICE
LOCATION
CAPTURE
EMAILS
EXTRACT
DATA
STEAL USERNAME
& PASSWORD
MOBILE
SECURITY
BUILDING
BLOCKS
Mobile Device
Management
Policy Enforcement
Secure
Containers
Data Leakage
Prevention
Anti-Virus,
App Reputation
Known Threats
Mobile Threat Prevention
Unknown Threats and Zero Day
TODAY
2016 20202014
ONE
ARCHITECTURE
SINGLE
MANAGEMENT
CLOUD
DATA
CENTER
ENDPOINT
MOBILE
NETWORK
IoT
Generations in cyber security
[Protected] Non-confidential content
Cyber
Network & EndpointVECTORS Network, Endpoint
Mobile, Datacenter & Cloud
Reactive & Silo’d – focused on
detection
STRATEGY Proactive & Holistic – focused on
prevention
Point solutions, multiple
consoles
ARCHITECTURE One consolidated system, single
management
Conventional
Organized & targetedBOUNDARIES Amateur & random attacks
To Summarize
Stay One Step Ahead of Cyber Threats - Check Point

Weitere ähnliche Inhalte

Was ist angesagt?

Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...centralohioissa
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10MarketingArrowECS_CZ
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUlf Mattsson
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyCloudflare
 
The Advent of Serverless Technologies
The Advent of Serverless TechnologiesThe Advent of Serverless Technologies
The Advent of Serverless TechnologiesCloudflare
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessRahul Neel Mani
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Toolscentralohioissa
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechDell EMC World
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Flexera
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomyCisco Russia
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should KnowIBM Security
 

Was ist angesagt? (20)

Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
 
Devsec ops
Devsec opsDevsec ops
Devsec ops
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Check Point: Securing Web 2.0
Check Point: Securing Web 2.0 Check Point: Securing Web 2.0
Check Point: Securing Web 2.0
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Understanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External ThreatsUnderstanding Your Attack Surface and Detecting & Mitigating External Threats
Understanding Your Attack Surface and Detecting & Mitigating External Threats
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
A Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud JourneyA Different Approach to Securing Your Cloud Journey
A Different Approach to Securing Your Cloud Journey
 
The Advent of Serverless Technologies
The Advent of Serverless TechnologiesThe Advent of Serverless Technologies
The Advent of Serverless Technologies
 
Building Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of BusinessBuilding Cyber Resilience at the Speed of Business
Building Cyber Resilience at the Speed of Business
 
Jason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional ToolsJason Kent - AppSec Without Additional Tools
Jason Kent - AppSec Without Additional Tools
 
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr TechMT74 - Is Your Tech Support Keeping Up with Your Instr Tech
MT74 - Is Your Tech Support Keeping Up with Your Instr Tech
 
Open Source Security - It can be done easily.
Open Source Security - It can be done easily.Open Source Security - It can be done easily.
Open Source Security - It can be done easily.
 
Security Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital EconomySecurity Everywhere: A Growth Engine for the Digital Economy
Security Everywhere: A Growth Engine for the Digital Economy
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 

Andere mochten auch

Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionMarketingArrowECS_CZ
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 
Is Your Technology Vendor Misleading You?
Is Your Technology Vendor Misleading You?Is Your Technology Vendor Misleading You?
Is Your Technology Vendor Misleading You?Dameon Welch-Abernathy
 
How to be a Modern CIO
How to be a Modern CIOHow to be a Modern CIO
How to be a Modern CIOApptio
 
IT Cost Transparency Infographic
IT Cost Transparency InfographicIT Cost Transparency Infographic
IT Cost Transparency InfographicApptio
 
Houchens jeffrey week 2 august 2015
Houchens jeffrey week 2 august 2015Houchens jeffrey week 2 august 2015
Houchens jeffrey week 2 august 2015jhouchens99
 
Bna Slides Oliver
Bna Slides OliverBna Slides Oliver
Bna Slides Olivernoblebreck
 
«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng
«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng
«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/engMaxim Gavrik
 
Részletkérdések és a mobil élmény - Kollin Zoltán
Részletkérdések és a mobil élmény - Kollin ZoltánRészletkérdések és a mobil élmény - Kollin Zoltán
Részletkérdések és a mobil élmény - Kollin ZoltánZoltan Kollin
 
Vida De Les Estrelles
Vida De Les EstrellesVida De Les Estrelles
Vida De Les EstrellesRafa M. P.
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentMarketingArrowECS_CZ
 
Product Placement Ethics
Product Placement EthicsProduct Placement Ethics
Product Placement EthicsLawson Rushing
 
Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"
Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"
Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"Apptio
 
2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct
2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct
2017-02-28 Modern Web Based Accounting System Seminar featuring IntacctRaffa Learning Community
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness ProgramJohn Rocco
 

Andere mochten auch (18)

Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Is Your Technology Vendor Misleading You?
Is Your Technology Vendor Misleading You?Is Your Technology Vendor Misleading You?
Is Your Technology Vendor Misleading You?
 
