Post on 13-Dec-2014
description
©2012 Check Point Software Technologies Ltd.
What’s New in Check Point Endpoint Security E80.40
[Protected] For public distribution
Jordi Medina Torregrosa
Data Security BDM for Spain & Portugal jmedina@checkpoint.com
2 ©2012 Check Point Software Technologies Ltd.
Unprotected
endpoints
put the entire
business at RISK
- Accept network
connections from anyone
- Remote connection apps
Unauthorized Access
Threat Infection
- Download infected
content from vulnerable
programs & OS
Data Loss
- Business data on hard
drives & storage devices
- Public file storage apps
[Protected] For public distribution
3 ©2012 Check Point Software Technologies Ltd.
Addressing Security Risks on Endpoints
[Protected] For public distribution
4 ©2012 Check Point Software Technologies Ltd.
Introducing Check Point
Endpoint Security E80.40
Best Security Control & Visibility
Single Security Solution
Across Windows & Mac
Integrated with Check Point
Management Architecture
[Protected] For public distribution
5 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Unified Security for Endpoints
Secures
endpoint
connections
Verify
security
compliance
Fire
wa
ll & C
om
plia
nc
e
Encrypt local
hard drives
Controls
users access
to device
Fu
ll Dis
k E
ncry
ptio
n
Encrypt
business data
copied to
removable
devices
Me
dia
En
cry
ptio
n
Stops
infected
files & data
Control
apps install
& launch
An
ti Ma
lwa
re
Connect
Securely to
business
resources
Check Point Endpoint Software Blades
6 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
The ONLY unified
Client for PC For Mac As Well ! And Now --
All Blades are Windows 8 Ready
Media Encryption and Anti Malware for Mac - 2013
7 ©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 7
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Best Security Control & Visibility
[Protected] For public distribution
8 ©2012 Check Point Software Technologies Ltd.
First, Define A Security Policy
[Protected] For public distribution
An Example for an Organizational Policy
Encrypt All
Drives on
PC & Mac
Encrypt business
data copied to
storage devices
Allow connections
only from
trusted sources
Scan files
upon access &
delete infected files
9 ©2012 Check Point Software Technologies Ltd.
A Unified, Simple to Understand
Security Policy With E80.40
[Protected] For public distribution
10 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Visibility to organizational security picture
11 ©2012 Check Point Software Technologies Ltd.
5
[Protected] For public distribution
Security Forensics & Analysis
with Endpoint Security SmartEvent
12 ©2012 Check Point Software Technologies Ltd.
Check Point Endpoint Compliance Analysis
Understand endpoint security risks
Run on ANY PC –
regardless installed endpoint product
Simple to read and understand
[Protected] For public distribution
13 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Local device analysis
- Download the analysis tool
- View report in <1 minute
WWW
Organizational Analysis
- Run on targeted devices
- Unified report in SmartConsole
Analyze from one device –
to the entire organization
14 ©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 14
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
Integrated with Check Point Management Architecture
[Protected] For public distribution
15 ©2012 Check Point Software Technologies Ltd.
Netw
ork
Po
licy
Alongside
with Network
Security
management
R75.40
En
dp
oin
t Po
licy
Endpoint
Security
Management
E80.40
[Protected] For public distribution
SMART-1
Security Management
Manage endpoint security policies
with Check Point SMART-1
16 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Cooperative Security Enforcement
Security Gateway
Protected Device
Remote access
Verify Security
Compliance
Upon Connect
17 ©2012 Check Point Software Technologies Ltd.
Unified Security Intelligence
Another Example:
John tries to
copy data
outside the
organization
Corporate Strategy – backup
John_st@yahoo.com
Strategy Plans 2012
Strategy
Plans 2012
Real time security visibility with SmartLog
– Across network and endpoint
[Protected] For public distribution
18 ©2012 Check Point Software Technologies Ltd.
Unified Security Intelligence
Strategy Plans 2012
Real time security visibility with SmartLog
– Across network and endpoint
Full visibility of
John’s attempts to
copy data outside
[Protected] For public distribution
19 ©2012 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 19
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. |
More in Endpoint Security E80.40
[Protected] For public distribution
20 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Personal Data Data is not encrypted
Access to any user/device
Business Data Data is encrypted
Transparent access only to
approved users and devices
Separate and protect business data
from personal data on storage devices
21 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Need to provide this presentation to our partner
X
Engage and educated users while
keeping business continuity with UserCheck
22 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
And even more…
Additional features in Endpoint Security E80.40
Getting-Started
Wizard
Custom image
in full disk
Encryption
Scan
Multiple
AD trees
Web-remote
help to remediate
passwords
Manage
80,000 seats
Configure &
preview user
messages
Set alerts &
notifications
Send alerts
in email
23 ©2012 Check Point Software Technologies Ltd. [Protected] For public distribution
Summary
Check Point Endpoint Security E80.40
Best Control &
Visibility
Integrated with
Check Point
Management
architecture
One Endpoint
Solution
©2012 Check Point Software Technologies Ltd.
Thank You!
[Protected] For public distribution