SlideShare ist ein Scribd-Unternehmen logo
1 von 24
1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Julio Esquivel
Territory Manager
jesquive@checkpoint.com
Check Point
INFINITY
2©2018 Check Point Software Technologies Ltd.
Introducing GEN V PROTECTION
Against MEGA ATTACKS
3©2018 Check Point Software Technologies Ltd. 3©2018 Check Point Software Technologies Ltd.
WHAT INGREDIENTS DO WE NEED ?
4©2018 Check Point Software Technologies Ltd.
SAAS
SECURITY
ADAPTIVE
CLOUD
SECURITY
MOBILE APP
SCANNING
SDN MICRO-
SEGEMENTATION
CLOUD
SECURITY
AUTO-SCALE
ORCHESTRATION
ACCOUNT
TAKEOVER
PREVENTION
HYPERVISOR
LEVEL
SECURITY
PUBLIC-CLOUD
AUTOPROVISION
MOBILE
CODE
ANALYSIS
MOBILE AI
AND
MACHINE
LEARNING
DISK
ENCRYPTION
MEDIA
ENCRYPTION
MOBILE SMS
PHISHING
MOBILE MAN
IN THE
MIDDLE
ATTACKBLUETOOTH
ATTACK
DETECTION
SS7 ATTACK
PREVENTION
ADVANCED
JAILBREAK
PROTECTION
MEMORY
ANALYSIS
THREAT
EXTRACTION
HUMAN
INTERACTION
SIMULATION
INTRUSION
PREVENTION
DOMAIN
PREDICTION
MACHINE
LEARNING
ANTI-
RANSOMWARE
CPU LEVEL
SANDBOX
ENDPOINT
FORENSICS
CAMPAIGN
HUNTING
IMAGE FILE
SANITIZER
ENDPOINT
EXPLOITATION
DETECTION
FLASH
EMULATION
INTRUSION
PREVENTION
DOMAIN
PREDICTION
DECOYS &
TRAPS
ANTI-
RANSOMWARE
CPU LEVEL
SANDBOX
CPU EXPLOIT
DETECTOR
MACRO
ANALYSIS
OS-LEVEL
SANDBOX
DROPPED
FILES
EMULATION
TRANSPARENT
HTTPS
INSPECTION
STATIC
ANALYZER
LOW
LATENCY
FIREWALL
INTEGRATED
PACKET
CAPTURE
SCALABLE
IDENTITY
ACCESS
VIRTUAL
SYSTEMS
(VSX)
MULTICORE
VPN
SECURE-XL
SSL
INSPECTION
NATIONWIDE
PROTECTION
VERTICAL
SCALING
ZONE-BASED
SECURITY
CONTENT
AWARENESS
NETWORK
ENCRYPTION
ICS/SCADA
PROTECTION
APPLICATION
CONTROL
USER-CHECK
URL
FILTERING
HTTP 2.0
DLP
ICS/SCADA
PROTECTION
LARGE SCALE
MANAGEMENT
REST APIS
SECURITY
ADVISOR
SECURITY
MANAGEMENT
PORTAL
EVENT
CORRELATION
5©2018 Check Point Software Technologies Ltd.
SS7 ATTACK
PREVENTION
LARGE SCALE
MANAGEMENT
MOBILE MAN
IN THE MIDDLE
ATTACK
MEMORY
ANALYSIS
PUBLIC-CLOUD
AUTOPROVISION
THREAT
EXTRACTION
NETWORK
ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL
SANDBOX
ADAPTIVE
CLOUD
SECURITY
CLOUD
SECURITY
AUTO-SCALE
6©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd.
MAKING GEN V POSSIBLE
SS7 ATTACK
PREVENTION
LARGE SCALE
MANAGEMENT
MOBILE MAN
IN THE
MIDDLE
ATTACK
MEMORY
ANALYSIS
PUBLIC-CLOUD
AUTOPROVISION
THREAT
EXTRACTION
NETWORK
ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL
SANDBOX
ADAPTIVE
CLOUD
SECURITY
CLOUD
SECURITY
AUTO-SCALE
7©2018 Check Point Software Technologies Ltd.
You Need a Small Army of Security Technologies
Machine
Learning
CPU-Level
Sandboxing
8©2018 Check Point Software Technologies Ltd.
LOOKS IMPOSSIBLE?
MIRACLES TAKE A LITTLE LONGER.
(Charles Alexandre de Calonne, 1794)
THE IMPOSSIBLE WE
DO IMMEDIATELY
9©2018 Check Point Software Technologies Ltd. 9©2018 Check Point Software Technologies Ltd.
THIS WORKS !
YOU CAN MAKE IT POSSIBLE
Machine
Learning
CPU-Level
Sandboxing
Threat
Extraction
Virtual
Firewall
Endpoint