How to be a Modern CIO
How to be a Modern CIOHow to be a Modern CIO
How to be a Modern CIO
 
IT Cost Transparency Infographic
IT Cost Transparency InfographicIT Cost Transparency Infographic
IT Cost Transparency Infographic
 
Houchens jeffrey week 2 august 2015
Houchens jeffrey week 2 august 2015Houchens jeffrey week 2 august 2015
Houchens jeffrey week 2 august 2015
 
iNTO PURE BLUE AIR
iNTO PURE BLUE AIRiNTO PURE BLUE AIR
iNTO PURE BLUE AIR
 
Bna Slides Oliver
Bna Slides OliverBna Slides Oliver
Bna Slides Oliver
 
«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng
«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng
«INTERTECH» est une societe construction moderne - www.ooo-intertech.com/eng
 
Részletkérdések és a mobil élmény - Kollin Zoltán
Részletkérdések és a mobil élmény - Kollin ZoltánRészletkérdések és a mobil élmény - Kollin Zoltán
Részletkérdések és a mobil élmény - Kollin Zoltán
 
Vida De Les Estrelles
Vida De Les EstrellesVida De Les Estrelles
Vida De Les Estrelles
 
Check Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast AgentCheck Point SandBlast and SandBlast Agent
Check Point SandBlast and SandBlast Agent
 
Product Placement Ethics
Product Placement EthicsProduct Placement Ethics
Product Placement Ethics
 
Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"
Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"
Troux 2014 - Apptio Keynote "Turning IT Investments Into Business Outcomes"
 
2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct
2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct
2017-02-28 Modern Web Based Accounting System Seminar featuring Intacct
 
Social Media Safety Tips
Social Media Safety TipsSocial Media Safety Tips
Social Media Safety Tips
 
Cyber Security Awareness Program
Cyber Security Awareness ProgramCyber Security Awareness Program
Cyber Security Awareness Program
 

Ähnlich wie Stay One Step Ahead of Cyber Threats - Check Point

комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastDiana Frolova
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddcCSA Argentina
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...eGov Magazine
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Pointaliciasyc
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014David Berkelmans
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014Ashlie Steele
 
Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiMarketingArrowECS_CZ
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comPentest-Tools.com
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTCristian Garcia G.
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...lior mazor
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsRedhuntLabs2
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldJohn Palfreyman
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber SecurityComodo SSL Store
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 

Ähnlich wie Stay One Step Ahead of Cyber Threats - Check Point (20)

комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Check point presentation june 2014
Check point presentation june 2014Check point presentation june 2014
Check point presentation june 2014
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014LSI Spring Agent Open House 2014
LSI Spring Agent Open House 2014
 
Ochrana pred modernými malware útokmi
Ochrana pred modernými malware útokmiOchrana pred modernými malware útokmi
Ochrana pred modernými malware útokmi
 
COVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.comCOVID-19 free penetration tests by Pentest-Tools.com
COVID-19 free penetration tests by Pentest-Tools.com
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
 
The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...The CISO Problems Risk Compliance Management in a Software Development 030420...
The CISO Problems Risk Compliance Management in a Software Development 030420...
 
