SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
©2016 Check Point Software Technologies Ltd. 1
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
POWERED BY:
©2016 Check Point Software Technologies Ltd. 2
How to Manage Security Today?
[Protected] Non-confidential content​
T H R E A T S
P R O T E C T I O N S
E N V I R O N M E N T
COMPLEX & DYNAMIC … more and more ...
©2016 Check Point Software Technologies Ltd. 3[Protected] Non-confidential content
The key to managing complexity
is security consolidation
©2016 Check Point Software Technologies Ltd. 4[Protected] Non-confidential content​
Integrated Threat
Management
Automated
Operations
Unified Policy
Management
THE PLATFORM TO
CONSOLIDATE ALL YOUR
SECURITY
. 10
Layered
Policy
Task-Oriented
Console
©2016 Check Point Software Technologies Ltd. 5
U N I F I E D P O L I C Y M A N A G E M E N T
[Protected] Non-confidential content​
CHANGE THE WAY
YOU MANAGE SECURITY. 10
©2016 Check Point Software Technologies Ltd. 6
One Platform to Manage Everything
[Protected] Non-confidential content​
ONE CONSOLE
ONE POLICY
Enterprise
©2016 Check Point Software Technologies Ltd. 7
One Policy to Manage Everything
[Protected] Non-confidential content​
Users Devices Applications Data Gateways Private Cloud Public Cloud Virtual GW
©2016 Check Point Software Technologies Ltd. 8
L AY E R E D P O L I C Y
[Protected] Non-confidential content​
CHANGE THE WAY
YOU MANAGE SECURITY. 10
©2016 Check Point Software Technologies Ltd. 9
Easily Segment Policy in Layers for
Better Manageability and Control
[Protected] Non-confidential content
©2016 Check Point Software Technologies Ltd. 10
Easily Segment Policy in Layers for
Better Manageability and Control
[Protected] Non-confidential content
Each policy segment can be delegated
to distribute workload
Walter
Ann
Duties separated based on
IT role
©2016 Check Point Software Technologies Ltd. 11
E F F I C I E N T, TA S K - O R I E N T E D
M A N A G E M E N T
[Protected] Non-confidential content​
CHANGE THE WAY
YOU MANAGE SECURITY. 10
©2016 Check Point Software Technologies Ltd. 12
Task-Oriented Features Increase Efficiency
[Protected] Non-confidential content​
With one click, access all associated logs and rule details
©2016 Check Point Software Technologies Ltd. 13
Admin Concurrency Increases Team Productivity
[Protected] Non-confidential content​
Ann
Walter
Ann logs in, sees rule 3 locked
Walter logs in, works on rule 3
Ann works on rule 2
Multiple admins can work on same policy without conflict
©2016 Check Point Software Technologies Ltd. 14[Protected] Non-confidential content​
95% of security breaches could have been
prevented by the correct configuration
of security products
Gartner
Compliance Overview
Helps you optimize your
security settings & compliance
Keep Your Security Compliant
©2016 Check Point Software Technologies Ltd. 15
S E C U R E A U TO M AT E D
O P E R AT I O N S
[Protected] Non-confidential content​
CHANGE THE WAY
YOU WORK AND COLLABORATE. 10
©2016 Check Point Software Technologies Ltd. 16
Secure Documented
API and Orchestration
BUILT FOR AUTOMATION
OpenandcompleteAPI usedasWeb Service orCLI fororchestration
Strict Permissions
Control privileges to access the system
Well documented
Simple and clear reference guide with examples
[Protected] Non-confidential content
©2016 Check Point Software Technologies Ltd. 17
Empower Self-Service Security
Add user
H e l p d e s k P o r t a l
All Categories
Add application Add host
Block user Block application Block host
settingsApps
Use R80 API to
automate routine
Helpdesk security
tasks
[Protected] Non-confidential content​
©2016 Check Point Software Technologies Ltd. 18
Empower Self-Service Security
H e l p d e s k P o r t a l
All Categories
settingsApps
Add
application
John Smith
Social networking
Facebook
OK Cancel
User name
App category
App name
Improve Helpdesk SLA
Reduce Security team
workload overhead
[Restricted] ONLY for designated groups and individuals​
©2016 Check Point Software Technologies Ltd. 19
I N T E G R AT E D T H R E AT M A N A G E M E N T
[Protected] Non-confidential content​
CHANGE THE WAY
YOU MANAGE RISK
. 10
©2016 Check Point Software Technologies Ltd. 20
Fully Integrated Threat Management
Logging
[Protected] Non-confidential content​
Event
Correlation
Reporting
Monitoring
SECURITY MANAGEMENT
. 10
©2016 Check Point Software Technologies Ltd. 21
A Single View into Security Risk
[Protected] Non-confidential content
©2016 Check Point Software Technologies Ltd. 22[Protected] Non-confidential content​
Easily Customize, Monitor What’s Important
©2016 Check Point Software Technologies Ltd. 23
From View to Action
[Protected] Non-confidential content​
©2016 Check Point Software Technologies Ltd. 24[Protected] Non-confidential content​
Consolidate all your security
Deploy security without impeding innovation
Gain full visibility to prevent the next attack
Keep pace with dynamic environments
THE FUTURE OF
SECURITY MANAGEMENT. 10
©2016 Check Point Software Technologies Ltd. 25[Protected] Non-confidential content​
Customers Partners Experts
COMMUNITY. CHECKPOINT.COM
Ask questions. Share code. Stay up -to-date.
. 10

