SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
1
©2022 Check Point Software Technologies Ltd.
QUANTUM SD-WAN
UNIFYING THE BEST SECURITY WITH
OPTIMIZED CONNECTIVITY
2
©2022 Check Point Software Technologies Ltd.
Fast internet connectivity requires SD-WAN
DATA
CENTER
BROADBAND, 4G/5G, etc.
SD-WAN
BRANCH
OFFICE
SD-WAN
ANY LINK:
• BROADBAND
• 4G/5G/LTE
• MPLS
• Etc.
• Organizations are connecting
directly to the internet, adopting
SD-WAN
• SD-WAN optimizes Internet
connectivity with better service
levels and lower costs
3
©2022 Check Point Software Technologies Ltd.
SD-WAN reduces networking costs by 80%
MPLS Solution Broadband +
SD-WAN
Solution
Reduce monthly expenses
by 80% compared with
MPLS solutions
Resilient
and faster
connectivity
Autonomous SD-WAN
steering policies for
10,000+ applications
$185
Total per site/month
$1,000
Total per site/month
• ISP1 – 1 Gbps broadband
internet for $80/mo.
• ISP2 – 1 Gbps broadband
internet for $80/mo.
• SD-WAN service for
$14.8/mo. (1535 Spark)
• MPLS Ethernet
(100Mbps) at
$1000/mo.
4
©2022 Check Point Software Technologies Ltd.
Direct connectivity via SD-WAN bypasses enterprise security
Exposing branches to Gen V attacks
Increased Risk of Cyber Attacks
Requires a New Approach
to Branch Security DATA
CENTER
BRANCH
OFFICE
SD-WAN
Direct connections
bypass the
enterprise firewall
5
©2022 Check Point Software Technologies Ltd.
INTRODUCING
New software blade in Quantum Gateways
Unifying best security with optimized internet
and network connectivity
NOW AVAILABLE
6
©2022 Check Point Software Technologies Ltd.
Activate SD-WAN Blade from your Quantum Gateways
Next Generation
Firewall
Next Generation
Threat Prevention
Sandblast - Gen V
Threat Prevention
Quantum IoT Quantum SD-WAN
Firewall
VPN
Application-Control
IPS
NextGenerationFirewall+
Threat Emulation
Threat Extraction
IoT discovery
IoT threat prevention
Application prioritization
Connectivity monitoring
Automated link failover
Bandwidth aggregation
Anti Virus
Anti Bot
URL Filtering
Anti Spam
12 Blades – Best Security IoT SD-WAN
Advanced DNS
Security
Zero Phishing
R81.20 required R81.10 required
NextGenerationThreatPrevention+
R81.20 required
7
©2022 Check Point Software Technologies Ltd.
Medium Enterprise Large Enterprise
Up to 30 Gbps
28000
Up to 7.4 Gbps
6000 16200
T H R E AT P R E V E N T I O N + S D - WA N * T H R O U G H P U T
Supported in a broad range
of Quantum Gateways
Small Branch Office
Up to 1 Gbps
1500 3000
Medium Branch Office
Up to 1.5 Gbps
Full branch security stack with optimized connectivity
Up to 15 Gbps
Data Center
*estimated
8
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
9
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
10
©2022 Check Point Software Technologies Ltd.
Uncompromising Branch Security
Prevents all Branch Threats
Known & Unknown threats,
Ransomware and Phishing
Highest Malware Catch Rate
Blocks 99.7% of new malware*
*Per 2023 Miercom NGFW Benchmark Report
11
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
12
©2022 Check Point Software Technologies Ltd.
No more Zoom™ interruptions
Smooth Web Conferencing
sub-second failover between Internet connections
Optimized routing for applications and users
with 10,000+ supported apps
Internet Connectivity Monitoring
for latency, jitter and packet loss
With rich SD-WAN Capabilities
13
©2022 Check Point Software Technologies Ltd.
Optimized routing for applications and users
DESTINATION
USER, GROUP
OR NETWORK
OVER 10,000
APPLICATIONS
User-based
Optimization
10,000+
Apps
Application
Prioritization
Optimized
Steering
STEERING
BEHAVIOR
14
©2022 Check Point Software Technologies Ltd.
UNCOMPROMISING
BRANCH SECURITY
NO MORE ZOOM™