Asset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt LabsAsset Discovery in India – Redhunt Labs
Asset Discovery in India – Redhunt Labs
 
Cyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed WorldCyber crime in a Smart Phone & Social Media Obsessed World
Cyber crime in a Smart Phone & Social Media Obsessed World
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 

Mehr von MarcoTechnologies

Protecting Data Everywhere - Barracuda
Protecting Data Everywhere - BarracudaProtecting Data Everywhere - Barracuda
Protecting Data Everywhere - BarracudaMarcoTechnologies
 
Deliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - MitelDeliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - MitelMarcoTechnologies
 
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareWhen Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareMarcoTechnologies
 
Learn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - CanonLearn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - CanonMarcoTechnologies
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - MitelMarcoTechnologies
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoMarcoTechnologies
 
Benefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEBenefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEMarcoTechnologies
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesMarcoTechnologies
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoMarcoTechnologies
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetMarcoTechnologies
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...MarcoTechnologies
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksMarcoTechnologies
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveMarcoTechnologies
 
What is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica MinoltaWhat is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica MinoltaMarcoTechnologies
 

Mehr von MarcoTechnologies (15)

Protecting Data Everywhere - Barracuda
Protecting Data Everywhere - BarracudaProtecting Data Everywhere - Barracuda
Protecting Data Everywhere - Barracuda
 
Deliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - MitelDeliver a Flexible, Engaging Customer Contact Center Experience - Mitel
Deliver a Flexible, Engaging Customer Contact Center Experience - Mitel
 
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire SoftwareWhen Seconds Count: IP Paging and Emergency Notification - Singlewire Software
When Seconds Count: IP Paging and Emergency Notification - Singlewire Software
 
Learn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - CanonLearn How to Efficiently Manage Your Print and Scan Environment - Canon
Learn How to Efficiently Manage Your Print and Scan Environment - Canon
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - Mitel
 
The Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - CiscoThe Next Generation of Hyperconverged Infrastructure - Cisco
The Next Generation of Hyperconverged Infrastructure - Cisco
 
Benefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPEBenefits of Transforming to a Hybrid Infrastructure - HPE
Benefits of Transforming to a Hybrid Infrastructure - HPE
 
What You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-FilesWhat You Don't Know about Document Management, But Should - M-Files
What You Don't Know about Document Management, But Should - M-Files
 
Uncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - MarcoUncovering the Cloud: Is it Right for You? - Marco
Uncovering the Cloud: Is it Right for You? - Marco
 
Stay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - FortinetStay Ahead of Threats with Advanced Security Protection - Fortinet
Stay Ahead of Threats with Advanced Security Protection - Fortinet
 
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
Eliminate Data Entry with Document Scanning, Data Capture and Extraction - PS...
 
Security is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March NetworksSecurity is Just the Start with Intelligent Video - March Networks
Security is Just the Start with Intelligent Video - March Networks
 
Inbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton InteractiveInbound Marketing is the Answer - Leighton Interactive
Inbound Marketing is the Answer - Leighton Interactive
 
What is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica MinoltaWhat is your Print Transformation Strategy? - Konica Minolta
What is your Print Transformation Strategy? - Konica Minolta
 
Marco Gold Standard
Marco Gold StandardMarco Gold Standard
Marco Gold Standard
 

Kürzlich hochgeladen

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...BookNet Canada
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 

Kürzlich hochgeladen (20)

Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
Transcript: New from BookNet Canada for 2024: BNC SalesData and LibraryData -...
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 