Weitere ähnliche Inhalte

Was ist angesagt?

Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Clouditalia Telecomunicazioni
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
internetbrasil
 

Was ist angesagt? (20)

Protect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast MobileProtect Your Enterprise - Check Point SandBlast Mobile
Protect Your Enterprise - Check Point SandBlast Mobile
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoTTransforming Smart Building Cybersecurity Strategy for the Age of IoT
Transforming Smart Building Cybersecurity Strategy for the Age of IoT
 
Check Point SMB Proposition
Check Point SMB PropositionCheck Point SMB Proposition
Check Point SMB Proposition
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 

Ähnlich wie Check Point Infinity powered by R80.10

Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Kevin Fealey
 
Computer Security Fundamentalsby Chuck EasttomC
Computer Security Fundamentalsby Chuck EasttomCComputer Security Fundamentalsby Chuck EasttomC
Computer Security Fundamentalsby Chuck EasttomC
LynellBull52
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
aliciasyc
 

Ähnlich wie Check Point Infinity powered by R80.10 (20)

комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
How a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the BusinessHow a Leading Saudi Bank Matured Security to Better Partner the Business
How a Leading Saudi Bank Matured Security to Better Partner the Business
 
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
Automating Your Tools: How to Free Up Your Security Professionals for Actual ...
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
Csa summit seguridad en el sddc
Csa summit   seguridad en el sddcCsa summit   seguridad en el sddc
Csa summit seguridad en el sddc
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
Computer Security Fundamentalsby Chuck EasttomC
Computer Security Fundamentalsby Chuck EasttomCComputer Security Fundamentalsby Chuck EasttomC
Computer Security Fundamentalsby Chuck EasttomC
 
Cybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & ConstructionCybersecurity for Real Estate & Construction
Cybersecurity for Real Estate & Construction
 
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablementWeSecure Data Security Congres: 5 must haves to safe cloud enablement
WeSecure Data Security Congres: 5 must haves to safe cloud enablement
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
 
Presentatie F-Secure 26062015
Presentatie F-Secure 26062015Presentatie F-Secure 26062015
Presentatie F-Secure 26062015
 
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and SecurityDigital Transformation, Cloud Adoption and the Impact on SAM and Security
Digital Transformation, Cloud Adoption and the Impact on SAM and Security
 
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
Gain Control over Fast-Paced IT with Enterprise Class Workload AutomationGain Control over Fast-Paced IT with Enterprise Class Workload Automation
Gain Control over Fast-Paced IT with Enterprise Class Workload Automation
 
Delivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT OperationsDelivering New Visibility and Analytics for IT Operations
Delivering New Visibility and Analytics for IT Operations
 
Don't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application AttacksDon't Trust, And Verify - Mobile Application Attacks
Don't Trust, And Verify - Mobile Application Attacks
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
Completing your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check PointCompleting your Next Generation Threat Prevention - Check Point
Completing your Next Generation Threat Prevention - Check Point
 

Mehr von MarketingArrowECS_CZ

Mehr von MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Kürzlich hochgeladen

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Check Point Infinity powered by R80.10

