FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session...

38
1 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd. 2017 June 22 Kazutoshi Hayashi Checkpoint Roadmap and Highlight 20min. Moment of truth FEEDBACK OF CPX2017 [Protected] Distribution or modification is subject to approval

Transcript of FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session...

Page 1: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

1 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

2017 June 22 Kazutoshi Hayashi

Checkpoint Roadmap and Highlight 20min. Moment of truth

FEEDBACK OF CPX2017

[Protected] Distribution or modification is subject to approval

Page 2: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

2 ©2017 Check Point Software Technologies Ltd.

Infinity

CXP について

サマリー

Checkpointのロードマップ(ドリットのセッション)

CPX 開催中のHOTトピックス

AGENDA

Page 3: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

3 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

CPX 2017 Feed Back of CPX THE FUTURE OF CYBER SECURITY

[Protected] Distribution or modification is subject to approval

Page 4: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

4 ©2017 Check Point Software Technologies Ltd.

CPX 2017 MILANO

Page 5: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

5 ©2017 Check Point Software Technologies Ltd. Infinity

今年はEUROPEはITALY MILANOで開催

Page 6: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

6 ©2017 Check Point Software Technologies Ltd. Infinity

PICTURE GALLALY

Page 7: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

7 ©2017 Check Point Software Technologies Ltd. Infinity

CPX AGENDA

Page 8: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

8 ©2017 Check Point Software Technologies Ltd. Infinity

主要なるトピックスのご紹介(CPX AGENDA) Cyber Talks

Topic Speaker Abstract

Welcome to the Future of Cyber Security

Gil Shwed We are all living in a connected world which is affecting every aspect of our lives.

Founder and CEO In the past couple of years, we have been discussing implications of a technology and digital-driven world (i.e.) cloud, mobile, advanced threats.

Check Point Software Technologies Today, we are seeing some of our worst predictions shaping into real life.

So why are businesses not protecting themselves and instead keep making excuses?

In today’s world, business need security that meet their business needs.

Gil Shwed's discussion defines the pillars of security that businesses should adopt, based on their actual business needs.

Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan

Gil Shwed Gil Shwed & Marius Nacht Interview @ 2017 CPX Milan Founder and CEO

Check Point Software Technologies

Marius Nacht Co-Founder and Chairman

Cyber Security in the Era of Exponential Technology

Amnon Bar-Lev We are in an extraordinary time in human history. Thanks to innovative and disruptive technologies we live longer, healthier and more educated than ever before. While technologies such as cloud computing, mobile and Internet of Things open up new opportunities, they are, in many cases, the biggest barriers for adoption due to cyber security concerns. How do you innovate, inspire and compete while remaining secure? In his inspiring session, Amnon Bar-Lev shares the Check Point vision on how organizations can keep focus on innovating while being secured with a security architecture that is one step ahead.

President Check Point Software Technologies

Page 9: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

9 ©2017 Check Point Software Technologies Ltd. Infinity

主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract

Seeing is Believing: Hacking the Smartphone

Michael Shaulov Join this exciting live demo to see first-hand how easy it is to hack any smartphone today. In this session Michael Shaulov will demonstrate live hacking of a smartphone, the risks and possible mitigations for the new Achilles heel of enterprises today and tomorrow.

Head of Product Management and Product Marketing, Mobile

Check Point Software Technologies

Surviving the Ransomware Plague

Orli Gan Ransomware reached epidemic proportions in 2016. Organizations of all sizes and sectors fell victim to malware that locked down, encrypted – and in some cases threatened to destroy – critical systems and data. How would you avoid becoming tomorrow’s headline? How can businesses continue to operate without disruption despite this looming threat? Learn how Check Point Anti-Ransomware technology protects against every type of ransomware attack, ensuring continuous access to your data

Head of Products, Threat Prevention

Check Point Software Technologies

Check Point Latest Announcements

Gabi Reish Check Point Infinity announcement VP, Product Management and Product Marketing

Check Point Software Technologies

Choosing the Right Security Architecture

Moti Sagey When it comes to choosing the right security architecture & security vendor, what does it take to win your trust? In this session Moti Sagey will cover three key pillars the security solution must possess to win in a highly competitive environment: Uncompromised Security, Everywhere Architecture and Operational Efficiency. Moti will share pragmatic tips to unveil the true efficacy of the solution with zero marketing "fluffy claims".

Head of Strategic Marketing & Intelligence

Check Point Software Technologies

Page 10: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

10 ©2017 Check Point Software Technologies Ltd. Infinity

主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract

Moving to the Public Cloud, Securely - FireChat with AWS & Azure

Peter Alexander More than 70% of the organizations are committed to a cloud strategy in 2017.

CMO Businesses are moving their applications to the Cloud to gain more agility and efficiencies.

Check Point Software Technologies At the same time, Cloud security remains their top concern.

Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.

Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.

Shedding Light on the Dark Web

Avi Rembaum (Las Vegas and Milan) The dark web is quickly evolving into a marketplace of information and tools that the hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale in the dark web to improve corporate security architectures. This session showcase real examples of data in the dark web and suggest pragmatic tips to mitigate future attacks.

