20th March Session Five by Kapil Awasthi
-
Upload
sharath-kumar -
Category
Documents
-
view
611 -
download
1
description
Transcript of 20th March Session Five by Kapil Awasthi
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
Security : Multiple Facets
Kapil AwasthiSecurity ConsultantIndia & SAARC
22©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Threats
CXO Challenges
Myths
Innovation
Security Focal Point
Security: Multiple Dimensions
33©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Business Environment is Changing
44©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Cyber Crime is Business
Source: FBI
55©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Security Underneath
2,500,000,0002,500,000,000security events per daysecurity events per day
30,00030,000security events per secondsecurity events per second
66©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
More products =More products =More securityMore security
Myth -1
77©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Every Thing is under Control
Myth -2
88©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
EndpointEndpointsecuritysecurity
is just AVis just AV
Endpoint Security is Good to Have
Myth -3
99©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Dealing With Skills Issue
Adopting Right Technology
Maintaining Up times
Optimize the cost
CXO Challenge 1 - Keep the lights On
1010©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
CXO Challenge 2- Supporting Business
Scale the Operations
Expand the Operations
1111©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
CXO Challenge 3- Regulatory Compliance
I need to be secure becauseI need to be compliant
Or
My Security Governance Program leads to the Compliance
1212©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Innovation
Business Should Innovate Ideas for More Growth.
Operations Should Innovate to Reduce the cost
Technology Product Should Innovate to support Both The Above Causes
1313©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Lets’ Solve the Puzzle
1414©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Handling the Challenges
InnovativeSolutions
Agile Solutions
Risk MgtFramework
“Pay as you need”solutions
CXO SolutionMaze
What should you Look for!!
1515©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Check Point Innovation to Business Objectives
1616©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
►Securely access and work with corporate data from any PC
►Virtual Windows workspace
►Plug-and-play with no software install or system reboot required
►Securely access and work with corporate data from any PC
►Virtual Windows workspace
►Plug-and-play with no software install or system reboot required
Innovative Solutions - 1
MoreMoreAbraAbraAbra puts your office in your
1717©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Innovative Solutions - 2
1919©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Dynamic challenges need - Agile Solution
After reviewing UserCheck results the administrator updates the policy
Allow the teachers to
access YouTube
Allow TeamViewer for Specific user
Block P2P applications (private use)
2020©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Innovation 3 - Virtualization Security
Separates virtual machines for security
Protects against inter-VM threats
Protects against external threats
No need for physical appliances and
switches
Certified as Virtual Appliance by
VMware for ESX server
Provides virtual applications the same best-in-class security as
applications on physical servers
2121©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Risk Management Framework
L1 Engineer decides to block the source country
using R70.20 IPS Geo Protection feature
Hacker Land
2222©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
“Pay As You Grow” – Power-1 110xx
2323©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone |
Looking forward to working with you
The most trusted name in
security
Market leader, 100% focus on security
A full product line,catering for all customer needs
Reliable partner
98% F500 and 100% F100 Customers
Committed to investing and innovating
THANK YOU!www.checkpoint.com