Day1 01 E80 IntroducingEndpointSecurity
Day1 01 E80 IntroducingEndpointSecurity
Day1 01 E80 IntroducingEndpointSecurity
Endpoint Security
E80
3 Introduction to E80
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 2
History of CP Endpoint Security
R7x R73
Pointsec
ZoneLabs Acquisition
Acquisition
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 3
R80/E80 Release History
E80.40
E8x
Unified EP Mgmt
E80.30
EP Blade architecture
New Server architecture
E80.20
R8x R80.10
R80 GA
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 4
E80 Benefits from the beginning…
Unified Endpoint
Security Management
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 6
Manage Security of Users,
Not Just Machines
User may have HR Machines may
multiple machines have multiple users
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 8
The ONLY unified And Now --
Client for PC For Mac As Well !
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 9
Best Security Control & Visibility
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 11
Today’s Endpoint Security Solutions
…Manage multiple policies & attributes
--
instead of a business process
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 13
Visibility to organizational security picture
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 14
Integrated with Check Point
Management Architecture
Alongside
Endpoint Endpoint Policy
Network Policy
with Network
Security Security
Management management
E80.40 R75.40
SMART-1
Security Management
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 16
Unified Security Intelligence
Real time security visibility with SmartLog
– Across network and endpoint
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 17
Unified Security Intelligence
Real time security visibility with SmartLog
– Across network and endpoint
Full visibility of
John’s attempts to
copy data outside
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 18
Visibility to organizational security events
Across Network & Endpoint
John Stevens
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 19
Security Forensics & Analysis
with Endpoint Security SmartEvent
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 20
More in Endpoint Security E80.40
Personal Data
Data is not encrypted
Access to any user/device
Business Data
Data is encrypted
Transparent access only to
approved users and devices
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 22
Engage and educate users while
keeping business continuity with UserCheck
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 23
And even more…
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 24
Summary
Check Point Endpoint Security E80
Integrated with
One Endpoint Best Control & Check Point
Solution Visibility Management
architecture
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 25
Questions?
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and