Vice President, Security Solutions Neatsun Ziv (Las Vegas)

VP, Threat Prevention Check Point Software Technologies

What To Do When It Happens to You - Check Point Incident Response

Daniel Wiley Based on real world experiences of helping customers, this candid discussion will focus on ensuring that your organization is prepared when a breach occurs in your network. The discussion will provide real world examples of what works and what does not work and provides a framework on how to center your organizations security strategy to face any incident head on.

Head of Incident Response Check Point Software Technologies

IoT Hacking - Live Oded Vanunu Ready or not, the Internet of things (IoT) is here. No longer a buzz word, it continues to grow at an unprecedented pace for years to come and is expected to reach over 25 billion connected devices by 2020. Most IoT devices, apps, and infrastructure were developed without security in mind and have already been exploited on major hacking campaigns in the past two years & will continue to be the main targets for hackers. Are organizations ready to protect themselves? What are the key vulnerable points? In this session Oded Vanunu enters into the Hacker mind to exploit IoT devices. Oded will also share insights on possible mitigations for these threats

Head of Products Vulnerability Research

Check Point Software Technologies

Page 11: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

11 ©2017 Check Point Software Technologies Ltd. Infinity

主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract

Life Inside the Cloud Brian Linder The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this informative and entertaining session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments. Brian Linder will share a healthy dose of a real-life experience with an actual Check Point customer use case securing their complex hybrid cloud deployment.

Datacenter Sales Manager, Eastern US

Check Point Software Technologies

Safe Journey to the Cloud Itai Greenberg The era of cloud is upon us; firms of all sizes and in all walks of life are looking to leverage the agility and elasticity of cloud. But cloud carries a totally new and unique set of security challenges. In this session, you will take away five key tenants of cloud security, along with an accompanying set of recommendations on best practices securing hybrid cloud deployments.

Head of Cloud Security Check Point Software Technologies

External Speakers Moving to the Public Cloud, Securely - FireChat with AWS & Azure

Amazon AWS , Microsoft Azure More than 70% of the organizations are committed to a cloud strategy in 2017.

Businesses are moving their applications to the Cloud to gain more agility and efficiencies. At the same time, Cloud security remains their top concern.

Customers are looking for solution to secure their data and applications from modern threat targeting their shared, connected and agile cloud environment.

Join us for a fireside chat with top leaders from AWS, Azure and learn about their perspectives and recommendations for security best practices in the cloud.

How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real incident in which Deutsche Telekom was able to detect and prevent a specific cyber-attack. Describing the kill chain in laymen terms, how the attack was mitigated and the lessons learned.

Senior Vice President, Solution Sales & Consulting

Deutsche Telekom Group

Page 12: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

12 ©2017 Check Point Software Technologies Ltd. Infinity

主要なるトピックスのご紹介(CPX AGENDA) Topic Speaker Abstract

We Make Jeans; How Hard Can That Be?

Steve Zalewski This talk will present some of the business challenges, learnings and roadmaps from a security perspective to protect the global Levi Brand Chief Security Architect

Levi Strauss & Co.

Keeping it Simple Luke Beeson Presenting key guidance and directions related to the main needs of security architecture for 2017; how it must follow the business needs - and first and foremost - be simple and efficient to operate. Vice President of Security

British Telecom

The Evolving Role of the CISO in a Post Breach Organization

Joey Smith In this session CISO Joey Smith will discuss understanding the importance of compliance and security and how they are very different. Additionally he will review many of the personal leanings that he has gained from his experience as a CISO responsible for maturing an Information Security program.

CISO

Schnuck Markets

Simple Security Is Your Best Bet

Patrick Woods This thought-provoking session will challenge current models in cyber security management and architecture that suggest that complex problems demand complex solutions. Instead, it is a simplified approach, keeping users and senior leadership engaged while leveraging key partnerships that will prepare organizations to combat the cyber threats of today and tomorrow

CISO

Missouri State Highway Patrol

CISO... What's Next? Geremy Benkirane When managing and controlling information systems and data risks leads to the data controlling the business. Chief Information Security Officer

Exane SA

Page 13: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

13 ©2017 Check Point Software Technologies Ltd. Infinity

SPEAKERS

Page 14: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

14 ©2017 Check Point Software Technologies Ltd. Infinity

CPX さまざまなシーン

Page 15: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

15 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

Defeat Cyber Extortion

蔓延するランサムウェアを防御

[Protected] Distribution or modification is subject to approval

Page 16: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

WIN WITH CYBER EXTORTION

ENJOYING THE RANSOMWARE PLAGUE

ダークサイドからの見方 VIEW FROM DARK-SIDE

Page 17: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

2016年 なんとすばらしい年だったでしょう

MORE Innovation MORE

Product Lines

MORE Revenues

MORE Customers

MORE Press

Coverage

[Protected] Distribution or modification is subject to approval

Page 18: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

メディアの露出も盛況でした!

