SlideShare une entreprise Scribd logo
1  sur  30
Security in the cloud:
Check Point security for virtual environments




 Petr Kadrmas <pkadrmas@checkpoint.com>
 SE Eastern Europe

                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone
Agenda



    1    Virtualization and Security

    2    Private Cloud Security

    3    Public Cloud Security

    4    Check Point SMB Cloud




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   2
                                                                                                             2
On Data Center Consolidation


                                    Private cloud1
                              28% have one         30% plan one


                                                                                   CIOs will virtualize
                                                                                    55% of production
                                                                                 servers next year, up
                                                                                  from 42% this year2




1   Information Week, June 2010
2   Morgan Stanley, June 2010

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   3
                                                                                                                                  3
On Cloud Computing

Top concerns with private clouds
What are your greatest concerns about deploying and managing them?


  Loss of control                                                                           80%

  Data security                                                               76%

  Data portability and ownership                                         73%

  Regulatory compliance                               62%

  Reliability                                       60%
                                                                                    Morgan Stanley
                                                                              2010 CIO Cloud Survey

                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   4
                                                                                                                        4
Enterprise Virtualization Initiatives

Top Security Challenges for Server Virtualization
What are the biggest security challenges preventing server virtualization in your
enterprise?


Lack of skills in security team                                                                    36%


Cost of new information security solutions                      28%
                                                                                      Lack of knowledge
Can’t port existing security tools from physical                                      in security teams
                                                              26%
to virtual world                                                                      remains the
                                                                                      biggest challenge
Lack of security best practices for server
virtualization
                                                      24%                             in moving to
                                                                                      virtualized
Regulatory compliance issues                           24%                            environments.

                                                                            Enterprise Strategy Group
                                                               2010 Survey of enterprise decision makers

                                             ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   5
                                                                                                                                  5
Agenda

    1    Virtualization and Security

         Private Cloud Security
            • Secure Dynamic Cloud
    2       • Security Gateway Virtual Edition



    3    Public Cloud Security

    4    Check Point SMB Cloud




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   6
                                                                                                                 6
Private Cloud - Security Needs

                                     Protection from external threats


                                             Inspect traffic between
                                             Virtual Machines (VMs)

                                       Secure new Virtual Machines
                                              automatically




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   7
                                                                                                            7
Private Cloud - Security Needs

                                       Protection from external threats


                                               Inspect traffic between
                                               Virtual Machines (VMs)

                                         Secure new Virtual Machines
                                                automatically
  VM      VM        VM

       Hypervisor




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   8
                                                                                                              8
Private Cloud - Security Needs

                                     Protection from external threats


                                             Inspect traffic between
                                             Virtual Machines (VMs)

                                       Secure new Virtual Machines
                                              automatically

                                         Ensure Security in dynamic
                                               environment




                       ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   |   9
                                                                                                            9
Introducing Check Point
Security Gateway Virtual Edition (VE)


    Check Point Secures the Private Cloud

    Check Point
  Security Gateway
   Virtual Edition                  Best Virtual Security Gateway



                                    Securing the Virtual Machines


                                        Unified Management for
                                         Physical and Virtual



                           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 10
                                                                                                              10
Virtual Edition Features

      Best Security

                                      Check Point
                                  Security Gateway
►   All Software Blades           Virtual Edition (VE)                                Firewall
                                                                                          VPN
►   Flexible Security                                                                        IPS
                                                                                          Antivirus




                                                                   VE          VM               VM

                                                                 Hypervisor Connector

                                                                         Hypervisor




                          ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 11
                                                                                                             11
Virtual Edition Features

      Best Security            VMs Protection
                                                                             VM                           VM


                          ►   Securing New VMs
►   All Software Blades       Automatically

►   Flexible Security     ►   Secure Dynamic
                              Environment



                                                                               VE          VM               VM



                                                                             Hypervisor Connector
       Inspecting Inter-VM Traffic                                                   Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 12
                                                                                                                         12
Virtual Edition Features

      Best Security            VMs Protection


                          ►   Securing New VMs
►   All Software Blades       Automatically

►   Flexible security     ►   Secure Dynamic
                              Environment



                                                                               VE          VM               VM



                                                                             Hypervisor Connector

                                                                                     Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 13
                                                                                                                         13
Virtual Edition Features

      Best Security            VMs Protection                           Unified Management



