©2002 check point software technologies ltd. proprietary & confidential check point software...

21
©2002 Check Point Software Technologies Ltd. Proprietary & Confiden Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security Ion Valentin COJOACA Senior Security Consultant OMNILOGIC

Upload: cassandra-bradley

Post on 20-Jan-2016

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

©2002 Check Point Software Technologies Ltd. Proprietary & Confidential

Check Point Software Technologies Ltd.Connect, Protect & Manage – End-to-End Security

Ion Valentin COJOACA

Senior Security Consultant

OMNILOGIC

Page 2: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Agenda

About Check Point Today’s Dynamic Internet Security Landscape Customer Requirements SVN: A Framework for Success Check Point Solutions, Programs

and Partnerships The Check Point Advantage

Page 3: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

About Check Point

History– Founded June 1993– IPO June 1996– Strong growth in revenues and profits

Global market leadership– De-facto standard for Internet security– VPN and Firewall market

share leadership– 273,000+ VPN/firewalls– Securing 97 of Fortune 100 companies

Strong business model– Technology innovation and leadership– Technology partnerships– Strong and diversified

channel partnerships– Open philosophy

273,000 Installations

VPN/Firewall Gateways

Page 4: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

IT Imperatives

Connect Employees to Information

Integrate Business Units, Partners and Suppliers

Cut Costs

Keep Networks and Systems Available

Ensure Privacy and Security

Always

Page 5: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Customer Requirements

Protect

• Wired and wireless networks• Applications• Remote clients• Mobile devices• Broadband users

Connect

• Remote and branch offices• Teleworkers• Partners

Manage

• Thousands of users • Consistent security policy

across entire network• Tools for enterprise security

Accelerate

Network security for optimized:• Performance• Availability• Reliability

Page 6: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Customer Requirements

Industry support Best-of-breed platforms Broad channel support

CHOICE

Page 7: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

SVN: A Framework for Success

Policy management framework Integrated enforcement points Open architecture

Check Point’s Secure Virtual Network ArchitectureThe industry’s only end-to-end Internet security platform

Page 8: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Innovative Technology

Market leading technologies are the foundation of a Secure Virtual Network

Unique to Check Point

Stateful Inspection– The industry de facto standard

SMART– Unparalleled security management

One-Click Technology– Easy to use; fast VPN deployment

SecureXL– Maximum performance and reliability

Page 9: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

FireWall-1 10 Most Important

Products of the Decade

Network Computing Magazine

October 2000

Check Point Solutions:Protect with FireWall-1

CorporateNetwork

FireWall-1

Internet

The de facto standard, Check Point’s FireWall-1 protects Internet data

Page 10: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

SmartDefense detects and protects against known and unknown attacks

Check Point Solutions:Detect & Protect with SmartDefense

Page 11: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

CorporateNetwork

Mobile Users

Remote Access VPN

Site-Site VPN

Branch Office

Check Point Solutions:Connect with VPN-1

Extranet VPN

Check Point’s VPN-1 securely connections between offices, users and devices in wired and wireless environments

VPN-1/FireWall-1 integration enables the most secure communications

Web Browsers via

SSL

Internet

Page 12: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Check Point Solutions:Manage with SmartCenter Pro

Integrates management of:– Security, VPNs and Quality of Service (QoS)

Enabling:– Seamless end-to-end security– Comprehensive view of security infrastructure– Management of hundreds of firewalls and thousands of

VPNs from one central console

SmartCenter Pro is an easy-to-use centralized policy management solution

Page 13: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Check Point SolutionsManage with SmartCenter Pro

Page 14: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Check Point Solutions:Accelerate with Performance Pack

Wire-speed throughput for any network– Multi-gigabit firewalls

and VPNs

Non-stop availability– Innovative clustering solutions

Quality of Service for critical applications– Prioritization of

business-critical traffic

Fastest performance & best price/performance

FireWall-1

VPN-1

Page 15: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Check Point Solutions:Connect, Protect, Manage, Accelerate

Protect

FireWall-1SmartDefenseFireWall-1 SmallOfficeSafe@ Product FamilyFireWall-1 VSXFireWall-1 SecureServerFireWall-1 GX (Wireless)

Connect

VPN-1 ProVPN-1 NetVPN-1 SecuRemote/SecureClientVPN-1 SmallOfficeSafe@ Product FamilyVPN-1 VSXVPN-1 SecureServer

Manage

SmartCenter SmartCenter ProProvider-1SiteManager-1User AuthorityVisual Policy Editor

