Weitere ähnliche Inhalte
Ähnlich wie Check Point Infinity powered by R80.10 (20)
Mehr von MarketingArrowECS_CZ (20)
Kürzlich hochgeladen (20)
Check Point Infinity powered by R80.10
- 1. ©2016 Check Point Software Technologies Ltd. 1
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
POWERED BY:
- 2. ©2016 Check Point Software Technologies Ltd. 2
How to Manage Security Today?
[Protected] Non-confidential content
T H R E A T S
P R O T E C T I O N S
E N V I R O N M E N T
COMPLEX & DYNAMIC … more and more ...
- 3. ©2016 Check Point Software Technologies Ltd. 3[Protected] Non-confidential content
The key to managing complexity
is security consolidation
- 4. ©2016 Check Point Software Technologies Ltd. 4[Protected] Non-confidential content
Integrated Threat
Management
Automated
Operations
Unified Policy
Management
THE PLATFORM TO
CONSOLIDATE ALL YOUR
SECURITY
. 10
Layered
Policy
Task-Oriented
Console
- 5. ©2016 Check Point Software Technologies Ltd. 5
U N I F I E D P O L I C Y M A N A G E M E N T
[Protected] Non-confidential content
CHANGE THE WAY
YOU MANAGE SECURITY. 10
- 6. ©2016 Check Point Software Technologies Ltd. 6
One Platform to Manage Everything
[Protected] Non-confidential content
ONE CONSOLE
ONE POLICY
Enterprise
- 7. ©2016 Check Point Software Technologies Ltd. 7
One Policy to Manage Everything
[Protected] Non-confidential content
Users Devices Applications Data Gateways Private Cloud Public Cloud Virtual GW
- 8. ©2016 Check Point Software Technologies Ltd. 8
L AY E R E D P O L I C Y
[Protected] Non-confidential content
CHANGE THE WAY
YOU MANAGE SECURITY. 10
- 9. ©2016 Check Point Software Technologies Ltd. 9
Easily Segment Policy in Layers for
Better Manageability and Control
[Protected] Non-confidential content
- 10. ©2016 Check Point Software Technologies Ltd. 10
Easily Segment Policy in Layers for
Better Manageability and Control
[Protected] Non-confidential content
Each policy segment can be delegated
to distribute workload
Walter
Ann
Duties separated based on
IT role
- 11. ©2016 Check Point Software Technologies Ltd. 11
E F F I C I E N T, TA S K - O R I E N T E D
M A N A G E M E N T
[Protected] Non-confidential content
CHANGE THE WAY
YOU MANAGE SECURITY. 10
- 12. ©2016 Check Point Software Technologies Ltd. 12
Task-Oriented Features Increase Efficiency
[Protected] Non-confidential content
With one click, access all associated logs and rule details
- 13. ©2016 Check Point Software Technologies Ltd. 13
Admin Concurrency Increases Team Productivity
[Protected] Non-confidential content
Ann
Walter
Ann logs in, sees rule 3 locked
Walter logs in, works on rule 3
Ann works on rule 2
Multiple admins can work on same policy without conflict
- 14. ©2016 Check Point Software Technologies Ltd. 14[Protected] Non-confidential content
95% of security breaches could have been
prevented by the correct configuration
of security products
Gartner
Compliance Overview
Helps you optimize your
security settings & compliance
Keep Your Security Compliant
- 15. ©2016 Check Point Software Technologies Ltd. 15
S E C U R E A U TO M AT E D
O P E R AT I O N S
[Protected] Non-confidential content
CHANGE THE WAY
YOU WORK AND COLLABORATE. 10
- 16. ©2016 Check Point Software Technologies Ltd. 16
Secure Documented
API and Orchestration
BUILT FOR AUTOMATION
OpenandcompleteAPI usedasWeb Service orCLI fororchestration
Strict Permissions
Control privileges to access the system
Well documented
Simple and clear reference guide with examples
[Protected] Non-confidential content
- 17. ©2016 Check Point Software Technologies Ltd. 17
Empower Self-Service Security
Add user
H e l p d e s k P o r t a l
All Categories
Add application Add host
Block user Block application Block host
settingsApps
Use R80 API to
automate routine
Helpdesk security
tasks
[Protected] Non-confidential content
- 18. ©2016 Check Point Software Technologies Ltd. 18
Empower Self-Service Security
H e l p d e s k P o r t a l
All Categories
settingsApps
Add
application
John Smith
Social networking
Facebook
OK Cancel
User name
App category
App name
Improve Helpdesk SLA
Reduce Security team
workload overhead
[Restricted] ONLY for designated groups and individuals
- 19. ©2016 Check Point Software Technologies Ltd. 19
I N T E G R AT E D T H R E AT M A N A G E M E N T
[Protected] Non-confidential content
CHANGE THE WAY
YOU MANAGE RISK
. 10
- 20. ©2016 Check Point Software Technologies Ltd. 20
Fully Integrated Threat Management
Logging
[Protected] Non-confidential content
Event
Correlation
Reporting
Monitoring
SECURITY MANAGEMENT
. 10
- 21. ©2016 Check Point Software Technologies Ltd. 21
A Single View into Security Risk
[Protected] Non-confidential content
- 22. ©2016 Check Point Software Technologies Ltd. 22[Protected] Non-confidential content
Easily Customize, Monitor What’s Important
- 23. ©2016 Check Point Software Technologies Ltd. 23
From View to Action
[Protected] Non-confidential content
- 24. ©2016 Check Point Software Technologies Ltd. 24[Protected] Non-confidential content
Consolidate all your security
Deploy security without impeding innovation
Gain full visibility to prevent the next attack
Keep pace with dynamic environments
THE FUTURE OF
SECURITY MANAGEMENT. 10
- 25. ©2016 Check Point Software Technologies Ltd. 25[Protected] Non-confidential content
Customers Partners Experts
COMMUNITY. CHECKPOINT.COM
Ask questions. Share code. Stay up -to-date.
. 10