                          ►   Securing New VMs                         ►   Same management for
►   All Software Blades       Automatically                                Physical and Virtual
►   Flexible security     ►   Secure Dynamic
                              Environment                              ►   Virtualize the Management




                                      ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 14
                                                                                                                         14
Virtual Edition Features

      Best Security            VMs Protection                           Unified Management



                          ►   Securing New VMs                         ►   Same management for
►   All Software Blades       Automatically                                Physical and Virtual
►   Flexible security     ►   Secure Dynamic
                              Environment                              ►   Virtualize the Management




                                                                                          VM              VM



                                                                           Hypervisor Connector

                                                                                     Hypervisor




                                      ©2011 Check Point Software Technologies Ltd.    |   [Unrestricted] For everyone   | 15
                                                                                                                          15
Agenda


    1    Virtualization and Security

    2    Private Cloud Security

         Public Cloud Security
            • Multitenancy Security
    3       • Check Point Solution



    4    Check Point SMB Cloud




                            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 16
                                                                                                               16
Cloud Providers – Security Needs

    Multitenancy: Servicing Multiple Customers
           From the Same Environment


                                                                    Secure
                                                                connection to the
                                                                     Cloud
                 Cloud
                                                                   Security of the
                                                                      Cloud


                                                                   Security within
                                                                     the Cloud



                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 17
                                                                                                            17
Check Point Cloud Security

   Check Point Secures the Public Clouds

              VPN-1 Power VSX for secure connectivity with the
              Public Cloud




              Secured VMs and Inter-VMs connection with
              Security Gateway Virtual Edition



              Multi-tenancy management and customized
              policy via Multi-Domain Management


                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 18
                                                                                                            18
VPN-1 Power VSX
“Making it Virtual”



                 Physical                                    Virtual

        VPN-1 Firewall Module                  Virtual System (VS)


        VPN-1 Firewall Module in               Virtual System in Bridge
        Bridge mode                            mode


        IP Router                              Virtual Router (VR)


        Switch                                 Virtual Switch (V-SW)


        Network Cable                          Virtual Cable (warp link)




                                   ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 19
                                                                                                                      19
How does it work ?

      Each Virtual System is a unique routing and security
      domain featuring most Firewall and VPN-1 Power
      functionality.


      Each Virtual System has its own:
               Security and VPN Policy
               Configuration Parameters
               Interfaces and Links
               Secure Internal Communication Certificate



      Packets arriving to a VSX gateway are routed to the relevant
      firewall based on incoming interface, source or destination
      IP Address


                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 20
                                                                                                                     20
Security Virtualization Benefits
                                         Consolidation
                    Cost reduction
                    The simplest management for consolidated
                     environments



                           Multi- Customers Tenancy
                    Servicing multiple customers on a single system
                    Dedicated management & policy per customer
                    Add-on services per virtual system (IPS, URLF)


                                             Scalability
                    Adding more Virtual Systems without
                     additional hardware
                    Unique offering of linear performance scale-up
                     with additional hardware


                           ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 21
                                                                                                              21
Check Point
Multi-Domain Security Management

      Check Point Eases the Way to Multi-Domain
                Security Management


                        Maximize security by segmenting
                         management in virtual domains


                                Achieve better security
                            with consistent global policies


                        Deploy multi-domain management
                             simply and affordably



                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 22
                                                                                                           22
Get Increased Flexibility and Control
     Segment your Security Management Environment into
                     Virtual Domains

                         Multi Domains




   Customer A    Customer B   Customer C                  Customer D                     Customer E




                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 23
                                                                                                                 23
Agenda


    1    Virtualization and Security

    2    Private Cloud Security

    3    Public Cloud Security

    4    Check Point SMB Cloud




                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 24
                                                                                                            24
Main SMB Security Challenges

           Running Your Business
           While Keeping Up With:

         Growing complexity in protecting your network
         and data


         Evolving and more sophisticated security threats


         Increasing budget pressure and unpredictable
         security expenses

                         ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 25
                                                                                                            25
Check Point Cloud
  Management Services
                                                                 Check Point
                                                              Central Management




                 Firewall    URL Filtering


                 Check Point
                 VPN         Intrusion Prevention (IPS)

                 Antivirus   Logging & Reporting
             Security Management
                 Anti-Spam
                                                                                   Best Ongoing
                                                                                    Protection


  Your                                                                         Expert Management
Business



                                                                                    24x7 Support
                                                                                      Services


           Protecting Your Business, Optimizing
            Performance, Uptime and Flexibility
                                ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 26
                                                                                                                   26
Simple to Start




   1. Determine # of users
   2. Choose connection type                       1. Activate service
   3. Select protection package



                    Set It and Forget It!