Stay One Step Ahead of Cyber Threats - Check Point

  • 1. Stay One Step Ahead of Cyber Threats
  • 2. Mobile is overtaking desktop, social is beating search, messaging apps are challenging email, and everything around us is becoming connected. THE ERA OF DIGITAL TRANSFORMATION
  • 3. ©2016 Check Point Software Technologies Ltd. 3 CIO Provide up to the second information to everyone , everywhere President How can I create value to my customer and partners? LEADERS MAKE MAJOR BUSINESS DECISIONS DAILY EVERY MAJOR DECISION EVOKES SECURITY RISKS CMO New automated campaign and demand generation will make a difference! CEO How can Technology transform my business CFO Do I comply with regulation?
  • 4. ©2016 Check Point Software Technologies Ltd. 4 HOW TO MAKE BUSINESS DECISIONS WITHOUTCOMPROMISING SECURITY
  • 5. ©2016 Check Point Software Technologies Ltd. 5 THERE ARE MILLIONS AND MILLIONS OF NEW CONNECTIONS CREATED EVERY SECOND THERE ARE MORE AND MORE THINGS WE DON’T CONTROL
  • 6. ©2016 Check Point Software Technologies Ltd. 6 CHANGES CREATE NEW OPPORTUNITIES BUT NOT EVERYONE HAS GOOD INTENTIONS
  • 7. ©2016 Check Point Software Technologies Ltd. 7 THERE ARE MORE AND MORE THINGS WE DON’T KNOW ZERO DAY, Virus CVEs Bad URLs APTS,UNKNOWN MALWARE Signatures Exploits TrojansBotnets THE GROWTH OF THE UNKNOWN MALWARE
  • 8. ©2016 Check Point Software Technologies Ltd. 8 BC In an environment where there are more and more things THE RIGHT DECISION TO RUN THE BUSINESS? HOW DO YOU KNOW YOU ARE MAKING you DON’T CONTROL and more things you DON’T KNOW
  • 9. HOW DO YOU INNOVATE, INSPIRE AND COMPETE WHILE REMAINING SECURED?
  • 10. ©2016 Check Point Software Technologies Ltd. 10 80% of board members say that cybersecurity is discussed at nearly every board meeting*. But still 66% of board members are NOT CONFIDENT [Restricted] ONLY for designated groups and individuals $86B – 2016 projected global enterprise IT security spending (8.8% yearly increase) and will grow to $101B by 2018* In 2015 38% more security incidents were detected than in 2014 *
  • 11. ©2016 Check Point Software Technologies Ltd. 11 Everybody’s talking about being secure And yet… BREACH Most security companies focus on Detection after the breach Security Industry says they can’t stop the Breach [Restricted] ONLY for designated groups and individuals​
  • 12. ©2016 Check Point Software Technologies Ltd. 12 So, should you just detect the breach and try to clean up after? It’s true… breaches are happening everywhere [Restricted] ONLY for designated groups and individuals​
  • 13. ©2016 Check Point Software Technologies Ltd. 13 WHY THE DISCONNECT ? Lack of an end-end security strategy 1400 security vendors in the market today – its’ complicated Cybercrime is different than conventional warfare
  • 14. THE CYBER THREAT LANDSCAPE IS EVOLVING WITH RAPID PACE more sophisticated and more advanced
  • 15. Most security technologies are PATCHWORK OF POINT SOLUTIONS COMPLEX SOLUTIONS WITH UNCERTAIN SECURITY COVERAGE • Looking for yesterday’s signatures • Detection instead of prevention ONE STEP BEHIND
  • 16. THE Almost, Sort of GREAT DEBATE ? DETECT PREVENT
  • 18. ©2015 Check Point Software Technologies Ltd. 18 So… ONE STEP AHEAD
  • 19. ©2016 Check Point Software Technologies Ltd. 19 BLOCK attacks before they happen! DEFEND with advanced tools that stop today, tomorrow’s threats PROTECT every frontier – from mobile to cloud ONE STEP AHEAD. THE PRINCIPLES [Restricted] ONLY for designated groups and individuals One SIMPLE system CONSOLIDATING all security solutions
  • 20. USE SECURITY THAT PREVENTS BOTH THE KNOWN UNKNOWN THREATS
  • 21. ©2015 Check Point Software Technologies Ltd. 21 Reconnaissance Delivery Exploitation Control ONE STEP AHEAD MEANS BLOCK/PREVENT THE ATTACK AT EVERY STAGE
  • 22. ©2015 Check Point Software Technologies Ltd. 22 PREVENTING THE KILL CHAIN RECONNAISSANCE Prevent suspicious network activity DELIVERY Prevent malicious downloads EXPLOITATION Prevent exploitation of vulnerabilities CONTROL Prevent command & control activity
  • 23. ©2015 Check Point Software Technologies Ltd. 23 PREVENT ATTACKS AT THE PRE-INFECTION STAGE PREVENTING THE KILL CHAIN
  • 24. ©2015 Check Point Software Technologies Ltd. 24 ONE STEP AHEAD MEANS BLOCKING ATTACKS EVERYWHERE
  • 25. ©2015 Check Point Software Technologies Ltd. 25 PREVENTION ACROSS ALL BUSINESS PLATFORMS ONE STEP AHEAD MEANS PREVENTING ATTACKS EVERYWHERE
  • 27. Integrated Threat Management Efficient, Automated Operations Unified Policy Management A SINGLE MANAGEMENT PLATFORM TO CONSOLIDATE ALL YOUR SECURITY
  • 28. 20%REDUCTION in consolidating on single architecture SECURITY SPEND 50%REDUCTION in HUMAN CAPITAL With single management platform
  • 29. Stops exploits of known vulnerabilities IPS Prevents bot damage from infected devicesAnti-Bot Blocks download of known malware infested filesAntivirus Stops unknown zero-day malware in filesThreat Emulation Multi Layer Detection and Threat PreventionKNOWNUNKNOWN Remove Zero Day malware in Zero SecondsThreat Extraction
  • 30. Successful Defense Components [Restricted] ONLY for designated groups and individuals​ Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Act on Objectives P r e - C o m p r o m i s e C o m p r o m i s e P o s t - C o m p r o m i s e DLP Threat Intelligence Firewall Anti-Virus Anti-Bot Anti-BotIPS Firewall DLP Document Security Anti-Spam URL Filtering Threat Emulation Threat Extraction Mobile Threat Prevention IPS Threat Emulation Endpoint Security Endpoint Security Forensics Mobile Threat Prevention Document Security Firewall IPS • Extensive research • Collaboration with industry leading services • Sharing across users community • Multi-layer architecture • Evasion-resistant detection • Best catch rate • Proactive practical prevention • Effective containment • Clear visibility and insight INTELLIGENCE DETECTION PREVENTION
  • 32. 3 VECTORS OF Network Attacks OS ExploitsInfected Apps
  • 33. TURN ON THE MICROPHONE TURN ON THE CAMERA TRACK DEVICE LOCATION CAPTURE EMAILS EXTRACT DATA STEAL USERNAME & PASSWORD
  • 34. MOBILE SECURITY BUILDING BLOCKS Mobile Device Management Policy Enforcement Secure Containers Data Leakage Prevention Anti-Virus, App Reputation Known Threats Mobile Threat Prevention Unknown Threats and Zero Day
  • 35. TODAY
  • 37. Generations in cyber security [Protected] Non-confidential content Cyber Network & EndpointVECTORS Network, Endpoint Mobile, Datacenter & Cloud Reactive & Silo’d – focused on detection STRATEGY Proactive & Holistic – focused on prevention Point solutions, multiple consoles ARCHITECTURE One consolidated system, single management Conventional Organized & targetedBOUNDARIES Amateur & random attacks To Summarize