INTERRUPTIONS
A COMPLETE
SASE SOLUTION
Prevent attacks on the branch -
zero-days, phishing, ransomware
Rich capabilities:
sub-second failover, optimized
policies for 10,000+ apps
Complete Security + Internet
Access Solution (SASE)
Unifying best security with optimized
internet and network connectivity
15
©2022 Check Point Software Technologies Ltd.
BEST
SECURITY
NETWORKING
Connectivity monitoring
Automated link failover
Application prioritization
SECURITY & NETWORKING
FROM THE CLOUD
SASE
Bandwidth aggregation
Complete Security & Internet-access (SASE) solution
Unified Management from Check Point Infinity
Secure Internet Access
Data Protection
Malware & Phishing Prevention
SaaS Security
16
©2022 Check Point Software Technologies Ltd.
The SD-WAN software blade is
AVAILABLE TODAY
as a service,
at a simple monthly price
1535
Base Appliance
SD-WAN
Blade for Small Branch
Starting at
$14.8
Per Month
6200
Enterprise Appliance
Starting at
$328
Per Month
SD-WAN
Blade for Enterprise
17
©2022 Check Point Software Technologies Ltd.
Manufacturing Case Study
European-based Global Textile Manufacturer
• Competitive replacement owing to superior security
• 3000 employees globally, 20 branches
• Key SD-WAN requirements
• Resilient security & connectivity
• Single appliance for both
• Why Check Point?
• Easy and fast deployment
• Sufficient SD-WAN features to replace incumbent solution
Quantum SD-WAN fulfilled all our immediate needs,
achieving secure access and cost savings.
Solution Architect
European-based global textile manufacturer
December 2022
”
“
18
©2022 Check Point Software Technologies Ltd.
Public Services Case Study
Municipality in LATAM
• Competitive replacement owing to superior security
• Local govt body with 500 employees, 70 branches
• Key SD-WAN requirements
• Direct internet connectivity for SaaS apps
• MPLS and VPN connecting to Datacenter
• Why Check Point?
• Better security than incumbent vendor
• Converged security and SD-WAN solution
We chose Check Point’s Quantum SD-WAN because it
provided superior security to that of our incumbent SD-
WAN solution. We were looking for truly converged
security and SD-WAN and found that in their solution.
Solution Architect
LATM-based Municipality
December 2022
”
“
19
©2022 Check Point Software Technologies Ltd.
Summary
New Quantum SD-WAN
software blade
embedded in Quantum
Gateways
Optimized, secure
connectivity for
branch offices
10,000+ Auto-Steered Apps
Industry’s largest repository
Sub-second Failover
For uninterrupted zoom calls
Lower TCO
With single appliance
Complete SASE Solution
Consistent policies across
users & branches
Best Security
Highest malware catch rate
Quantum
SD-WAN
20
©2022 Check Point Software Technologies Ltd.
SD-WAN Market Comparison
Capabilities
Malware Block Rate 99.70% 72.70% 46.10% 43.60%
SD-WAN & SSE Solution
Quantum and
Harmony Connect
Missing SSE
SD-WAN only
Viptela &
Umbrella
Cloudgenix & Prisma
Steering Applications 10,000+ 5000+ 1400+ 3600+
Cloud-based Management YES
Partial on-prem
components
YES
Patrial on-prem
components
Autonomous Steering Policies
(SaaS Applications)
YES NO
Partial SaaS
applications only
NO
Application Routing YES YES YES YES
Advanced routing protocols
BGP, OSPF –
Roadmap 2023
BGP, OSPF BGP, OSPF, RIP BGP, OSPF
21
©2022 Check Point Software Technologies Ltd.
THANK YOU
22
©2022 Check Point Software Technologies Ltd.
Uncompromising Branch Security
Prevents all Branch Threats
Known & Unknown threats,
Ransomware and Phishing
Highest Malware Catch Rate
Blocks 99.7% of new malware*
*Per Miercom NGFW Benchmark 2023
DATA
CENTER
BROADBAND, 4G/5G
ETC.
BRANCH OFFICE
BROADBAND, 4G/5G, etc.
ANY LINK:
• BROADBAND
• 4G/5G/LTE
• MPLS
• Etc.