Detection
& Response
Human
Behavioral
Analytics
Data
Encryption
Data Leak
Prevention
Anti-Bot Flash
Detonation
URL
Filtering
Firewall
ICS/ SCADA
Protection
Machine
Learning
Proxy
Network
Encryption
Anti-
Ransomware
Zero
Phishing
Mobile Threat
Prevention
CPU-Level
Sandboxing
HTTPS
Inspection
Intrusion
Prevention
Anti-Virus DDOS
Hypervisor
Level Security
Application
Control
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
10©2018 Check Point Software Technologies Ltd.
HOW ARE WE REALIZING
THIS AT CHECK POINT ?
11©2018 Check Point Software Technologies Ltd.
Effective Security – Meeting Business Needs
Security policy
that expresses
your business
needs
Managing mobile,
cloud and network
environments
CONSOLIDATED
SINGLE ARCHITECTURE
Integrated
Threat
Prevention
Auto-scaling
with
your cloud
12©2018 Check Point Software Technologies Ltd.
Introducing…
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
13©2018 Check Point Software Technologies Ltd.
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
THE FIRST CONSOLIDATED SECURITY ACROSS NETWORKS, CLOUD,
AND MOBILE, PROVIDING THE HIGHEST LEVEL OF THREAT
PREVENTION.
14©2018 Check Point Software Technologies Ltd.
ACROSS ALL NETWORKS, CLOUDS AND MOBILE
ONE SECURITY
PLATFORM
Leveraging unified
threat intelligence
& open interfaces
FOCUS ON
THREAT PREVENTION
Blocking the most
sophisticated attacks
before they happen
Single Management,
Modular Policy
Management & integrated
threat visibility
CONSOLIDATED
MANAGEMENT
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
15©2018 Check Point Software Technologies Ltd.
ACROSS ALL NETWORKS, ENDPOINT, CLOUDS AND MOBILE
REAL TIME THREAT
PREVENTION
Block the most
sophisticated attacks before
they infiltrate the network
SHARED THREAT
INTELLIGENCE
Unified threat intelligence
and open interfaces block
attacks on all platforms
Single Management, Modular
Policy Management &
integrated threat visibility
CONSOLIDATED
MANAGEMENT
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
16©2018 Check Point Software Technologies Ltd.
[Internal Use] for Check Point employees​
TOTAL PROTECTION
INTRODUCING
ALL INCLUSIVE CONSUMPTION MODEL
FOR GEN-V OF CYBER SECURITY
17©2018 Check Point Software Technologies Ltd.
Infinity total protection benefits:
The Protection You Need, The Simplicity You Want
SECURITY
The best threat prevention
security architecture and
Management in the industry
Simple, per-user
Pricing, predictable
spend
Easy and agile
consumption model
Adapted to Your
Business Needs
SIMPLICITY FLEXIBILITY
18©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​
Target Audience
Customer Size Customer Type Customers Considering
• Greenfield customers (net new)
• Customers with limited Check Point
footprint
• Enterprises with an upcoming
refresh
• Total employees
count
• Redesigning their security
architecture
• Consolidating to a single
vendor