Accelerate

Performance PackClusterXLFloodGate-1VPN-1 Accelerator Card

Page 16: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Global SecurityGlobal Security& Networking & Networking

ExpertiseExpertise

Global SecurityGlobal Security& Networking & Networking

ExpertiseExpertise

• Solutions Partners• Certified Support Partners• Authorized Training Centers• Certified Security Consultants• Managed Service Providers• Check Point Service & Support

Secured bySecured byCheck PointCheck PointDeploymentDeployment

PlatformsPlatforms

Secured bySecured byCheck PointCheck PointDeploymentDeployment

PlatformsPlatforms

Gateways• Appliances, Servers,

Switches, RoutersClients• PCs, Mobile, PDAsServers• Unix, Linux, Windows

SecuritySecurityApplicationsApplications

SecuritySecurityApplicationsApplications

• Security Enforcement• Management and

Reporting• eBusiness Applications• Performance and

Availability

SecureChoice

Page 17: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Server-based Solutions

Appliance Solutions

Remote Client Connectivity

Unparalleled Platform Choice

Windows SecurePlatformSolaris Linux

RapidStreamNokiaIntrusion

NortelSofaWare VPN Dynamics Celestix

Cubix

Pyramid

SiemensResilience

Windows MacintoshWirelessPDAs

CrossBeam

Page 18: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

• Application Application Service SupportService Support

• Authorization Authorization ManagementManagement

• Enterprise Enterprise ApplicationsApplications

• Integrators & Integrators & ASP’sASP’s

• MiddlewareMiddleware

• Acceleration Acceleration

• High High AvailabilityAvailability

• Load Load BalancingBalancing

• VPN VPN Capacity Capacity PlanningPlanning

• Wirless LANWirless LAN

• AuthenticationAuthentication

• Content SecurityContent Security

• Desktop SecurityDesktop Security

• Intrusion Intrusion DetectionDetection

• PKIPKI

• Smart CardsSmart Cards

• Enterprise Enterprise DirectoriesDirectories

• Enterprise Enterprise ManagementManagement

• Event Event Monitoring & Monitoring & AnalysisAnalysis

• ReportingReporting

• Security Security AssessmentAssessment

OPSEC ApplicationsOPSEC ApplicationsSecuritySecurity

EnforcementEnforcementManagement &Management &

ReportingReportingPerformance &Performance &

AvailabilityAvailabilityeBusiness ApplicationseBusiness Applications

OPSEC – Breadth of Applications

Industry-standard framework for integrating complementary security technologies

Page 19: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

WirelessWireless Data Data CenterCenter

Complete Market Coverage

POPPOPEnterpriseEnterpriseCPECPE

SMBSMBCPECPEConsumerConsumerRemoteRemote

AccessAccess

Market SegmentsMarket Segments

SofaWareSofaWare

VPN-1 SecureClient/VPN-1 SecureClient/SecuRemoteSecuRemote

VPN-1 SecureClient/VPN-1 SecureClient/SecuRemoteSecuRemote VPN-1/FireWall-1 VPN-1/FireWall-1

Small OfficeSmall Office

VPN-1/FireWall-1 VPN-1/FireWall-1 Small OfficeSmall Office

VPN-1/FireWall-1 VPN-1/FireWall-1 Pro/NetPro/Net

VPN-1/FireWall-1 VPN-1/FireWall-1 Pro/NetPro/Net

Subscriber VPN Subscriber VPN PlatformsPlatforms

Subscriber VPN Subscriber VPN PlatformsPlatforms VPN-1/VPN-1/

FireWall-1 GXFireWall-1 GX

VPN-1/VPN-1/FireWall-1 GXFireWall-1 GX

VPN-1/FireWall-1VPN-1/FireWall-1VSXVSX

VPN-1/FireWall-1VPN-1/FireWall-1VSXVSX

Page 20: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

The Check Point Advantage

Successful business model Innovative technology Recognized industry leadership Largest number of security engineers

Focus on customer needs Scalable solutions OPSEC – Industry’s standard

security platform Strong partnerships Best TCO

Best ProductsBest Products

Partnerships

Partnerships Open Solutions

Open Solutions

Page 21: ©2002 Check Point Software Technologies Ltd. Proprietary & Confidential Check Point Software Technologies Ltd. Connect, Protect & Manage – End-to-End Security

Thank You!Thank You!

We Secure the Internet

www.checkpoint.comWe Secure the Internet

www.checkpoint.com