1 / 14

Transforming Security – People, Policy and Enforcement

Transforming Security – People, Policy and Enforcement. January 2011 Caroline Ikomi Technical Director. Boundaries are disappearing. Work from A nywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have D ifferent N eeds. Boundaries are disappearing.

dyan
Download Presentation

Transforming Security – People, Policy and Enforcement

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Transforming Security – People, Policy and Enforcement January 2011 Caroline Ikomi Technical Director

  2. Boundaries are disappearing Work from Anywhere Share Data Use Different Devices Use Internet Tools Users Have Different Needs Boundaries are disappearing

  3. New environment, new challenges To secure this new environment, IT needs to do more

  4. More Security…. …with Less: LessResources LessTime

  5. 3D SECURITY Introducing… Policy Enforcement People

  6. Security as a Business Process Policy that supports business needs Policy Security that involves people People Enforcement Easily enforce security policies

  7. Policy Definition Legacy: Now:

  8. are an integral part of security People

  9. Check Point UserCheck Technology Application Usage Alert You are trying to access YouTube. Corporate application use policy limits YouTube access to business use only in order to save bandwidth. Please select and confirm your use-case: Personal ,Business , or Cancel Educate and Engage end-users Educates users on risk and usage policies http://www.youtube.com Makes control more practical

  10. Granular Control of all Security layers Granular Visibility Mobile Access DLP Application Control SmartEvent User Access IPS Sensitive Data Network Threat Prevention Internet Applications Usage Mobile Access Identity Awareness Internet Applications Usage Internet Applications Usage Internet Applications Usage Internet Applications Usage Sensitive Data

  11. Industry-Leading IPS Check Point Sets a New Standard in Latest NSS Group IPS Test The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: • 97.3% Security Effectiveness • Multi-Gigabit rated throughput of 2.4Gbps • 100% anti-evasion coverage

  12. There’s no Control without Visibility

  13. 360º Visibility into All Security Events

  14. Security is about People, not Numbers Security Is about People, not Numbers

More Related