Date post: | 13-Dec-2014 |
Category: |
Technology |
Upload: | jordimedina |
View: | 1,139 times |
Download: | 1 times |
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Simplifying Endpoint Security Management
Jordi Medina Torregrosa
Endpoint BDM for Iberia
2 2 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Endpoint Security Management Today
Difficult to administrate, support and manage
Limited visibility into security
Increasing Endpoints per user
Assorted Endpoints per user
Multiple vendors
Multiple Endpoint Security Products
3 3 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
IT Managers’ opposing objectives
Endpoint Security Management Challenge
Maximize end-user
productivity
Effectively manage
the complexity
Mobile users on
multiple machines
Multiple capabilities to
protect endpoint and
ensure compliance
Protect end users and
corporate from threats
Visibility and control
of policy
4 4 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unified Security Endpoint Management
Check Point Simplifies Endpoint Security Management
Manage Security of Users,
Not Just Machines
Unique Visibility and Control
Unified Endpoint
Security Management
5 5 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Simplifies Endpoint Security Management
Unified Endpoint
Security
management
6 6 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unified Endpoint Security
Unify all endpoint security protection in a single management console and server
Full Disk
Encryption
Media
Encryption
Remote
Access
WebCheck Firewall/
Compliance Check Anti-Malware/
Program Control
7 7 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Comprehensive Security on the Endpoint
Protect against drive-by-downloads,
phishing sites and zero-day attacks
Stop unwanted traffic, prevent malware
and block targeted attacks
Automatically and transparently secure
all information on endpoint hard drives
Centrally enforceable encryption of
removable media and port control
Protects your endpoint from unsecure,
malicious and unwanted applications
Provide secure, seamless access to
corporate networks remotely
8 8 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Simplifies Endpoint Security Management
Get Unique
Visibility and
Control
9 9 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unique Visibility and Control
Monitor… Manage… Enforce…
…everything that’s
important to you
…policy and exceptions
on the fly
…compliance before the
network is accessed
10 10 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unique Visibility and Control
View all policies
in use
Summarized
infection
reporting
Filter compliance
report by groups
or networks
View all
endpoint
connectivity
View all latest
updates
Monitor with customizable, at-a-glance dashboard
11 11 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unique Visibility and Control
Manage all levels of the organization —
down to users and machines
Rose’s laptop Rose’s desktop
High-level view
Organizations
Users
Machines
Seamless Active Directory Integration
Adam Phillip Rose
Finance Sales HR Engineering
My organization
12 12 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unique Visibility and Control
Enforce and remediate endpoint compliance
Correct endpoint
security modules?
Updated OS
service pack?
Approved
applications only?
Updated anti-
malware version?
Verify
Restrict
Access
Allow
Access
Remediate
YES
NO
13 13 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unique Visibility and Control
HR Finance
Quickly deploy the right level of protection
for the right group
14 14 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Simplifies Endpoint Security Management
Manage Security
of Users, Not
Just Machines
15 15 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
HR machines have
many users
Manage Security of Users, Not Just Machines
Security policy follows the user
Rose has many
machines
16 16 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Drill down on groups, users and
all their machines in a few clicks
Manage Security of Users, Not Just Machines
Quickly
determine
Rose’s status
Search or click AD to
investigate group or
user status
Find Rose’s
machines
quickly View Rose’s
policies
17 17 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Manage Security of Users, Not Just Machines
Easily modify security policy
18 18 ©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Unified Security Endpoint Management
Check Point Simplifies Endpoint Security Management
Manage Security of Users,
Not Just Machines
Unique Visibility and Control
Unified Endpoint
Security Management
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Thank You!