***Workshops and architecture discussions are KEY***
19©2018 Check Point Software Technologies Ltd.
Consume all Check Point Infinity Products & Solutions
* Appliance budget is calculated as 50% of total annual price. Consumption is done at list price against the budget amount
Endpoint and mobile protection for all employees
Advanced Threat Prevention and Zero day protection
24x7 Premium support included
Check Point Network software security and appliances*
TOTAL PROTECTION
20©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​
Infinity Total Protection Pricing
50% 5% 24x7
Cost per user
per year
% of spend
towards
Hardware
Purchase
% of spend
towards
Professional
Services
Premium
Support
Simple, Predictive, All Inclusive
* Existing install-base will continue to require separate support and services.
21©2018 Check Point Software Technologies Ltd.
•Next Gen FW, IPS,
Application Control, AV,
Anti Bot, URL Filtering,
Next Generation Threat
Prevention, Zero-Day
protection, Sandboxing,
DLP, HTTPS inspection,
ICS/SCADA protection,
and more.
Network Security
•Next Gen Threat
Prevention
•IaaS - Public, Private and
Hybrid Clouds
•East-West micro
segmentation
•Network access security
(NGFW, IPS, Application
CTRL, AV, Anti-Bot)
•Cloud SaaS – Account
takeover protection, Zero
Day prevention, Identity
protection
Cloud Security
•Anti ransomware
•Anti-phishing
•Security forensic
•Anti-virus (AV)
•Anti-Bot (AB)
•Personal Firewall
•USB media and port-
protection for desktop &
laptops (PCs)
•Secure Remote
Communication (VPN)
•Endpoint Detection &
Response
Endpoint
•Malware prevention
•Rogue Network
identification
•Secure Business
Environment
•Data Protection &
Seamless Document
Encryption
•Remediation and Policy
Enforcement
•Mobile Threat Prevention
Mobile Security
•Consolidated
management
•Forensic analysis
•Event Correlation
•Log Collection
•Compliance
•Auditing
•Change management
Security
Management
Software Products – The options are limitless!
[Internal Use] for Check Point employees​
*CloudGuard Cores and Software Gateway Cores will have an annual allotment based on
customers needs and fair usage
22©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​
Hardware Products
Replace at any time (using HW credit), within 4 years of delivery
HW credit bucket is annual and must be utilized within the relevant
subscription year
Annual hardware credit. Consumption is done at list price against the
budget amount
Zero-Day Threat Prevention (NGTX) bundles on all security gateways
23©2018 Check Point Software Technologies Ltd.
2.10
0.76
2.00
0.56
2.40
0.58
1.80
$1.80 M
Multi Vendor Single Vendor
More value with fewer vendors
List Price for enterprise with 5,000 users over 5 years
$10M
$6.0M
Mobile
Workspace
SIEM
Endpoint
Cloud
Sandboxing
Network Security
Check Point
Infinity
Total Protection
Other
$8M
- Better Security
- Reduced TCO
- Less time &
resources
24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
GRACIAS

