CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe

 
CONTINUE READING
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
CHECK POINT INFINITY

  Mirko Kürten | Strategic Sales and Partnership

©2019 Check Point Software Technologies Ltd.   [Highly Restricted] ONLY for designated individuals​   1
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
2017 was a Cyber-Security Wake-up Call

WannaCry
Thousands of enterprises impacted in
over 99 countries

NotPetya
Completely shut down an entire
country and impacted over 60 more

                                         2
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
ENTERPRISE‘S ARE NOT PROTECTED
TO CURRENT LEVEL ATTACKS

                                                              Gen IV
                                                                        MEGA
                                                Gen III
       Gen I
                                  Gen II
                                                              PAYLOAD
                                                                                    !
                                                                                Enterprises
                                               APPLICATIONS
                                                                               are protected
          VIRUS                   NETWORKS                                      for Gen 2-3
                                               2.8                                attacks

©2019 Check Point Software Technologies Ltd.                                                   3
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
#3MUCH COMPLEXITY
TOO

                         Too many different solutions
                                                            2007       2018
                          Threat Actors                      1,000
                          Threat Types                       1,000,000
                          Alerts / Day (Average Per Firm)   1,000,000
    Too manySecurity
              different
                     Vendors Solutions do not cooperate
                                                 2,600 management
        solutions
            Security Spending  no shared intelligence
                                                 $90B
                                     architecture                impossible

 ©2019 Check Point Software Technologies Ltd.                                       4
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
COMPLEXITY - PREVENTING INFECTED FILES
                                                                                                   9 ATTACK VECTORS
                                                                 Mobile      Web       Corporate    Shared   End Point         Messaging   SaaS       Private
                                                                 Devices   Downloads     Email      Folder    Device     FTP    Apps.      Apps        Email

                                  Anti Virus
9 S ECU RI TY TECHNOL OGIES

                                  Sandbox

                                  File Extraction

                                  Static Analysis

                                  DLP

                                  SSL Inspection
                                                                                                                                                    This is a
                                  Anti Ransomware                                                                                                    9 9
                                                                                                                                                       X
                                                                                                                                                    problem
                                  Machine learning                                                                                                 Complexity
                                                                                                                                                      81
                                                                                                                                                  Technologies
                  ©2019 Check Point Software Technologies Ltd.                                                                                                   5
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
COMPLEXITY – BROADER VIEW
                                                                                                                        16 ATTACK VECTORS
                                                                            Business Perimeter    End    Mobile     Web     Data    Cloud   Cloud   Messag-   Branch    Web     IoT     USB     Data-    FTP/   Private   Vector   Vector        Vector
                                                                             Email               Point            Browsing Center    IaaS   SaaS      ing     Office   Server         Storage   base     File    Email      1        2             3
                                                                                                                                                     Apps                                               Share

                                            Firewall
                                            Identity Access Management
2 6 S E C U RI T Y T E C H N O L O GI ES

                                            Remote Access
                                            DDOS
                                            Site to Site IPSec
                                            URLF
                                            App Control
                                            IPS
                                            OWASP
                                            Anti Virus
                                            Anti Bot
                                            File Emulation & Anti-Exploit
                                            File Extraction
                                            Anti Ransomware
                                            DLP
                                            Doc Security
                                            Phishing
                                                                                                                                                                                     This is a                        Complexity
                                            Account Take Over
                                            Man in the Middle
                                                                                                                                                                                 26 X 16 problem                        Doubles
                                            Password Leak                                                                                                                                                             in 3 years!
                                            Micro Segmentation
                                            SSL & TLS Inspection                                                                                                                      Complexity
                                            Compliance
                                            Application Scan                                                                                                                            = 416!                   (Adding 3 vectors
                                            Disk & Media Encryption                                                                                                                                              and technologies
                                            Forensics
                                           Future 1
                                                                                                                                                                                                                    per year)
                                           Future 2
                                           Future 3                                                                                                                                                                                         66

                                                 ©2019 Check Point Software Technologies Ltd.
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
HOW DO WE PROACTIVELY ADDRESS WHAT’S COMING?
                                                                                                                           16 ATTACK VECTORS
                                                                                                                                                    Messag-                                              FTP/
                                                                            Business            End               Web       Data    Cloud   Cloud     ing     Branch    Web             USB     Data-    File   Private   Vector   Vector       Vector
                                                                             Email Perimeter   Point   Mobile   Browsing   Center    IaaS    SaaS    Apps     Office   Server   IoT   Storage   base    Share    Email      1        2            3

                                            Firewall
                                            Identity Access Management
                                            Remote Access
2 6 S E C U RI T Y T E C H N O L O GI ES