MORE Press

Coverage

[Protected] Distribution or modification is subject to approval

Page 19: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

CYBER CRIME STRATEGY IN THE OLD DAYS…

SPAM WORMS

KEYLOGGERS

BANKING TROJANS

BOTNETS

Credit card details

Medical records

Financial data

Intellectual property

Monetizing breached data is COMPLICATED and RISKY

より良い方法があります…

[Protected] Distribution or modification is subject to approval

Page 20: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

RANSOMWARE DATAは持ち主に返そう!

[Protected] Distribution or modification is subject to approval

Page 21: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

THE CYBER CRIME のポートフォリオ

LOW RISK

REVENUE POTENTIAL

Spam Worms

Keyloggers

Banking Trojans

Botnets

Click Fraud

DDoS

RANSOMWARE

Minimize risk Maximize revenues

Page 22: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

40% Install base 70%

of POCs bought our service

$1 Billion paid in 2016*

*according to FBI estimates

2016: 数値から見たRANSOMWARE

[Protected] Distribution or modification is subject to approval

Page 23: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

変化がありました!

デリバリーメカニズム 1 重要なデータを対象に 2 支払い方式 3

Page 24: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

RISK FREE PAYMENTS* 支払いの流れをトレースしにくい 顧客からのDirect online payment 支払いやすい(High motivation to pay)

The true power of BITCOIN *in the modern world

Page 25: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

CCX 2017 WELCOME TO THE FUTURE OF CYBER CRIME

Cyber Crime S O F T W A R E T E C H N O L O G I E S

L T D

24X7 Hotline

Advanced Ticketing System

Tiered Support

EXCELLENCE IN CUSTOMER CARE

支払いのためのサービスは万全です!

Page 26: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

26 ©2017 Check Point Software Technologies Ltd.

IT’S TIME TO DEFEAT CYBER EXTORTION!

CHECK POINT ANTI RANSOMWARE

[Protected] Distribution or modification is subject to approval

Page 27: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

27 ©2017 Check Point Software Technologies Ltd.

CHECK POINT ANTI RANSOMWARE INCLUDED with SandBlast Agent

もっともずるがしこい

ZERO-DAY ransomware もSTOP!

暗号化されたデータもリカバリー

[Protected] Distribution or modification is subject to approval

Page 28: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

28 ©2017 Check Point Software Technologies Ltd.

HOW ANTI-RANSOMWARE WORKS (アンチランサムウェアの動き)

ONGOING UPON DETECTION

BEHAVIORAL ANALYSIS(挙動解析)

常にRansomeware特有の挙動をモニターしています

DATA SNAPSHOTS

継続的に直近に作成されたファイルをバックアップ

QUARANTINE(隔離)

攻撃を停止させ、攻撃のすべての要素を隔離

RESTORE

暗号化されてしまったファイルをリストア

ANALYZE(解析)

攻撃の詳細情報を分析するためのフォレンシック分析を開始します。

RANSOMWARE PROTECTION IS ON

[Protected] Distribution or modification is subject to approval

Page 29: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

29 ©2017 Check Point Software Technologies Ltd.

HOW ANTI-RANSOMWARE WORKS(DEMO)

[Protected] Distribution or modification is subject to approval

Page 30: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

30 ©2017 Check Point Software Technologies Ltd.

| 6 months | Over 200 daily samples |

ANTI RANSOMWARE EFFECTIVENESS アンチランサムウェアの有効性 Tested with only Anti-Ransomware technology active

No AV signatures, No Anti-Bot, No Sandbox

99.3% NET CATCH RATE

*In real life you don’t have to turn those other protections off [Protected] Distribution or modification is subject to approval

もちろん! WANNA CRYもしっかりキャッチしました!

Page 31: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

31 ©2017 Check Point Software Technologies Ltd.

Anti-Ransomware

Anti-Bot

Threat Emulation

Threat Extraction

Zero Phishing

Anti-Virus

IPS 多層防御

[Protected] Distribution or modification is subject to approval

Page 32: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

32 ©2017 Check Point Software Technologies Ltd.

これで CYBER 恐喝も終わり!

Now with

ANTI RANSOMWARE

[Protected] Distribution or modification is subject to approval

Page 33: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

33 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

Dorit のセッションより

CHECKPOINT ROADMAP

[Protected] Distribution or modification is subject to approval

Page 34: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

34 ©2017 Check Point Software Technologies Ltd. Infinity

CHECKPOINT ROADMAP

Page 35: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

35 ©2017 Check Point Software Technologies Ltd. Infinity

CHECKPOINT ROADMAP

Page 36: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

36 ©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval

CPX 2018 2018

CP最大のSecurity プレゼンテーション

エンドユーザー同士のコミュニケーション

CP ブレインとダイレクトに情報交換

最新の動向とテクノロジーを目の前で

Page 37: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

37 ©2017 Check Point Software Technologies Ltd. [Protected] Distribution or modification is subject to approval

CPX 2018 2018

是非、次回のCPX

お客様とともに体感ください!

Page 38: FEEDBACK OF CPX2017 - · PDF fileMoti will share pragmatic tips to unveil ... This session showcase real ... How We Blocked a Targeted Attack Dr. Matthias Rosche A story of a real

38 ©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

THANK YOU

[Protected] Distribution or modification is subject to approval