©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved...

Post on 25-Dec-2015

215 views 2 download

Tags:

transcript

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Mike Barkett, CISSP

Head of Solutions Center Americas

June, 2012

22©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1 Check Point / Market Overview

IT Security in Emerging Countries2

Impact and Q&A3

33©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point At A Glance

Founded 1993, HQ in Tel Aviv

Consistent, Visionary Leadership

100% Security

Innovation, IP, Thought Leadership

2012 Revenue: $1.25 Billion

17% CAGR 2006-2011

Who do organizations trust to secure their business?

44©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

$575

$731 $809

$924

$1,097

$1,250

2006 2007 2008 2009 2010 2011

Outstanding Financial Performance

Market Cap $11.4BRevenue Growth 17%

CAGR ‘06-11

55©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Innovative Technologies

StatefulInspection I

patent5,606,668

TrueVectorEngine I

patent5,987,611

TrueVectorEngine II

patent6,850,943

CooperativeEnforcement

patent6,873,988

SecureXL

patent6,496,935

StatefulInspection II

patent5,835,726

Significant R&D investment

More than 1,500 security experts

ApplicationIntelligence

Accelerated Data Path

(ADP)

CoreXL PacketXL

66©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Network SecurityVendor of the Year

2011

Award Winning Security Products

Computing SecurityAwards EncryptionProduct of the Year

2011

Best IPS/IDS ProductReader Trust

Award

2012

Leader, Magic Quadrant Enterprise

Network Firewall

2004–2011

Leader, Magic Quadrant MobileData Protection

2001–2011

Best Buy,Endpoint Security

2011

NGFW Earns “Recommend”

Rating from NSS

2011

IPS Earns“Recommend”

Rating from NSS

2011

Leader, Magic Quadrant - UTM

2010–2011

IT Product of the Year – DLP

Computerworld Czech Republic

2010

100% of Fortune 100 Use Check Point Products

77©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Hospital record update

Online bank balance check

Social network update

Supermarket checkout

PDA email check

Credit card payment

ATM withdrawal

Remote data backup

ERP supplier catalog update

Opening of a new branch

Setup a mobile office

at a client

Check today’s

sales orders

Update this year’s

bonuses

Log into a WiFi hotspot

Securing Business Everywhere

7©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

88©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point and World Bank

Business relations back to 2002

Presence in Brazil and Singapore

Strong relationship with IMF

Strong team members in DC area– mbarkett@checkpoint.com

99©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Two Sources of Vulnerability

Human Technology

1010©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Threat Landscape

1111©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

User Access

Internet Applications Usage

Sensitive Data

Mobile Access

Network Threat Prevention

Check Point’s Solution: 3D Security

Gran

ular V

isibility

Identity Awareness

DLP

Mobile Access

SmartEvent

IPS

Anti-Bot

Antivirus

Application Control

URLF

1212©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1 Check Point / Market Overview

IT Security in Emerging Countries2

Impact and Q&A3

1313©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Check Point Successes

Many throughout the world; some public case studies:

QTSC: Vietnam Government

Quala: Colombia Manufacturing

Liverpool: Mexico Retail

1414©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Security 101

CO

NFI

DE

NTI

ALI

TY AVA

ILAB

ILITY

INTEGRITY

1515©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Emerging IT Security: The Bad

1616©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Emerging IT Security: The Bad

Source: snapvoip.blogspot.com

1717©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Emerging IT Security: The Good

Essential for participation in global digital economy

IT Governance

National assets >= Corporate assets

Foster growth of information economy jobs

1818©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– CoCom

1919©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability

2020©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability

2121©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

2222©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

2323©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

Malware, Piracy– Not just software

2424©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

2525©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

2626©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Barriers & Path to Success

Prerequisites– Trade restrictions– Education

Encryption– Exportability– Importability

Malware, Piracy– Not just software

Bootstrap – Authentic security as a solution to counterfeit security problems

2727©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Agenda

1 Check Point / Market Overview

IT Security in Emerging Countries2

Impact and Q&A3

2828©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Global HR Impact

>2,000 employees

0 RIF’s in 2 decades

Staff in 40 countries

Dallas Tel Aviv Tokyo

Ottawa Stockholm

2929©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties |

Questions?

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties

Thank You