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptxDESTROYER39
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellenceErik Taavila
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Edureka!
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022Temok IT Services
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptxMalu704065
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopLife Cycle Engineering
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapWAJAHAT IQBAL
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2ShivamSharma909
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solutionhearme limited company
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION Yash Shukla
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKMITRE ATT&CK
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend MicroAymen Mami
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationSeccuris Inc.
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 

Was ist angesagt? (20)

Cyber Security Seminar.pptx
Cyber Security Seminar.pptxCyber Security Seminar.pptx
Cyber Security Seminar.pptx
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
 
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
Penetration Testing Tutorial | Penetration Testing Tools | Cyber Security Tra...
 
McAfee - Portfolio Overview
McAfee - Portfolio OverviewMcAfee - Portfolio Overview
McAfee - Portfolio Overview
 
100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022100+ Cyber Security Interview Questions and Answers in 2022
100+ Cyber Security Interview Questions and Answers in 2022
 
CYBER SECURITY.pptx
CYBER SECURITY.pptxCYBER SECURITY.pptx
CYBER SECURITY.pptx
 
Cybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy WorkshopCybersecurity Risk Management Framework Strategy Workshop
Cybersecurity Risk Management Framework Strategy Workshop
 
NIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - MindmapNIST Cybersecurity Framework - Mindmap
NIST Cybersecurity Framework - Mindmap
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2CompTIA Security+ SY0-601 Domain 2
CompTIA Security+ SY0-601 Domain 2
 
IBM AppScan - the total software security solution
IBM AppScan - the total software security solutionIBM AppScan - the total software security solution
IBM AppScan - the total software security solution
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION ETHICAL HACKING PRESENTATION
ETHICAL HACKING PRESENTATION
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 
Workshop Trend Micro
Workshop Trend MicroWorkshop Trend Micro
Workshop Trend Micro
 
Information Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your OrganziationInformation Security Architecture: Building Security Into Your Organziation
Information Security Architecture: Building Security Into Your Organziation
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 

Ähnlich wie INFINITY Presentation

Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Greg Wartes, MCP
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityCristian Garcia G.
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18japijapi
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxssuser365526
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfMoti Sagey מוטי שגיא
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTCristian Garcia G.
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemMarketingArrowECS_CZ
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
 

Ähnlich wie INFINITY Presentation (20)

Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber SecurityAscendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Generación V de ciberataques
Generación V de ciberataquesGeneración V de ciberataques
Generación V de ciberataques
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdfCPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
 
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFTALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
ALMUERZO DE TRABAJO CHECKPOINT - SECURE SOFT
 
Understanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent ThemUnderstanding Advanced Threats and How to Prevent Them
Understanding Advanced Threats and How to Prevent Them
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 

Mehr von Cristian Garcia G.

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyCristian Garcia G.
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCristian Garcia G.
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadCristian Garcia G.
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Cristian Garcia G.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Cristian Garcia G.
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterCristian Garcia G.
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoCristian Garcia G.
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Cristian Garcia G.
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cristian Garcia G.
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoCristian Garcia G.
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecinaCristian Garcia G.
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoCristian Garcia G.
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Cristian Garcia G.
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCCristian Garcia G.
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteCristian Garcia G.
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Cristian Garcia G.
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Cristian Garcia G.
 

Mehr von Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Kürzlich hochgeladen

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Kürzlich hochgeladen (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

