©2002 check point software technologies ltd. proprietary & confidential check point software...
TRANSCRIPT
©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
Check Point Software Technologies Ltd.Connect, Protect & Manage – End-to-End Security
Ion Valentin COJOACA
Senior Security Consultant
OMNILOGIC
Agenda
About Check Point Today’s Dynamic Internet Security Landscape Customer Requirements SVN: A Framework for Success Check Point Solutions, Programs
and Partnerships The Check Point Advantage
About Check Point
History– Founded June 1993– IPO June 1996– Strong growth in revenues and profits
Global market leadership– De-facto standard for Internet security– VPN and Firewall market
share leadership– 273,000+ VPN/firewalls– Securing 97 of Fortune 100 companies
Strong business model– Technology innovation and leadership– Technology partnerships– Strong and diversified
channel partnerships– Open philosophy
273,000 Installations
VPN/Firewall Gateways
IT Imperatives
Connect Employees to Information
Integrate Business Units, Partners and Suppliers
Cut Costs
Keep Networks and Systems Available
Ensure Privacy and Security
Always
Customer Requirements
Protect
• Wired and wireless networks• Applications• Remote clients• Mobile devices• Broadband users
Connect
• Remote and branch offices• Teleworkers• Partners
Manage
• Thousands of users • Consistent security policy
across entire network• Tools for enterprise security
Accelerate
Network security for optimized:• Performance• Availability• Reliability
Customer Requirements
Industry support Best-of-breed platforms Broad channel support
CHOICE
SVN: A Framework for Success
Policy management framework Integrated enforcement points Open architecture
Check Point’s Secure Virtual Network ArchitectureThe industry’s only end-to-end Internet security platform
Innovative Technology
Market leading technologies are the foundation of a Secure Virtual Network
Unique to Check Point
Stateful Inspection– The industry de facto standard
SMART– Unparalleled security management
One-Click Technology– Easy to use; fast VPN deployment
SecureXL– Maximum performance and reliability
FireWall-1 10 Most Important
Products of the Decade
Network Computing Magazine
October 2000
Check Point Solutions:Protect with FireWall-1
CorporateNetwork
FireWall-1
Internet
The de facto standard, Check Point’s FireWall-1 protects Internet data
SmartDefense detects and protects against known and unknown attacks
Check Point Solutions:Detect & Protect with SmartDefense
CorporateNetwork
Mobile Users
Remote Access VPN
Site-Site VPN
Branch Office
Check Point Solutions:Connect with VPN-1
Extranet VPN
Check Point’s VPN-1 securely connections between offices, users and devices in wired and wireless environments
VPN-1/FireWall-1 integration enables the most secure communications
Web Browsers via
SSL
Internet
Check Point Solutions:Manage with SmartCenter Pro
Integrates management of:– Security, VPNs and Quality of Service (QoS)
Enabling:– Seamless end-to-end security– Comprehensive view of security infrastructure– Management of hundreds of firewalls and thousands of
VPNs from one central console
SmartCenter Pro is an easy-to-use centralized policy management solution
Check Point SolutionsManage with SmartCenter Pro
Check Point Solutions:Accelerate with Performance Pack
Wire-speed throughput for any network– Multi-gigabit firewalls
and VPNs
Non-stop availability– Innovative clustering solutions
Quality of Service for critical applications– Prioritization of
business-critical traffic
Fastest performance & best price/performance
FireWall-1
VPN-1
Check Point Solutions:Connect, Protect, Manage, Accelerate
Protect
FireWall-1SmartDefenseFireWall-1 SmallOfficeSafe@ Product FamilyFireWall-1 VSXFireWall-1 SecureServerFireWall-1 GX (Wireless)