Weitere ähnliche Inhalte

Was ist angesagt?

How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsThousandEyes
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleEnterpriseGRC Solutions, Inc.
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...ThousandEyes
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Cloudflare
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network AutomationLaurent Ciavaglia
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architectureHybrid IT Europe
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioShah Sheikh
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalPriyanka Aash
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationPCCW GLOBAL
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancerxKinAnx
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Canada
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterMichael Nickle
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access Er. Ajay Sirsat
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN Ashutosh Kaushik
 

Was ist angesagt? (20)

How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN ProjectsHow to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
How to Evaluate, Rollout, and Operationalize Your SD-WAN Projects
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
Adopting SD-WAN With Confidence: How To Assure and Troubleshoot Internet-base...
 
Zero Trust Model Presentation
Zero Trust Model PresentationZero Trust Model Presentation
Zero Trust Model Presentation
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Brochure forcepoint dlp_en
Brochure forcepoint dlp_enBrochure forcepoint dlp_en
Brochure forcepoint dlp_en
 
Next Generation Network Automation
Next Generation Network AutomationNext Generation Network Automation
Next Generation Network Automation
 
Zero trust in a hybrid architecture
Zero trust in a hybrid architectureZero trust in a hybrid architecture
Zero trust in a hybrid architecture
 
DTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services PortfolioDTS Solution - Cyber Security Services Portfolio
DTS Solution - Cyber Security Services Portfolio
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
Software Defined WAN – SD-WAN
Software Defined WAN – SD-WANSoftware Defined WAN – SD-WAN
Software Defined WAN – SD-WAN
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
Presentation f5 – beyond load balancer
Presentation   f5 – beyond load balancerPresentation   f5 – beyond load balancer
Presentation f5 – beyond load balancer
 
Cisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network IntuitiveCisco Digital Network Architecture - Introducing the Network Intuitive
Cisco Digital Network Architecture - Introducing the Network Intuitive
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
SOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations CenterSOC presentation- Building a Security Operations Center
SOC presentation- Building a Security Operations Center
 
Zero Trust Network Access
Zero Trust Network Access Zero Trust Network Access
Zero Trust Network Access
 
SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN SD WAN Overview | What is SD WAN | Benefits of SD WAN
SD WAN Overview | What is SD WAN | Benefits of SD WAN
 

Ähnlich wie Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf

Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyesThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdfSaurabh Chauhan
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitybayusch
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecaseRENJITHKNAIR5
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBECristian Garcia G.
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyesThousandEyes
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17Scott Logan
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkNetpluz Asia Pte Ltd
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PROIDEA
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)Mike Trawick
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceThousandEyes
 
Inteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityInteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityMarketingArrowECS_CZ
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)Cisco Canada
 
Vdc introduction with cameroon in Nov, 2013
Vdc introduction  with cameroon in Nov, 2013Vdc introduction  with cameroon in Nov, 2013
Vdc introduction with cameroon in Nov, 2013besuhao
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdfThousandEyes
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101Zivaro Inc
 

Ähnlich wie Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf (20)

Introduction To ThousandEyes
Introduction To ThousandEyesIntroduction To ThousandEyes
Introduction To ThousandEyes
 
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
0328apjcintrotothousandeyeswebinar-230328233735-4df10d7f.pdf
 
SD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivitySD-WAN_MoD.pptx for SD WAN networks connectivity
SD-WAN_MoD.pptx for SD WAN networks connectivity
 
Thousand Eyes FMD.pptx
Thousand Eyes FMD.pptxThousand Eyes FMD.pptx
Thousand Eyes FMD.pptx
 
ciscothousandeyesusecase
ciscothousandeyesusecaseciscothousandeyesusecase
ciscothousandeyesusecase
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
Introduction to ThousandEyes
Introduction to ThousandEyesIntroduction to ThousandEyes
Introduction to ThousandEyes
 
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
MetTel SD-WAN Hidden Benefits - webinar deck - Jan '17
 
Using a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business networkUsing a secured, cloud-delivered SD-WAN to transform your business network
Using a secured, cloud-delivered SD-WAN to transform your business network
 
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
PLNOG 22 - Sebastian Grabski - Is your network ready for application from the...
 
CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)CoreSite Interconnect Gateway (CIG)
CoreSite Interconnect Gateway (CIG)
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital ExperienceGetting Started With ThousandEyes Proof of Concepts: End User Digital Experience
Getting Started With ThousandEyes Proof of Concepts: End User Digital Experience
 
Inteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivityInteligentní řízení WAN konektivity
Inteligentní řízení WAN konektivity
 
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
SP Virtual Managed Services (VMS) for Intelligent WAN (IWAN)
 
Vdc introduction with cameroon in Nov, 2013
Vdc introduction  with cameroon in Nov, 2013Vdc introduction  with cameroon in Nov, 2013
Vdc introduction with cameroon in Nov, 2013
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
Realise True Business Value .pdf
Realise True Business Value .pdfRealise True Business Value .pdf
Realise True Business Value .pdf
 
Netpluz corp presentation 2020
Netpluz corp presentation 2020Netpluz corp presentation 2020
Netpluz corp presentation 2020
 
Software-Defined WAN 101
Software-Defined WAN 101Software-Defined WAN 101
Software-Defined WAN 101
 

Kürzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Quantum SD-WAN - High Level Customer PPT - 1-Mar-2023.pdf

  • 1. 1 ©2022 Check Point Software Technologies Ltd. QUANTUM SD-WAN UNIFYING THE BEST SECURITY WITH OPTIMIZED CONNECTIVITY
  • 2. 2 ©2022 Check Point Software Technologies Ltd. Fast internet connectivity requires SD-WAN DATA CENTER BROADBAND, 4G/5G, etc. SD-WAN BRANCH OFFICE SD-WAN ANY LINK: • BROADBAND • 4G/5G/LTE • MPLS • Etc. • Organizations are connecting directly to the internet, adopting SD-WAN • SD-WAN optimizes Internet connectivity with better service levels and lower costs
  • 3. 3 ©2022 Check Point Software Technologies Ltd. SD-WAN reduces networking costs by 80% MPLS Solution Broadband + SD-WAN Solution Reduce monthly expenses by 80% compared with MPLS solutions Resilient and faster connectivity Autonomous SD-WAN steering policies for 10,000+ applications $185 Total per site/month $1,000 Total per site/month • ISP1 – 1 Gbps broadband internet for $80/mo. • ISP2 – 1 Gbps broadband internet for $80/mo. • SD-WAN service for $14.8/mo. (1535 Spark) • MPLS Ethernet (100Mbps) at $1000/mo.
  • 4. 4 ©2022 Check Point Software Technologies Ltd. Direct connectivity via SD-WAN bypasses enterprise security Exposing branches to Gen V attacks Increased Risk of Cyber Attacks Requires a New Approach to Branch Security DATA CENTER BRANCH OFFICE SD-WAN Direct connections bypass the enterprise firewall
  • 5. 5 ©2022 Check Point Software Technologies Ltd. INTRODUCING New software blade in Quantum Gateways Unifying best security with optimized internet and network connectivity NOW AVAILABLE
  • 6. 6 ©2022 Check Point Software Technologies Ltd. Activate SD-WAN Blade from your Quantum Gateways Next Generation Firewall Next Generation Threat Prevention Sandblast - Gen V Threat Prevention Quantum IoT Quantum SD-WAN Firewall VPN Application-Control IPS NextGenerationFirewall+ Threat Emulation Threat Extraction IoT discovery IoT threat prevention Application prioritization Connectivity monitoring Automated link failover Bandwidth aggregation Anti Virus Anti Bot URL Filtering Anti Spam 12 Blades – Best Security IoT SD-WAN Advanced DNS Security Zero Phishing R81.20 required R81.10 required NextGenerationThreatPrevention+ R81.20 required
  • 7. 7 ©2022 Check Point Software Technologies Ltd. Medium Enterprise Large Enterprise Up to 30 Gbps 28000 Up to 7.4 Gbps 6000 16200 T H R E AT P R E V E N T I O N + S D - WA N * T H R O U G H P U T Supported in a broad range of Quantum Gateways Small Branch Office Up to 1 Gbps 1500 3000 Medium Branch Office Up to 1.5 Gbps Full branch security stack with optimized connectivity Up to 15 Gbps Data Center *estimated
  • 8. 8 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 9. 9 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 10. 10 ©2022 Check Point Software Technologies Ltd. Uncompromising Branch Security Prevents all Branch Threats Known & Unknown threats, Ransomware and Phishing Highest Malware Catch Rate Blocks 99.7% of new malware* *Per 2023 Miercom NGFW Benchmark Report