INFINITY Presentation

  • 1. 1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Julio Esquivel Territory Manager jesquive@checkpoint.com Check Point INFINITY
  • 2. 2©2018 Check Point Software Technologies Ltd. Introducing GEN V PROTECTION Against MEGA ATTACKS
  • 3. 3©2018 Check Point Software Technologies Ltd. 3©2018 Check Point Software Technologies Ltd. WHAT INGREDIENTS DO WE NEED ?
  • 4. 4©2018 Check Point Software Technologies Ltd. SAAS SECURITY ADAPTIVE CLOUD SECURITY MOBILE APP SCANNING SDN MICRO- SEGEMENTATION CLOUD SECURITY AUTO-SCALE ORCHESTRATION ACCOUNT TAKEOVER PREVENTION HYPERVISOR LEVEL SECURITY PUBLIC-CLOUD AUTOPROVISION MOBILE CODE ANALYSIS MOBILE AI AND MACHINE LEARNING DISK ENCRYPTION MEDIA ENCRYPTION MOBILE SMS PHISHING MOBILE MAN IN THE MIDDLE ATTACKBLUETOOTH ATTACK DETECTION SS7 ATTACK PREVENTION ADVANCED JAILBREAK PROTECTION MEMORY ANALYSIS THREAT EXTRACTION HUMAN INTERACTION SIMULATION INTRUSION PREVENTION DOMAIN PREDICTION MACHINE LEARNING ANTI- RANSOMWARE CPU LEVEL SANDBOX ENDPOINT FORENSICS CAMPAIGN HUNTING IMAGE FILE SANITIZER ENDPOINT EXPLOITATION DETECTION FLASH EMULATION INTRUSION PREVENTION DOMAIN PREDICTION DECOYS & TRAPS ANTI- RANSOMWARE CPU LEVEL SANDBOX CPU EXPLOIT DETECTOR MACRO ANALYSIS OS-LEVEL SANDBOX DROPPED FILES EMULATION TRANSPARENT HTTPS INSPECTION STATIC ANALYZER LOW LATENCY FIREWALL INTEGRATED PACKET CAPTURE SCALABLE IDENTITY ACCESS VIRTUAL SYSTEMS (VSX) MULTICORE VPN SECURE-XL SSL INSPECTION NATIONWIDE PROTECTION VERTICAL SCALING ZONE-BASED SECURITY CONTENT AWARENESS NETWORK ENCRYPTION ICS/SCADA PROTECTION APPLICATION CONTROL USER-CHECK URL FILTERING HTTP 2.0 DLP ICS/SCADA PROTECTION LARGE SCALE MANAGEMENT REST APIS SECURITY ADVISOR SECURITY MANAGEMENT PORTAL EVENT CORRELATION
  • 5. 5©2018 Check Point Software Technologies Ltd. SS7 ATTACK PREVENTION LARGE SCALE MANAGEMENT MOBILE MAN IN THE MIDDLE ATTACK MEMORY ANALYSIS PUBLIC-CLOUD AUTOPROVISION THREAT EXTRACTION NETWORK ENCRYPTION REST APIs ORCHESTRATION CPU LEVEL SANDBOX ADAPTIVE CLOUD SECURITY CLOUD SECURITY AUTO-SCALE
  • 6. 6©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd. MAKING GEN V POSSIBLE SS7 ATTACK PREVENTION LARGE SCALE MANAGEMENT MOBILE MAN IN THE MIDDLE ATTACK MEMORY ANALYSIS PUBLIC-CLOUD AUTOPROVISION THREAT EXTRACTION NETWORK ENCRYPTION REST APIs ORCHESTRATION CPU LEVEL SANDBOX ADAPTIVE CLOUD SECURITY CLOUD SECURITY AUTO-SCALE
  • 7. 7©2018 Check Point Software Technologies Ltd. You Need a Small Army of Security Technologies Machine Learning CPU-Level Sandboxing
  • 8. 8©2018 Check Point Software Technologies Ltd. LOOKS IMPOSSIBLE? MIRACLES TAKE A LITTLE LONGER. (Charles Alexandre de Calonne, 1794) THE IMPOSSIBLE WE DO IMMEDIATELY
  • 9. 9©2018 Check Point Software Technologies Ltd. 9©2018 Check Point Software Technologies Ltd. THIS WORKS ! YOU CAN MAKE IT POSSIBLE Machine Learning CPU-Level Sandboxing Threat Extraction Virtual Firewall Endpoint Detection & Response Human Behavioral Analytics Data Encryption Data Leak Prevention Anti-Bot Flash Detonation URL Filtering Firewall ICS/ SCADA Protection Machine Learning Proxy Network Encryption Anti- Ransomware Zero Phishing Mobile Threat Prevention CPU-Level Sandboxing HTTPS Inspection Intrusion Prevention Anti-Virus DDOS Hypervisor Level Security Application Control THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
  • 10. 10©2018 Check Point Software Technologies Ltd. HOW ARE WE REALIZING THIS AT CHECK POINT ?
  • 11. 11©2018 Check Point Software Technologies Ltd. Effective Security – Meeting Business Needs Security policy that expresses your business needs Managing mobile, cloud and network environments CONSOLIDATED SINGLE ARCHITECTURE Integrated Threat Prevention Auto-scaling with your cloud
  • 12. 12©2018 Check Point Software Technologies Ltd. Introducing… THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
  • 13. 13©2018 Check Point Software Technologies Ltd. THE CYBER SECURITY ARCHITECTURE OF THE FUTURE THE FIRST CONSOLIDATED SECURITY ACROSS NETWORKS, CLOUD, AND MOBILE, PROVIDING THE HIGHEST LEVEL OF THREAT PREVENTION.
  • 14. 14©2018 Check Point Software Technologies Ltd. ACROSS ALL NETWORKS, CLOUDS AND MOBILE ONE SECURITY PLATFORM Leveraging unified threat intelligence & open interfaces FOCUS ON THREAT PREVENTION Blocking the most sophisticated attacks before they happen Single Management, Modular Policy Management & integrated threat visibility CONSOLIDATED MANAGEMENT T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
