visibility control identity application content awareness n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Visibility & Control – Identity, Application & Content Awareness PowerPoint Presentation
Download Presentation
Visibility & Control – Identity, Application & Content Awareness

Loading in 2 Seconds...

play fullscreen
1 / 28

Visibility & Control – Identity, Application & Content Awareness - PowerPoint PPT Presentation


  • 101 Views
  • Uploaded on

Visibility & Control – Identity, Application & Content Awareness. Andrea Bellinzaghi Technical Manager Check Point Italia. Boundaries are disappearing. Work from Anywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have Different Needs. Boundaries are disappearing.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

Visibility & Control – Identity, Application & Content Awareness


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
    Presentation Transcript
    1. Visibility & Control – Identity, Application & Content Awareness Andrea Bellinzaghi Technical Manager Check Point Italia

    2. Boundaries are disappearing Work from Anywhere Share Data Use Different Devices Use Internet Tools Users Have Different Needs Boundaries are disappearing

    3. New environment, new challenges Image of IT juggling: • Users • Internal assets (databases, servers) • Mobile devices • Information • Internet apps To secure this new environment, IT needs to do more

    4. More Security…. …with Less: LessResources LessTime

    5. INTRODUCING… 3DSECURITY

    6. Security as a Business Process Policy that supports business needs Policy Security that involves people People Enforcement Easily enforce security policies

    7. Policy Definition Legacy: Now:

    8. Security is about People, not Numbers Security Is about People, not Numbers

    9. IP Based Policy Challenges Access from Anywhere… Users no longer belong to specific networks!

    10. Security following the user ! Granular security user-group and machine per user,

    11. Introducing ..Check Point Identity Awareness Intuitive Management Accurate Security Full Integration

    12. are an integral part of security People

    13. Check Point UserCheck™ Technology Ask Understand usage needs,while enforcing policy Internet Access Policy John Smith, According to the company policy, access to YouTube is intended for work-related use only. This is work related. Reason below: http://www.youtube.com http://www.youtube.com Makes Web control more practical Need to watch product demo Need to watch product demo Asks users to confirm usage in real-time Cancel OK

    14. Granular Control of all Security layers Granular Visibility Mobile Access DLP Application Control & URL filtering SmartEvent User Access IPS Sensitive Data Network Threat Prevention Internet Applications Usage Mobile Access Identity Awareness Internet Applications Usage Internet Applications Usage Internet Applications Usage Internet Applications Usage Sensitive Data

    15. Industry-Leading Next Generation Firewall Check Point the Only Firewall to Pass Latest NSS Next Generation Firewall Test and Earn "Recommend" Rating • Passed 100% of Traditional Firewall Tests • Passed 100% of Application Identification and Control Tests • Passed 100% all firewall policies with direct integration to Active Directory • Passed 100% of Tested Evasions • Low TCO

    16. Industry-Leading IPS Check Point Sets a New Standard in Latest NSS Group IPS Test The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: • 97.3% Security Effectiveness • Multi-Gigabit rated throughput of 2.4Gbps • 100% anti-evasion coverage

    17. Need to Control All Aspects of Web Websites Applications Not URL-based Facebook Chat www.hackthissite.org www.fantasyfootball.com Granularity beyond URLs Unified Control Needed !

    18. Check Point Unifies URL Filtering and Application Control Unified Control of All Aspects of Web Security Websites — URL Filtering Unified categories — URLs and applications User/Group Granularity Applications — Application Control

    19. Different Users Have Different Needs IT wants to conserve bandwidth But… Marketing needs to upload a product demo Should be allowed? Blocked? Support User Needs by Engaging End-Users

    20. Check Point UserCheck™ Technology Ask Understand usage needs,while enforcing policy Internet Access Policy John Smith, According to the company policy, access to YouTube is intended for work-related use only. This is work related. Reason below: http://www.youtube.com http://www.youtube.com Makes Web control more practical Need to watch product demo Need to watch product demo Asks users to confirm usage in real-time Cancel OK

    21. Check Point AppWiki World’s largestApplication Classification Library Over 4,500 applications Over 250,000social-network widgets Grouped in over 80 categories (including Web 2.0, IM, P2P, Voice & Video, File Share) appwiki.checkpoint.com

    22. Check Point Offers the Right Solution Unified with Application Control • New and Improved URL Filtering Software Blade Engage users for practical enforcement Cloud-based categorization Granular user-based policies Available on ALL Security Gateways

    23. Check Point Data Loss Prevention Inspect Sensitive data leaving organization in real time Prevent Data loss by involving user Check Point DLP Makes data loss prevention work

    24. Inspect SSL-Encrypted Traffic Across All Software Blades DLP IPS Application Control Antivirus & Anti-Malware URL Filtering

    25. Mobile Access Software Blade Easy Access to Email and Applications

    26. 360º Visibility into All Security Events

    27. Check Point 3D Security Combines Policy, People and Enforcement for Better Security Software Blades Architecture Centralized Management Flexible Deployment

    28. Thank You!