Hinweis der Redaktion

  1. Change
  2. Increase Revenue Reduce Costs Mitigate Risks Meet Compliance Requirements
  3. People FACE - Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision.
  4. Because there are more and more areas we don’t control, IT environment is more and more shared and open and less and less controlled With IoT, Cloud, Mobile, Software defined….
  5. Because there are more and more threats and hackers we don’t know Threat landscape is evolving so fast with new threats, new techniques, new actors and new targets. Impossible to predict with certainty what the next waves of malware will look like.
  6. Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision.
  7. http://www.csoonline.com/article/2927395/data-protection/cybersecurity-on-the-agenda-for-80-percent-of-corporate-boards.html Alternative stat In 2015 almost half of boards participate in the overall security strategy of the company* *PWC The Global State of Information Security® Survey 2016
  8. Situation: The world wants to tell that breaches are inevitable
  9. Situation: breaches keep happening, that’s true, so should you just wait until it’s your turn? Industry says The only way to catch advanced malware like ransomware or an advanced persistent threat is to investigate after it has breached your business
  10. Board down to Admins – What should we do?
  11. Security technologies are embattled in constantly chasing after these threats to close the gaps. An overabundance of security solutions makes it more complicated and challenging for IT managers to keep up. Organizations need to constantly gain new knowledge and hire talented people to continuously understand what is going on their network.
  12. Not really
  13. One step ahead means a number of things: Prevention, Not Detection or remediation Prevention on each part of the kill Chain
  14. One step ahead means a number of things: Prevention, Not Detection or remediation Prevention on each part of the kill Chain
  15. Known GOOD instead of Known BAD
  16. Instead of lots of Point solutions Protect your assets, data and your brand - and to do that in a way that allows the business the freedom to make the choices they need to make to run their business - without compromising security.
  17. Our next generation policies provide a radically different way of approaching policy management. We’ve taken a long hard look at how daily tasks are performed and consolidated and streamlined features to make it as efficient as possible for the security admin to do his work. With R80’s automation capabilities, we are paving the way for automated security provisioning and controls. And when it comes to security visibility - we’ve fully integrated threat management into the main console so security teams can pivot quickly from policy to incidence response and have a holistic view of their security posture in one single place.
  18. USERS
  19. AirWatch
  20. https://www.infopackets.com/news/9449/cyber-attacks-businesses-doubled-2014-report