  • 15. 15©2018 Check Point Software Technologies Ltd. ACROSS ALL NETWORKS, ENDPOINT, CLOUDS AND MOBILE REAL TIME THREAT PREVENTION Block the most sophisticated attacks before they infiltrate the network SHARED THREAT INTELLIGENCE Unified threat intelligence and open interfaces block attacks on all platforms Single Management, Modular Policy Management & integrated threat visibility CONSOLIDATED MANAGEMENT T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
  • 16. 16©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​ TOTAL PROTECTION INTRODUCING ALL INCLUSIVE CONSUMPTION MODEL FOR GEN-V OF CYBER SECURITY
  • 17. 17©2018 Check Point Software Technologies Ltd. Infinity total protection benefits: The Protection You Need, The Simplicity You Want SECURITY The best threat prevention security architecture and Management in the industry Simple, per-user Pricing, predictable spend Easy and agile consumption model Adapted to Your Business Needs SIMPLICITY FLEXIBILITY
  • 18. 18©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​ Target Audience Customer Size Customer Type Customers Considering • Greenfield customers (net new) • Customers with limited Check Point footprint • Enterprises with an upcoming refresh • Total employees count • Redesigning their security architecture • Consolidating to a single vendor ***Workshops and architecture discussions are KEY***
  • 19. 19©2018 Check Point Software Technologies Ltd. Consume all Check Point Infinity Products & Solutions * Appliance budget is calculated as 50% of total annual price. Consumption is done at list price against the budget amount Endpoint and mobile protection for all employees Advanced Threat Prevention and Zero day protection 24x7 Premium support included Check Point Network software security and appliances* TOTAL PROTECTION
  • 20. 20©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​ Infinity Total Protection Pricing 50% 5% 24x7 Cost per user per year % of spend towards Hardware Purchase % of spend towards Professional Services Premium Support Simple, Predictive, All Inclusive * Existing install-base will continue to require separate support and services.
  • 21. 21©2018 Check Point Software Technologies Ltd. •Next Gen FW, IPS, Application Control, AV, Anti Bot, URL Filtering, Next Generation Threat Prevention, Zero-Day protection, Sandboxing, DLP, HTTPS inspection, ICS/SCADA protection, and more. Network Security •Next Gen Threat Prevention •IaaS - Public, Private and Hybrid Clouds •East-West micro segmentation •Network access security (NGFW, IPS, Application CTRL, AV, Anti-Bot) •Cloud SaaS – Account takeover protection, Zero Day prevention, Identity protection Cloud Security •Anti ransomware •Anti-phishing •Security forensic •Anti-virus (AV) •Anti-Bot (AB) •Personal Firewall •USB media and port- protection for desktop & laptops (PCs) •Secure Remote Communication (VPN) •Endpoint Detection & Response Endpoint •Malware prevention •Rogue Network identification •Secure Business Environment •Data Protection & Seamless Document Encryption •Remediation and Policy Enforcement •Mobile Threat Prevention Mobile Security •Consolidated management •Forensic analysis •Event Correlation •Log Collection •Compliance •Auditing •Change management Security Management Software Products – The options are limitless! [Internal Use] for Check Point employees​ *CloudGuard Cores and Software Gateway Cores will have an annual allotment based on customers needs and fair usage
  • 22. 22©2018 Check Point Software Technologies Ltd. [Internal Use] for Check Point employees​ Hardware Products Replace at any time (using HW credit), within 4 years of delivery HW credit bucket is annual and must be utilized within the relevant subscription year Annual hardware credit. Consumption is done at list price against the budget amount Zero-Day Threat Prevention (NGTX) bundles on all security gateways
  • 23. 23©2018 Check Point Software Technologies Ltd. 2.10 0.76 2.00 0.56 2.40 0.58 1.80 $1.80 M Multi Vendor Single Vendor More value with fewer vendors List Price for enterprise with 5,000 users over 5 years $10M $6.0M Mobile Workspace SIEM Endpoint Cloud Sandboxing Network Security Check Point Infinity Total Protection Other $8M - Better Security - Reduced TCO - Less time & resources
  • 24. 24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. GRACIAS

