Day1 01 E80 IntroducingEndpointSecurity

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 27

Introducing

Endpoint Security
E80

Check Point Endpoint Security E80


Pre-sales Training
Endpoint SE Team – Europe – 2012 ©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and
Agenda

1 History of CP Endpoint Security

2 E80 Project and values

3 Introduction to E80

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 2
History of CP Endpoint Security

R8x 3 years of development


R80
Unified Management Project
Code name: Ben Gurion

R7x R73

Unified Client Project R71 / R72


Code name: Arlanda
R70

Pointsec
ZoneLabs Acquisition
Acquisition

2004 2007 2008 2009 2010

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 3
R80/E80 Release History

E80.40

E8x
Unified EP Mgmt
E80.30

EP Blade architecture
New Server architecture
E80.20

R8x R80.10

R80 GA

Dec 10 Feb 11 June 11 December 11 October 12

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 4
E80 Benefits from the beginning…

Check Point Simplifies Endpoint Security Management

Unified Endpoint
Security Management

True Visibility and Control

Manage Security of users,


Not just machines
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 5
Comprehensive Security
on the Endpoint

Automatically and transparently secure


all information on endpoint hard drives

Centrally enforceable encryption of


removable media and port control

Provide secure, seamless access to


corporate networks remotely
Protects your endpoint from
unsecure, malicious and
unwanted applications
Protect against drive-by-downloads,
phishing sites and zero-day attacks

Stop unwanted traffic, prevent malware


and block targeted attacks

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 6
Manage Security of Users,
Not Just Machines
User may have HR Machines may
multiple machines have multiple users

Security policy follows the user


©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 7
Introducing Check Point
Endpoint Security E80.40

Single Security Solution


Across Windows & Mac

Best Security Control & Visibility

Integrated with Check Point


Management Architecture

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 8
The ONLY unified And Now --
Client for PC For Mac As Well !

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 9
Best Security Control & Visibility

©2012 Check Point Software©2012


Technologies
Check Point
Ltd. Software
| [Confidential]
Technologies
For Check
Ltd. [PROTECTED]
Point users and—
approved
All rights
third
reserved.
parties | 10
First, Define A Security Policy

An Example for an Organizational


Policy

Encrypt All Encrypt business Allow connections Scan files


Drives on data copied to only from upon access &
PC & Mac storage devices trusted sources delete infected files

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 11
Today’s Endpoint Security Solutions
…Manage multiple policies & attributes
--
instead of a business process

Encrypt All Encrypt business Allow connections Scan files


Drives on data copied to only from upon access &
PC & Mac storage devices trusted sources delete infected files

CAN YOU UNDERSTAND THE SECURITY POLICY?


©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 12
A Unified, Simple to Understand
Security Policy With E80.40

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 13
Visibility to organizational security picture

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 14
Integrated with Check Point
Management Architecture

©2012 Check Point Software©2012


Technologies
Check Point
Ltd. Software
| [Confidential]
Technologies
For Check
Ltd. [PROTECTED]
Point users and—
approved
All rights
third
reserved.
parties | 15
Manage endpoint security policies
with Check Point SMART-1

Alongside
Endpoint Endpoint Policy

Network Policy
with Network
Security Security
Management management
E80.40 R75.40

SMART-1
Security Management
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 16
Unified Security Intelligence
Real time security visibility with SmartLog
– Across network and endpoint

Another Example: Strategy


Plans 2012
John tries to
copy data
outside the
organization [email protected]

Strategy Plans 2012

Corporate Strategy – backup

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 17
Unified Security Intelligence
Real time security visibility with SmartLog
– Across network and endpoint

Strategy Plans 2012

Full visibility of
John’s attempts to
copy data outside

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 18
Visibility to organizational security events
Across Network & Endpoint

John Stevens

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 19
Security Forensics & Analysis
with Endpoint Security SmartEvent

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 20
More in Endpoint Security E80.40

©2012 Check Point Software©2012


Technologies
Check Point
Ltd. Software
| [Confidential]
Technologies
For Check
Ltd. [PROTECTED]
Point users and—
approved
All rights
third
reserved.
parties | 21
Separate and protect business data
from personal data on storage devices

Personal Data
 Data is not encrypted
 Access to any user/device

Business Data
 Data is encrypted
 Transparent access only to
approved users and devices

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 22
Engage and educate users while
keeping business continuity with UserCheck

Need to provide this presentation to our partner

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 23
And even more…

Additional features in Endpoint Security E80.40

Configure & Scan


Manage E75.20 VPN preview user multiple AD
80,000 seats Engine messages trees

Set alerts Send email Custom Web Remote


and alerts background Help for
notifications images in password
FDE reset

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 24
Summary
Check Point Endpoint Security E80

Integrated with
One Endpoint Best Control & Check Point
Solution Visibility Management
architecture

©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and 25
Questions?

©2012 Check Point Software©2012


Technologies
Check Point
Ltd. Software
| [Confidential]
Technologies
For Check
Ltd. [PROTECTED]
Point users and—
approved
All rights
third
reserved.
parties | 26
Thanks!

©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and

You might also like