                                            DDOS
                                            Site to Site IPSec
                                            URLF
                                            App Control
                                            IPS
                                            OWASP
                                            Anti Virus
                                                                                                       Network, Cloud,
                                            Anti Bot
                                                                                                                                                                                            Quick Adoption for
                                            File Emulation & Anti-Exploit
                                                                                                           Mobile
                                            File Extraction
                                            Anti Ransomware
                                                                                                                                                                                            Security Innovation
                                            DLP
                                            Doc Security
                                            Phishing
                                            Account Take Over
                                            Man in the Middle
                                            Password Leak
                                            Micro Segmentation
                                            SSL & TLS Inspection
                                            Compliance                                                                                                  Everywhere
                                            Application Scan
                                            Disk & Media Encryption
                                            Forensics
                                           Future 1
                                           Future 2
                                            Future33
                                           Future
                                                                                                                                                                                                                                            7
                                               ©2019 Check Point Software Technologies Ltd.
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
THE TRADITIONAL APPROACH to SECURITY

       Virus                  Anti-Virus

 Malicious Websites          URL Filtering

     Intrusion           Intrusion Prevention

      Botnet                   Anti Bot

High Risk Applications    Application Control

       Cloud                  Cloud security

                                                8
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
…and ends up with puzzle of security technologies

                AppControl

                                           Anti-Virus

                                Data      Proxy
                             Encryption                 9
CHECK POINT INFINITY Mirko Kürten | Strategic Sales and Partnership - Cyber Security Tech Summit Europe
THE TRADITIONAL STRATEGY to SECURITY

           Dual Vendor

           Best of Breed

                                       10
ENTERPRISES ARE ONE STEP BEHIND THE ATTACKER
          PATCHWORK OF POINT SOLUTIONS.
               COMPLEX TO MANAGE
            Looking for yesterday’s signatures
         Detection instead of prevention!

                                                 11
INFINITY ARCHITECTURE

                    [Restricted] for designated teams ​   12
T H E C Y B ER S E C URI TY A R C H ITE CTURE O F T H E F U T URE

 REAL TIME THREAT                           SHARED THREAT                         CONSOLIDATED
   PREVENTION                                INTELLIGENCE                         MANAGEMENT

    Block the most                      Unified threat intelligence              Single Management,
 sophisticated attacks                  and open interfaces block                   Modular Policy
before they infiltrate the               attacks on all platforms              Management & integrated
        network                                                                     threat visibility

          A C R O S S A L L N E T W O R K S , E N D P O I N T, C L O U D S A N D M O B I L E
                                                                                                         13
CLOUD                                                                                        MOBILE
Infrastructure                          Applications                         Shared Threat Intelligence                                 Capsule
                                                                                                                                    W orkSpace/Docs
      Ad vanced Threat Prevention             Z ero-Day Threat Protection

                                                                                                          Ap p Protection                R emote Access
      Ad aptive Security                       S ensitive Data Protection

                                                                                                          Net work Protection            S ecure Business Data
      Aut omation and Orchestration             End -to-end SaaS Security

      Cro ss Environment
      D y namic Policies                       Id entity Protection                                       D evice Protection             Pro tect Docs Everywhere

                                      Mult i & Hybrid Cloud

                               NETWORK                                                                                         ENDPOINT
He adquarters                            Branch
                                                                                                                                     Access/Data Security

     Access Control                             Access Control

                                                                                                           Threat Prevention               Access Control
     D a t a Protection                         Mult i Layered Security

                                                                                                           Ant i-Ransomware                S ecure Media
     Mult i Layered Security                   Ad vanced Threat Prevention

     Ad vanced Threat Prevention               W i- Fi, DSL, PPoE Ready          Consolidated              F o rensics                     S ecure Documents

                                                                                   Security
                                                                                 Management
                                                                                                                                                                    14
A GLIMPSE TO THE
WORLD OF TWO CISOs

                                               15

©2019 Check Point Software Technologies Ltd.
TWO CISOS, TWO COMPANIES

CISO A: Steve                                                 CISO B: Marcus
INVESTMENT COMPANY: 3,500 Employees                           INSURANCE COMPANY: 6,500 Employees

 ©2019 Check Point Software Technologies Ltd.                                                      16
COMPANY A: MULTI-SECURITY VENDORS
                                                                                                                                          16 ATTACK VECTORS
                                                                                              Business Perimeter    End    Mobile     Web     Data    Cloud   Cloud   Messag-   Branch     Web     IoT     USB     Data-    FTP/    Private
                                                                                               Email               Point            Browsing Center    IaaS   SaaS      ing      Office   Server         Storage   base     File     Email
                                                                                                                                                                       Apps                                                Share

