1 / 18

Mobility – the Security Challenge

Mobility – the Security Challenge. Nov 12th 2008 Peter Lönnqvist Business Manager EndPoint security. The mobile office – Available for everyone. New situation Mobile equipment Uncontrolled networks Communcation in new ways New risk exposure New costs.

parley
Download Presentation

Mobility – the Security Challenge

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Mobility – the Security Challenge Nov 12th 2008 Peter Lönnqvist Business ManagerEndPoint security

  2. The mobile office – Available for everyone • New situation • Mobile equipment • Uncontrolled networks • Communcation in new ways • New risk exposure • New costs http://www.tech-404.com/rss/data_loss.aspx

  3. Business Requirements – A Challange ExecutiveLevel Management level Operational level Laws, EuroSOX PCI, PUL, Competition ....$$$$ Policys, Cobit, PCI, ISO 27000, ITIL, Audits,Consolidation, budget Antivirus...$ Administration...$ Encrytion...$ VPN...$ Mobility...$ WEB...$ FW...$

  4. How do you treat your end users?

  5. Check Point – End Point security

  6. Check Point End Point Security Malware Protection Firewall/NAC Secure Remote Access Full Disk Encryption Media Encryption Unified Management ME FDE Secure Access Market-leading Pointsec® technology • 15 years leadership in firewalls • Based on award-winning ZoneAlarm • 12 years leadership in remote access VPN • Mitigates the broadest range of endpoint risks • Unifies all essential components • Only solution that includes both data security and remote access

  7. EndPoint - ”Secure Access” Personal Firewall AV/AS VPN NAC Program control/ Advisory

  8. How Program Advisor Works Program Client Program Database Check Point Policy Server Database contains information on over 500,000 programs Unknown program attempts access Permissions applied Client asks server about program Server returns policy Program Advisor returns best practices policy Server asks Program Advisor

  9. EndPoint - ”Data security” Full Disk Encryption Port Control Loss of Data Removable media Protection

  10. Endpoint – One part of the infrastructure CoorporateEnforcement https://portal.sslvpn.checkpoint.com/ICS/scanPage

  11. Unified Management Malware Protection Enforce Policy Compliance Secure Remote Access Full Disk Encryption Media Encryption Unified Management Compliance Reports Antivirus Reports Enforcement Settings Antivirus & Anti-spyware Policy Dashboard Connectivity Reports Secure Access FDE ME

  12. Check Points advantage –complete platform

  13. Check Points advantage – Network security

  14. Check Points advantage –Controlling security

  15. Endpoint – One part of the infrastructure PCI Requirements

  16. Why Check Point End Point • Lowered TCO • One client to manage (install, configure, update) • One vendor ( function, error detection, intop-less complexity) • One administrion consol (Education,Competence, Function) • Less impact on the enduser – increased uptime • Technology • Known technology that scales (Zone Alarm, Pointsec etc) • Consolidation is important – Network and ”End Point” • Good total solution – we are quite alone

  17. “Endpoint” Security Bundles 1 1

  18. Summary ENDPOINTOne singlesecurity client MANAGEMENTOne singleconsole GATEWAYOne unifiedproduct line puresecurity totalsecurity from Check Point

More Related