Hinweis der Redaktion

  1. Using
  2. COREXL SyncXL SSL interception UserSpaceFW Vertical scaling Content awareness HTTPS Inspection SSL acceleration SecureXL ClusterXL Network ecyprion Virtual Systems Application control Disk encryption Cooperative enforcement zone based policy Security Advisor ( GRC) UserCheck DLP Security Management Portal DDOS Mobile APP scanning Mobile code flow analysis Moibile URL filtering (new) SMS Phishing Advanced Jailbreak detection WIFI Hotspot detection Mobile machine learning Mobile static code analsyis Bluetooth Attack detection Mobile Anti-both ( new) Mobile conditoanl access ( new_) Campaign hunting Document Security Media Encrpytion Stateffule inspection Hypervisor security SSL VPN Clientless VPN Event correlation
  3. COREXL SyncXL SSL interception UserSpaceFW Vertical scaling Content awareness HTTPS Inspection SSL acceleration SecureXL ClusterXL Network ecyprion Virtual Systems Application control Disk encryption Cooperative enforcement zone based policy Security Advisor ( GRC) UserCheck DLP Security Management Portal DDOS Mobile APP scanning Mobile code flow analysis Moibile URL filtering (new) SMS Phishing Advanced Jailbreak detection WIFI Hotspot detection Mobile machine learning Mobile static code analsyis Bluetooth Attack detection Mobile Anti-both ( new) Mobile conditoanl access ( new_) Campaign hunting Document Security Media Encrpytion Stateffule inspection Hypervisor security SSL VPN Clientless VPN Event correlation
  4. Icon Similarity - Check if a file has a similar icon to a different file and thus try to camouflage itself as an expected file - for example exe with pdf icon,exe with mp3 icon etc. Flash detonation Unique detection engine that is capable to detect most known flash web exploits and probably also future exploits.  Allows rapidly detecting the attack by hooking to key operations in the exploit usage and allowing detection.  Machine Learning Large scale machine learning based detection engine to detect malicious executables, dlls, com files scr files and more.  DGA Detector - Detection of malware using domain generation algorithms
  5. Charles Alexandre de Calonne who was the controversial Finance Minister for King Louis XVI of France and Queen Marie Antoinette
  6. MANAGEMENT, BEST SECURITY, ADAPTIVE TO BUSINESS NEEDS
  7. And this is why we are introducing today Check Point infinity -
  8. One security platform : Highest level of security on all platforms, regardless of network or size Block attacks using common threat indicators across all networks Easily integrate to 3rd party capabilities for elevated security and orchestration Preemptive TP Focused on Prevention. Saving cost and time for effective protection Preventing both known and unknown targeted attacks CONSOLIDATED SYSTEM Efficiently manage security through a single pane of glass Centrally correlate all types of events across all network environments, cloud services and mobile infrastructures
  9. One security platform : Highest level of security on all platforms, regardless of network or size Block attacks using common threat indicators across all networks Easily integrate to 3rd party capabilities for elevated security and orchestration Preemptive TP Focused on Prevention. Saving cost and time for effective protection Preventing both known and unknown targeted attacks CONSOLIDATED SYSTEM Efficiently manage security through a single pane of glass Centrally correlate all types of events across all network environments, cloud services and mobile infrastructures
  10. For a predictable annual price, customers will have access to Check Point’s full suite of security products across the board - Protecting and preventing threats in your infrastructure, cloud, mobile, and endpoint platforms.
  11. For the predictable price 300$ per year – you have access to all of our software suite of products. In addition, 50% of the annual spend can be put towards new hardware purchases. This enables you to have a consistent upgrade schedule that suits your business. Manage the workload To ensure customer success, 5% of the annual spend can be used towards professional services and training. And lastly – everything under the Infinity Total Protection model is covered by 24/7 Premium Support.