  • 11. 11 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 12. 12 ©2022 Check Point Software Technologies Ltd. No more Zoom™ interruptions Smooth Web Conferencing sub-second failover between Internet connections Optimized routing for applications and users with 10,000+ supported apps Internet Connectivity Monitoring for latency, jitter and packet loss With rich SD-WAN Capabilities
  • 13. 13 ©2022 Check Point Software Technologies Ltd. Optimized routing for applications and users DESTINATION USER, GROUP OR NETWORK OVER 10,000 APPLICATIONS User-based Optimization 10,000+ Apps Application Prioritization Optimized Steering STEERING BEHAVIOR
  • 14. 14 ©2022 Check Point Software Technologies Ltd. UNCOMPROMISING BRANCH SECURITY NO MORE ZOOM™ INTERRUPTIONS A COMPLETE SASE SOLUTION Prevent attacks on the branch - zero-days, phishing, ransomware Rich capabilities: sub-second failover, optimized policies for 10,000+ apps Complete Security + Internet Access Solution (SASE) Unifying best security with optimized internet and network connectivity
  • 15. 15 ©2022 Check Point Software Technologies Ltd. BEST SECURITY NETWORKING Connectivity monitoring Automated link failover Application prioritization SECURITY & NETWORKING FROM THE CLOUD SASE Bandwidth aggregation Complete Security & Internet-access (SASE) solution Unified Management from Check Point Infinity Secure Internet Access Data Protection Malware & Phishing Prevention SaaS Security
  • 16. 16 ©2022 Check Point Software Technologies Ltd. The SD-WAN software blade is AVAILABLE TODAY as a service, at a simple monthly price 1535 Base Appliance SD-WAN Blade for Small Branch Starting at $14.8 Per Month 6200 Enterprise Appliance Starting at $328 Per Month SD-WAN Blade for Enterprise
  • 17. 17 ©2022 Check Point Software Technologies Ltd. Manufacturing Case Study European-based Global Textile Manufacturer • Competitive replacement owing to superior security • 3000 employees globally, 20 branches • Key SD-WAN requirements • Resilient security & connectivity • Single appliance for both • Why Check Point? • Easy and fast deployment • Sufficient SD-WAN features to replace incumbent solution Quantum SD-WAN fulfilled all our immediate needs, achieving secure access and cost savings. Solution Architect European-based global textile manufacturer December 2022 ” “
  • 18. 18 ©2022 Check Point Software Technologies Ltd. Public Services Case Study Municipality in LATAM • Competitive replacement owing to superior security • Local govt body with 500 employees, 70 branches • Key SD-WAN requirements • Direct internet connectivity for SaaS apps • MPLS and VPN connecting to Datacenter • Why Check Point? • Better security than incumbent vendor • Converged security and SD-WAN solution We chose Check Point’s Quantum SD-WAN because it provided superior security to that of our incumbent SD- WAN solution. We were looking for truly converged security and SD-WAN and found that in their solution. Solution Architect LATM-based Municipality December 2022 ” “
  • 19. 19 ©2022 Check Point Software Technologies Ltd. Summary New Quantum SD-WAN software blade embedded in Quantum Gateways Optimized, secure connectivity for branch offices 10,000+ Auto-Steered Apps Industry’s largest repository Sub-second Failover For uninterrupted zoom calls Lower TCO With single appliance Complete SASE Solution Consistent policies across users & branches Best Security Highest malware catch rate Quantum SD-WAN
  • 20. 20 ©2022 Check Point Software Technologies Ltd. SD-WAN Market Comparison Capabilities Malware Block Rate 99.70% 72.70% 46.10% 43.60% SD-WAN & SSE Solution Quantum and Harmony Connect Missing SSE SD-WAN only Viptela & Umbrella Cloudgenix & Prisma Steering Applications 10,000+ 5000+ 1400+ 3600+ Cloud-based Management YES Partial on-prem components YES Patrial on-prem components Autonomous Steering Policies (SaaS Applications) YES NO Partial SaaS applications only NO Application Routing YES YES YES YES Advanced routing protocols BGP, OSPF – Roadmap 2023 BGP, OSPF BGP, OSPF, RIP BGP, OSPF
  • 21. 21 ©2022 Check Point Software Technologies Ltd. THANK YOU
  • 22. 22 ©2022 Check Point Software Technologies Ltd. Uncompromising Branch Security Prevents all Branch Threats Known & Unknown threats, Ransomware and Phishing Highest Malware Catch Rate Blocks 99.7% of new malware* *Per Miercom NGFW Benchmark 2023 DATA CENTER BROADBAND, 4G/5G ETC. BRANCH OFFICE BROADBAND, 4G/5G, etc. ANY LINK: • BROADBAND • 4G/5G/LTE • MPLS • Etc.