                                                              Firewall
                   2 6 S E C U RI T Y T E C H N O L O GI ES   Identity Access Management
                                                              Remote Access
                                                              DDOS
                                                              Site to Site IPSec
                                                              URLF
                                                              App Control
                                                              IPS
                                                              OWASP                                        Complex                                                                         Old Technology
                                                              Anti Virus
                                                              Anti Bot
                                                              File Emulation & Anti-Exploit
                                                                                                        Over 16 Security                                                                  Can’t prevent Gen
Steve                                                         File Extraction
                                                              Anti Ransomware
                                                                                                           Vendors                                                                            5 attacks
                                                              DLP
                                                              Doc Security
                                                              Phishing
                                                              Account Take Over
                                                                                                                                                 Exposed
                                                              Man in the Middle
                                                              Password Leak
                                                                                                                                           Many attack vectors are
                                                              Micro Segmentation
                                                              SSL & TLS Inspection                                                            not protected
                                                              Compliance
                                                              Application Scan
                                                              Disk & Media Encryption
                                                               Forensics

©2019 Check Point Software Technologies Ltd.                                                                                                                                                                                       17
COMPANY B: SECURITY CONSOLIDATION
                                                                                                                                          16 ATTACK VECTORS
                                                                                              Business Perimeter    End    Mobile     Web     Data    Cloud   Cloud   Messag-   Branch     Web     IoT     USB     Data-    FTP/   Private
                                                                                               Email               Point            Browsing Center    IaaS   SaaS      ing      Office   Server         Storage   base     File    Email
                                                                                                                                                                       Apps                                                Share

                                                              Firewall
                   2 6 S E C U RI T Y T E C H N O L O GI ES   Identity Access Management
                                                              Remote Access
                                                              DDOS
                                                              Site to Site IPSec
                                                              URLF
                                                              App Control
                                                              IPS
                                                              OWASP
                                                              Anti Virus
                                                              Anti Bot

Marcus
                                                              File Emulation & Anti-Exploit
                                                              File Extraction
                                                                                                         Simple                                                                            Latest Technology
                                                              Anti Ransomware
                                                              DLP
                                                              Doc Security
                                                                                                        1 Security                                                                           Prevent Gen 5
                                                              Phishing
                                                              Account Take Over
                                                                                                       Architecture                                 Covered                                     attacks
                                                              Man in the Middle
                                                              Password Leak
                                                                                                                                             All attack vectors are
                                                              Micro Segmentation
                                                              SSL & TLS Inspection                                                                 protected
                                                              Compliance
                                                              Application Scan
                                                              Disk & Media Encryption
                                                               Forensics

©2019 Check Point Software Technologies Ltd.                                                                                                                                                                                       18
STEVE VS. MARCUS

                                               Steve        Marcus
 Number of Security Vendors                      16      1 architecture
 Security Coverage                             Partial     Complete
 Solution Cost                                 $$$$           $$
 IT Security Engineers                           28            6
 Shared intelligence                           Weak         Strong

©2019 Check Point Software Technologies Ltd.                              19
INTRODUCING
             TOTAL
             PROTECTION

   ALL INCLUSIVE CONSUMPTION MODEL FOR GEN-V OF CYBER SECURITY   20
Consume all Check Point Infinity Products & Solutions

      Advanced Threat                               Check Point Network                             Endpoint and Mobile          24x7 Premium
     Prevention and Zero                             and Cloud security                               protection for all        support included
        day protection                                  gateways*                                        employees

                                                                                                                             TOTAL PROTECTION

* Appliance budget is calculated as 50% of total annual price. Consumption is done at list price against the budget amount
                                                                                                                                                   21
Infinity Total Protection Pricing model

                                 50%                         5%                    24x7
    Price per user         % of spend towards         % of spend towards      Threat prevention &
       per year            Hardware Purchase           Training, Incident       24X7 Premium
                                                       Response, and PS            Support

                            Simple, Predictive, All Inclusive
             Existing install-base will continue to require separate support and services.
                                                                                                    22
Infinity Key Messaging

           Industry’s only Security Architecture protecting Network,
                           Cloud, Endpoint & Mobile
         Consolidated security management (Gartner’s Gold Standard)
      Security    and single threat repository (ThreatCloud)
                Agile and flexible model, allowing access to all
                                 Agility
                  Check Point Infinity Products & Solutions
                         Simple, fixed and predictable
                           consumption-based model        Simplicity
              Check Point commitment – Industry fastest time to
                     respond to big impact vulnerabilities

                                                                       23
50% REDUCTION in
HUMAN INVESTMENT
with single management platform

20% REDUCTION in
SECURITY SPEND
consolidating on single architecture

Simplicity
PREDICTABLE SPEND
One platform, one business model
                                       24
• Maximum security
   ̶ Fully consolidated cyber security architecture including
     the most advanced threat prevention technologies
• All Inclusive
   ̶ Protecting your network, endpoint, cloud and mobile; and
     including hardware, software, subscription and support
• Simple pricing per user per year
   ̶ Predictive spend

                                                           25
THANK YOU
 Come to our booth Nr. 03
  Mirko Kürten
  mirko@checkpoint.com
  +49 151 42214915

©2019 Check Point Software Technologies Ltd.   [Internal Use] for Check Point employees​   26
You can also read