+ All Categories
Home > Documents > 20th March Session Five by Kapil Awasthi

20th March Session Five by Kapil Awasthi

Date post: 23-Dec-2014
Category:
Upload: sharath-kumar
View: 611 times
Download: 1 times
Share this document with a friend
Description:
Security Multiple Facets - Check Point
Popular Tags:
22
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Security : Multiple Facets Kapil Awasthi Security Consultant India & SAARC
Transcript
Page 1: 20th March Session Five by Kapil Awasthi

©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone

Security : Multiple Facets

Kapil AwasthiSecurity ConsultantIndia & SAARC

Page 2: 20th March Session Five by Kapil Awasthi

22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Threats

CXO Challenges

Myths

Innovation

Security Focal Point

Security: Multiple Dimensions

Page 3: 20th March Session Five by Kapil Awasthi

33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Business Environment is Changing

Page 4: 20th March Session Five by Kapil Awasthi

44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Cyber Crime is Business

Source: FBI

Page 5: 20th March Session Five by Kapil Awasthi

55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Security Underneath

2,500,000,0002,500,000,000security events per daysecurity events per day

30,00030,000security events per secondsecurity events per second

Page 6: 20th March Session Five by Kapil Awasthi

66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

More products =More products =More securityMore security

Myth -1

Page 7: 20th March Session Five by Kapil Awasthi

77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Every Thing is under Control

Myth -2

Page 8: 20th March Session Five by Kapil Awasthi

88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

EndpointEndpointsecuritysecurity

is just AVis just AV

Endpoint Security is Good to Have

Myth -3

Page 9: 20th March Session Five by Kapil Awasthi

99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Dealing With Skills Issue

Adopting Right Technology

Maintaining Up times

Optimize the cost

CXO Challenge 1 - Keep the lights On

Page 10: 20th March Session Five by Kapil Awasthi

1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

CXO Challenge 2- Supporting Business

Scale the Operations

Expand the Operations

Page 11: 20th March Session Five by Kapil Awasthi

1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

CXO Challenge 3- Regulatory Compliance

I need to be secure becauseI need to be compliant

Or

My Security Governance Program leads to the Compliance

Page 12: 20th March Session Five by Kapil Awasthi

1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Innovation

Business Should Innovate Ideas for More Growth.

Operations Should Innovate to Reduce the cost

Technology Product Should Innovate to support Both The Above Causes

Page 13: 20th March Session Five by Kapil Awasthi

1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Lets’ Solve the Puzzle

Page 14: 20th March Session Five by Kapil Awasthi

1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Handling the Challenges

InnovativeSolutions

Agile Solutions

Risk MgtFramework

“Pay as you need”solutions

CXO SolutionMaze

What should you Look for!!

Page 15: 20th March Session Five by Kapil Awasthi

1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Check Point Innovation to Business Objectives

Page 16: 20th March Session Five by Kapil Awasthi

1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

►Securely access and work with corporate data from any PC

►Virtual Windows workspace

►Plug-and-play with no software install or system reboot required

►Securely access and work with corporate data from any PC

►Virtual Windows workspace

►Plug-and-play with no software install or system reboot required

Innovative Solutions - 1

MoreMoreAbraAbraAbra puts your office in your

pocket

Page 17: 20th March Session Five by Kapil Awasthi

1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Innovative Solutions - 2

Page 18: 20th March Session Five by Kapil Awasthi

1919©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Dynamic challenges need - Agile Solution

After reviewing UserCheck results the administrator updates the policy

Allow the teachers to

access YouTube

Allow TeamViewer for Specific user

Block P2P applications (private use)

Page 19: 20th March Session Five by Kapil Awasthi

2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Innovation 3 - Virtualization Security

Separates virtual machines for security

Protects against inter-VM threats

Protects against external threats

No need for physical appliances and

switches

Certified as Virtual Appliance by

VMware for ESX server

Provides virtual applications the same best-in-class security as

applications on physical servers

Page 20: 20th March Session Five by Kapil Awasthi

2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Risk Management Framework

L1 Engineer decides to block the source country

using R70.20 IPS Geo Protection feature

Hacker Land

Page 21: 20th March Session Five by Kapil Awasthi

2222©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

“Pay As You Grow” – Power-1 110xx

Page 22: 20th March Session Five by Kapil Awasthi

2323©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |

Looking forward to working with you

The most trusted name in

security

Market leader, 100% focus on security

A full product line,catering for all customer needs

Reliable partner

98% F500 and 100% F100 Customers

Committed to investing and innovating

THANK YOU!www.checkpoint.com

[email protected]


Recommended