  • 1. ©2016 Check Point Software Technologies Ltd. 1 T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E POWERED BY:
  • 2. ©2016 Check Point Software Technologies Ltd. 2 How to Manage Security Today? [Protected] Non-confidential content​ T H R E A T S P R O T E C T I O N S E N V I R O N M E N T COMPLEX & DYNAMIC … more and more ...
  • 3. ©2016 Check Point Software Technologies Ltd. 3[Protected] Non-confidential content The key to managing complexity is security consolidation
  • 4. ©2016 Check Point Software Technologies Ltd. 4[Protected] Non-confidential content​ Integrated Threat Management Automated Operations Unified Policy Management THE PLATFORM TO CONSOLIDATE ALL YOUR SECURITY . 10 Layered Policy Task-Oriented Console
  • 5. ©2016 Check Point Software Technologies Ltd. 5 U N I F I E D P O L I C Y M A N A G E M E N T [Protected] Non-confidential content​ CHANGE THE WAY YOU MANAGE SECURITY. 10
  • 6. ©2016 Check Point Software Technologies Ltd. 6 One Platform to Manage Everything [Protected] Non-confidential content​ ONE CONSOLE ONE POLICY Enterprise
  • 7. ©2016 Check Point Software Technologies Ltd. 7 One Policy to Manage Everything [Protected] Non-confidential content​ Users Devices Applications Data Gateways Private Cloud Public Cloud Virtual GW
  • 8. ©2016 Check Point Software Technologies Ltd. 8 L AY E R E D P O L I C Y [Protected] Non-confidential content​ CHANGE THE WAY YOU MANAGE SECURITY. 10
  • 9. ©2016 Check Point Software Technologies Ltd. 9 Easily Segment Policy in Layers for Better Manageability and Control [Protected] Non-confidential content
  • 10. ©2016 Check Point Software Technologies Ltd. 10 Easily Segment Policy in Layers for Better Manageability and Control [Protected] Non-confidential content Each policy segment can be delegated to distribute workload Walter Ann Duties separated based on IT role
  • 11. ©2016 Check Point Software Technologies Ltd. 11 E F F I C I E N T, TA S K - O R I E N T E D M A N A G E M E N T [Protected] Non-confidential content​ CHANGE THE WAY YOU MANAGE SECURITY. 10
  • 12. ©2016 Check Point Software Technologies Ltd. 12 Task-Oriented Features Increase Efficiency [Protected] Non-confidential content​ With one click, access all associated logs and rule details
  • 13. ©2016 Check Point Software Technologies Ltd. 13 Admin Concurrency Increases Team Productivity [Protected] Non-confidential content​ Ann Walter Ann logs in, sees rule 3 locked Walter logs in, works on rule 3 Ann works on rule 2 Multiple admins can work on same policy without conflict
  • 14. ©2016 Check Point Software Technologies Ltd. 14[Protected] Non-confidential content​ 95% of security breaches could have been prevented by the correct configuration of security products Gartner Compliance Overview Helps you optimize your security settings & compliance Keep Your Security Compliant
  • 15. ©2016 Check Point Software Technologies Ltd. 15 S E C U R E A U TO M AT E D O P E R AT I O N S [Protected] Non-confidential content​ CHANGE THE WAY YOU WORK AND COLLABORATE. 10
  • 16. ©2016 Check Point Software Technologies Ltd. 16 Secure Documented API and Orchestration BUILT FOR AUTOMATION OpenandcompleteAPI usedasWeb Service orCLI fororchestration Strict Permissions Control privileges to access the system Well documented Simple and clear reference guide with examples [Protected] Non-confidential content
  • 17. ©2016 Check Point Software Technologies Ltd. 17 Empower Self-Service Security Add user H e l p d e s k P o r t a l All Categories Add application Add host Block user Block application Block host settingsApps Use R80 API to automate routine Helpdesk security tasks [Protected] Non-confidential content​
  • 18. ©2016 Check Point Software Technologies Ltd. 18 Empower Self-Service Security H e l p d e s k P o r t a l All Categories settingsApps Add application John Smith Social networking Facebook OK Cancel User name App category App name Improve Helpdesk SLA Reduce Security team workload overhead [Restricted] ONLY for designated groups and individuals​
  • 19. ©2016 Check Point Software Technologies Ltd. 19 I N T E G R AT E D T H R E AT M A N A G E M E N T [Protected] Non-confidential content​ CHANGE THE WAY YOU MANAGE RISK . 10
  • 20. ©2016 Check Point Software Technologies Ltd. 20 Fully Integrated Threat Management Logging [Protected] Non-confidential content​ Event Correlation Reporting Monitoring SECURITY MANAGEMENT . 10
  • 21. ©2016 Check Point Software Technologies Ltd. 21 A Single View into Security Risk [Protected] Non-confidential content
  • 22. ©2016 Check Point Software Technologies Ltd. 22[Protected] Non-confidential content​ Easily Customize, Monitor What’s Important
  • 23. ©2016 Check Point Software Technologies Ltd. 23 From View to Action [Protected] Non-confidential content​
  • 24. ©2016 Check Point Software Technologies Ltd. 24[Protected] Non-confidential content​ Consolidate all your security Deploy security without impeding innovation Gain full visibility to prevent the next attack Keep pace with dynamic environments THE FUTURE OF SECURITY MANAGEMENT. 10
  • 25. ©2016 Check Point Software Technologies Ltd. 25[Protected] Non-confidential content​ Customers Partners Experts COMMUNITY. CHECKPOINT.COM Ask questions. Share code. Stay up -to-date. . 10