1 / 28

Visibility & Control – Identity, Application & Content Awareness

Visibility & Control – Identity, Application & Content Awareness. Andrea Bellinzaghi Technical Manager Check Point Italia. Boundaries are disappearing. Work from Anywhere. Share Data. Use Different Devices. Use Internet Tools. Users Have Different Needs. Boundaries are disappearing.

mauve
Download Presentation

Visibility & Control – Identity, Application & Content Awareness

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Visibility & Control – Identity, Application & Content Awareness Andrea Bellinzaghi Technical Manager Check Point Italia

  2. Boundaries are disappearing Work from Anywhere Share Data Use Different Devices Use Internet Tools Users Have Different Needs Boundaries are disappearing

  3. New environment, new challenges Image of IT juggling: • Users • Internal assets (databases, servers) • Mobile devices • Information • Internet apps To secure this new environment, IT needs to do more

  4. More Security…. …with Less: LessResources LessTime

  5. INTRODUCING… 3DSECURITY

  6. Security as a Business Process Policy that supports business needs Policy Security that involves people People Enforcement Easily enforce security policies

  7. Policy Definition Legacy: Now:

  8. Security is about People, not Numbers Security Is about People, not Numbers

  9. IP Based Policy Challenges Access from Anywhere… Users no longer belong to specific networks!

  10. Security following the user ! Granular security user-group and machine per user,

  11. Introducing ..Check Point Identity Awareness Intuitive Management Accurate Security Full Integration

  12. are an integral part of security People

  13. Check Point UserCheck™ Technology Ask Understand usage needs,while enforcing policy Internet Access Policy John Smith, According to the company policy, access to YouTube is intended for work-related use only. This is work related. Reason below: http://www.youtube.com http://www.youtube.com Makes Web control more practical Need to watch product demo Need to watch product demo Asks users to confirm usage in real-time Cancel OK

  14. Granular Control of all Security layers Granular Visibility Mobile Access DLP Application Control & URL filtering SmartEvent User Access IPS Sensitive Data Network Threat Prevention Internet Applications Usage Mobile Access Identity Awareness Internet Applications Usage Internet Applications Usage Internet Applications Usage Internet Applications Usage Sensitive Data

  15. Industry-Leading Next Generation Firewall Check Point the Only Firewall to Pass Latest NSS Next Generation Firewall Test and Earn "Recommend" Rating • Passed 100% of Traditional Firewall Tests • Passed 100% of Application Identification and Control Tests • Passed 100% all firewall policies with direct integration to Active Directory • Passed 100% of Tested Evasions • Low TCO

  16. Industry-Leading IPS Check Point Sets a New Standard in Latest NSS Group IPS Test The Check Point IPSSoftware Blade outperformed nearly every vendor in overall accuracy and blocking: • 97.3% Security Effectiveness • Multi-Gigabit rated throughput of 2.4Gbps • 100% anti-evasion coverage

  17. Need to Control All Aspects of Web Websites Applications Not URL-based Facebook Chat www.hackthissite.org www.fantasyfootball.com Granularity beyond URLs Unified Control Needed !

  18. Check Point Unifies URL Filtering and Application Control Unified Control of All Aspects of Web Security Websites — URL Filtering Unified categories — URLs and applications User/Group Granularity Applications — Application Control

  19. Different Users Have Different Needs IT wants to conserve bandwidth But… Marketing needs to upload a product demo Should be allowed? Blocked? Support User Needs by Engaging End-Users

  20. Check Point UserCheck™ Technology Ask Understand usage needs,while enforcing policy Internet Access Policy John Smith, According to the company policy, access to YouTube is intended for work-related use only. This is work related. Reason below: http://www.youtube.com http://www.youtube.com Makes Web control more practical Need to watch product demo Need to watch product demo Asks users to confirm usage in real-time Cancel OK

  21. Check Point AppWiki World’s largestApplication Classification Library Over 4,500 applications Over 250,000social-network widgets Grouped in over 80 categories (including Web 2.0, IM, P2P, Voice & Video, File Share) appwiki.checkpoint.com

  22. Check Point Offers the Right Solution Unified with Application Control • New and Improved URL Filtering Software Blade Engage users for practical enforcement Cloud-based categorization Granular user-based policies Available on ALL Security Gateways

  23. Check Point Data Loss Prevention Inspect Sensitive data leaving organization in real time Prevent Data loss by involving user Check Point DLP Makes data loss prevention work

  24. Inspect SSL-Encrypted Traffic Across All Software Blades DLP IPS Application Control Antivirus & Anti-Malware URL Filtering

  25. Mobile Access Software Blade Easy Access to Email and Applications

  26. 360º Visibility into All Security Events

  27. Check Point 3D Security Combines Policy, People and Enforcement for Better Security Software Blades Architecture Centralized Management Flexible Deployment

  28. Thank You!

More Related