1 / 19

A Changing World

IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies. A Changing World. 2004. Security threats. Worst Year On Record. Internet reliance. 1993. 1996. 2000. 2003. 2004.

reina
Download Presentation

A Changing World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. IDG CIO GovernmentSecuring Information Assets:Architecture, Not Devices!Scott FergusonRegional Director ANZCheck Point Software Technologies

  2. A Changing World 2004 Security threats Worst Year On Record Internet reliance 1993 1996 2000 2003 2004

  3. New Constituents; Web Services; Partner Web Access; WLAN; Remote Employees Security Breach: Network Downtime, Lost Revenue, Regulatory Commitments, Damage to Corporate Reputation New, Dynamic & Blended Security Threats IT Budgets need to stay productivity focused Dedicated Security Resources are Limited 2004’s Top Security Concerns Security: Still A Challenge!

  4. Why is Security such a Big Challenge? • In a connected world everyone is a target • Attacks spread quickly • Multitude of distributed systems to protect (and connect) • Multiple disparate technologies to implement and manage • Exponential ManagementComplexity Web Server

  5. Industry Trends - Enterprises Resource Limitations 5-5.5% of IT budget designated for security Average of 1 full-time security employee/1,000 users Top Security Concerns: Protection of company/ private information Protection against financial losses Need for customer and supplier confidence Concerns around internal network/system security Use of Web services Shareholder confidence Increased Risk • 84% suffer operational or financial losses • Application level attacks highest consequences • Current security system shortcomings • Depth of protection • Management complexity Sources: Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003 Vanson Bourne, The Global IT Security Report, 2003

  6. Australia’s Position • Relaxed culture, plague of set and forget strategies that are not sufficient • Point products permeate • Complexity = complacency • Behind the 8-ball (especially the mid-tier) • Lag behind US, Europe, Asia Pac and NZ in management involvement • Opportunity For Change!

  7. Risks to Your Infrastructure PerimeterSecurity InternalSecurity WebSecurity (Web protection andaccess control) • Worms/viruses • LAN exposure • Access abuse • Unpatched systems • Expanding • perimeter • Sophisticated • attacks • Application-level • attacks • Increased Web • dependence • Secure access • Web server • exposure

  8. Options in Today’s Market PerimeterSecurity InternalSecurity WebSecurity NW Firewall NIDS SSO Multiple Technologies, Inconsistent and Disparate Management Systems SSL VPNs App Firewall HIDS VPN App Specific Portal Authentication Personal FW Web FW

  9. Stateful Inspection/ FireWall-1 VPN-1 SmartDefense OPSEC Next Generation Application Intelligence 2002 2001 2003 2004 EAL 4 EAL 4+ 1993 1997 1998 1999 2000 1994 1995 1996 A History of Innovation Check Point: security is our focus

  10. Architecture – What does it mean? • 1. The art or science of building (Webster) • 2. The way in which anything is physically constructed or designed (Cambridge) • 3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com) • 4. (Vendors) Anything with our brand

  11. Architecture Not Devices Process Policy Publication + Review People Culture + Behaviour + Education Technology Deployment of multiple technologies + Integrate + Single Management + Scale (from the mobile phone PDA and Laptop)

  12. In-depth inspection SMART management Intelligent Security Solutions Worry-free protection Internal Web Perimeter Architecture Not Devices

  13. Architecture Not Devices CP Multiple, Market Leading Technologies Integrated Management & Reporting Trend MicroSurfControlSun Micro Nokia +171 Other product sets CitrixTivoliNortel Interoperability OPSEC

  14. Managing Security with Intelligence Define Policy Enforce Security IntelligentSecurity Lifecycle Analyze & Change Monitor & Report

  15. SMART Management Security Management Life Cycle Your Goal: Lowest Total Cost of Ownership - Automated administrative tasks save time and money - Centralised information database minimises capital expenditures • Define Policy • Easy-to-use Graphical interface • Graphical policy visualization • Enforce Security • Stateful Inspection • Application Intelligence Security Management Life Cycle • Monitor & Report • Real-time monitoring • Instant status of all • security elements • Automatic reports • Analyze & Change • Detailed logging

  16. In-depth inspection SMART management Intelligent Security Solutions Worry-free protection Internal Web Perimeter Architecture Not Devices • Protect investments • Enhance client relationships through IT enablement • Allow you to focus on your business, not on IT • Increase productivity

  17. Moving Forward:Deeper, Broader, Smarter Security Deeper content analysis, multi-layer analysis, application specific Broader deployments gateways, switches, clients, servers desktop, handheld Smarter security management, integrated management tools, event analysis and correlation

  18. Summary • Intelligently Managed Security Process • Perimeter, Internal and Web Security • Broader, Deeper, Smarter Intelligent Security Solutions Security Technology Evolution VPN-1 Internet reliance Security threats FireWall-1 1993 1996 2003 2005 2000

  19. Architecture Not DevicesVisit the Check Point Stand and register for a free evaluation kit

More Related