Connect
VPN-1 ProVPN-1 NetVPN-1 SecuRemote/SecureClientVPN-1 SmallOfficeSafe@ Product FamilyVPN-1 VSXVPN-1 SecureServer
Manage
SmartCenter SmartCenter ProProvider-1SiteManager-1User AuthorityVisual Policy Editor
Accelerate
Performance PackClusterXLFloodGate-1VPN-1 Accelerator Card
Global SecurityGlobal Security& Networking & Networking
ExpertiseExpertise
Global SecurityGlobal Security& Networking & Networking
ExpertiseExpertise
• Solutions Partners• Certified Support Partners• Authorized Training Centers• Certified Security Consultants• Managed Service Providers• Check Point Service & Support
Secured bySecured byCheck PointCheck PointDeploymentDeployment
PlatformsPlatforms
Secured bySecured byCheck PointCheck PointDeploymentDeployment
PlatformsPlatforms
Gateways• Appliances, Servers,
Switches, RoutersClients• PCs, Mobile, PDAsServers• Unix, Linux, Windows
SecuritySecurityApplicationsApplications
SecuritySecurityApplicationsApplications
• Security Enforcement• Management and
Reporting• eBusiness Applications• Performance and
Availability
SecureChoice
Server-based Solutions
Appliance Solutions
Remote Client Connectivity
Unparalleled Platform Choice
Windows SecurePlatformSolaris Linux
RapidStreamNokiaIntrusion
NortelSofaWare VPN Dynamics Celestix
Cubix
Pyramid
SiemensResilience
Windows MacintoshWirelessPDAs
CrossBeam
• Application Application Service SupportService Support
• Authorization Authorization ManagementManagement
• Enterprise Enterprise ApplicationsApplications
• Integrators & Integrators & ASP’sASP’s
• MiddlewareMiddleware
• Acceleration Acceleration
• High High AvailabilityAvailability
• Load Load BalancingBalancing
• VPN VPN Capacity Capacity PlanningPlanning
• Wirless LANWirless LAN
• AuthenticationAuthentication
• Content SecurityContent Security
• Desktop SecurityDesktop Security
• Intrusion Intrusion DetectionDetection
• PKIPKI
• Smart CardsSmart Cards
• Enterprise Enterprise DirectoriesDirectories
• Enterprise Enterprise ManagementManagement
• Event Event Monitoring & Monitoring & AnalysisAnalysis
• ReportingReporting
• Security Security AssessmentAssessment
OPSEC ApplicationsOPSEC ApplicationsSecuritySecurity
EnforcementEnforcementManagement &Management &
ReportingReportingPerformance &Performance &
AvailabilityAvailabilityeBusiness ApplicationseBusiness Applications
OPSEC – Breadth of Applications
Industry-standard framework for integrating complementary security technologies
WirelessWireless Data Data CenterCenter
Complete Market Coverage
POPPOPEnterpriseEnterpriseCPECPE
SMBSMBCPECPEConsumerConsumerRemoteRemote
AccessAccess
Market SegmentsMarket Segments
SofaWareSofaWare
VPN-1 SecureClient/VPN-1 SecureClient/SecuRemoteSecuRemote
VPN-1 SecureClient/VPN-1 SecureClient/SecuRemoteSecuRemote VPN-1/FireWall-1 VPN-1/FireWall-1
Small OfficeSmall Office
VPN-1/FireWall-1 VPN-1/FireWall-1 Small OfficeSmall Office
VPN-1/FireWall-1 VPN-1/FireWall-1 Pro/NetPro/Net
VPN-1/FireWall-1 VPN-1/FireWall-1 Pro/NetPro/Net
Subscriber VPN Subscriber VPN PlatformsPlatforms
Subscriber VPN Subscriber VPN PlatformsPlatforms VPN-1/VPN-1/
FireWall-1 GXFireWall-1 GX
VPN-1/VPN-1/FireWall-1 GXFireWall-1 GX
VPN-1/FireWall-1VPN-1/FireWall-1VSXVSX
VPN-1/FireWall-1VPN-1/FireWall-1VSXVSX
The Check Point Advantage
Successful business model Innovative technology Recognized industry leadership Largest number of security engineers
Focus on customer needs Scalable solutions OPSEC – Industry’s standard
security platform Strong partnerships Best TCO
Best ProductsBest Products
Partnerships
Partnerships Open Solutions
Open Solutions
Thank You!Thank You!
We Secure the Internet
www.checkpoint.comWe Secure the Internet
www.checkpoint.com