                                  ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 27
                                                                                                                     27
Cost-Effective Offerings

      Two All-in-One Packages to Choose From:

            Standard                                            Premium


     Firewall                                   Standard package
     VPN                                                            +
     Software Updates                              Intrusion Prevention (IPS)
     Logging & Reporting                           Antivirus
     Management Services                           Anti-Spam
     24x7 Support Services                         URL Filtering




Starts at $19 /month!                    Starts at $33 /month!

                              ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 28
                                                                                                                 28
Summary

Check Point provides effective Cloud Security
            for every enviromnet

                 Virtual Security Gateway For Multi-Tenant
                            Cloud Environments


                        Best Hypervisor security for Virtual
                                   Machines



                             Cloud Managed Security for SMB




                        ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone   | 29
                                                                                                           29
Thank You




            ©2011 Check Point Software Technologies Ltd.   |   [Unrestricted] For everyone

Contenu connexe

Plus de ASBIS SK

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-uASBIS SK
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachASBIS SK
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.ASBIS SK
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateASBIS SK
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection CompanyASBIS SK
 
VMware world news
VMware world newsVMware world news
VMware world newsASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorASBIS SK
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamASBIS SK
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachASBIS SK
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZASBIS SK
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureASBIS SK
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xASBIS SK
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouASBIS SK
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...ASBIS SK
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...ASBIS SK
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudASBIS SK
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...ASBIS SK
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...ASBIS SK
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudASBIS SK
 

Plus de ASBIS SK (20)

ICT služby ASBIS-u
ICT služby ASBIS-uICT služby ASBIS-u
ICT služby ASBIS-u
 
Dell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediachDell Fluid Data Management vo virtuálnych prostrediach
Dell Fluid Data Management vo virtuálnych prostrediach
 
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
Zimbra: Vytvorte si privátny email cloud za 10 minút. Zadarmo.
 
Evolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 updateEvolúcia, alebo revolúcia? vSphere 5 update
Evolúcia, alebo revolúcia? vSphere 5 update
 
SafeNet - Data Protection Company
SafeNet - Data Protection CompanySafeNet - Data Protection Company
SafeNet - Data Protection Company
 
VMware world news
VMware world newsVMware world news
VMware world news
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
DataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage HypervisorDataCore Software - The one and only Storage Hypervisor
DataCore Software - The one and only Storage Hypervisor
 
Veeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose VeeamVeeam Backup & Replication v6: More great reasons to choose Veeam
Veeam Backup & Replication v6: More great reasons to choose Veeam
 
Deduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediachDeduplikované zálohovanie vo virtualizovaných prostrediach
Deduplikované zálohovanie vo virtualizovaných prostrediach
 
VMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZVMware Enterprise Manager s ICZ
VMware Enterprise Manager s ICZ
 
Cisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience InfrastructureCisco VXI - Virtual eXperience Infrastructure
Cisco VXI - Virtual eXperience Infrastructure
 
IBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System xIBM Cloud Burst postavená na platforme IBM System x
IBM Cloud Burst postavená na platforme IBM System x
 
ATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkouATOS - Siemens IT solutions and Services pod novou značkou
ATOS - Siemens IT solutions and Services pod novou značkou
 
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
HP Storage pre virtuálne systémy (Prehľad riešení na zálohovanie a ukladanie ...
 
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
HP Blade matrix, HP Cloud a HP Virtual systém (prehľad HP virtualizačných rie...
 
Acronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloudAcronis Backup and Recovery 11 - physical, virtual and cloud
Acronis Backup and Recovery 11 - physical, virtual and cloud
 
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
Sada cloudovej infraštruktúry a VMware vSphere 5 - základ pre firemný hybridn...
 
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
Zutom: Uvažujete o cloude? Spoznajte služby poskytovateľa cloudu a tých, ktor...
 
VMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloudVMware: Ekonomický pohľad na cloud
VMware: Ekonomický pohľad na cloud
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Dernier (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Check Point prináša efektívne riešenie bezpečnosti pre súkromné aj verejné cloud prostredie

  • 1. Security in the cloud: Check Point security for virtual environments Petr Kadrmas <pkadrmas@checkpoint.com> SE Eastern Europe ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone
  • 2. Agenda 1 Virtualization and Security 2 Private Cloud Security 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 2 2
  • 3. On Data Center Consolidation Private cloud1 28% have one 30% plan one CIOs will virtualize 55% of production servers next year, up from 42% this year2 1 Information Week, June 2010 2 Morgan Stanley, June 2010 ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 3 3
  • 4. On Cloud Computing Top concerns with private clouds What are your greatest concerns about deploying and managing them? Loss of control 80% Data security 76% Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Morgan Stanley 2010 CIO Cloud Survey ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 4 4
  • 5. Enterprise Virtualization Initiatives Top Security Challenges for Server Virtualization What are the biggest security challenges preventing server virtualization in your enterprise? Lack of skills in security team 36% Cost of new information security solutions 28% Lack of knowledge Can’t port existing security tools from physical in security teams 26% to virtual world remains the biggest challenge Lack of security best practices for server virtualization 24% in moving to virtualized Regulatory compliance issues 24% environments. Enterprise Strategy Group 2010 Survey of enterprise decision makers ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 5 5
  • 6. Agenda 1 Virtualization and Security Private Cloud Security • Secure Dynamic Cloud 2 • Security Gateway Virtual Edition 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 6 6
  • 7. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 7 7
  • 8. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically VM VM VM Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 8 8
  • 9. Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically Ensure Security in dynamic environment ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 9 9
  • 10. Introducing Check Point Security Gateway Virtual Edition (VE) Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 10 10
  • 11. Virtual Edition Features Best Security Check Point Security Gateway ► All Software Blades Virtual Edition (VE) Firewall VPN ► Flexible Security IPS Antivirus VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 11 11
  • 12. Virtual Edition Features Best Security VMs Protection VM VM ► Securing New VMs ► All Software Blades Automatically ► Flexible Security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Inspecting Inter-VM Traffic Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 12 12
  • 13. Virtual Edition Features Best Security VMs Protection ► Securing New VMs ► All Software Blades Automatically ► Flexible security ► Secure Dynamic Environment VE VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 13 13
  • 14. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for ► All Software Blades Automatically Physical and Virtual ► Flexible security ► Secure Dynamic Environment ► Virtualize the Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 14 14
  • 15. Virtual Edition Features Best Security VMs Protection Unified Management ► Securing New VMs ► Same management for ► All Software Blades Automatically Physical and Virtual ► Flexible security ► Secure Dynamic Environment ► Virtualize the Management VM VM Hypervisor Connector Hypervisor ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 15 15
  • 16. Agenda 1 Virtualization and Security 2 Private Cloud Security Public Cloud Security • Multitenancy Security 3 • Check Point Solution 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 16 16
  • 17. Cloud Providers – Security Needs Multitenancy: Servicing Multiple Customers From the Same Environment Secure connection to the Cloud Cloud Security of the Cloud Security within the Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 17 17
  • 18. Check Point Cloud Security Check Point Secures the Public Clouds VPN-1 Power VSX for secure connectivity with the Public Cloud Secured VMs and Inter-VMs connection with Security Gateway Virtual Edition Multi-tenancy management and customized policy via Multi-Domain Management ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 18 18
  • 19. VPN-1 Power VSX “Making it Virtual” Physical Virtual VPN-1 Firewall Module Virtual System (VS) VPN-1 Firewall Module in Virtual System in Bridge Bridge mode mode IP Router Virtual Router (VR) Switch Virtual Switch (V-SW) Network Cable Virtual Cable (warp link) ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 19 19
  • 20. How does it work ? Each Virtual System is a unique routing and security domain featuring most Firewall and VPN-1 Power functionality. Each Virtual System has its own: Security and VPN Policy Configuration Parameters Interfaces and Links Secure Internal Communication Certificate Packets arriving to a VSX gateway are routed to the relevant firewall based on incoming interface, source or destination IP Address ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 20 20
  • 21. Security Virtualization Benefits Consolidation  Cost reduction  The simplest management for consolidated environments Multi- Customers Tenancy  Servicing multiple customers on a single system  Dedicated management & policy per customer  Add-on services per virtual system (IPS, URLF) Scalability  Adding more Virtual Systems without additional hardware  Unique offering of linear performance scale-up with additional hardware ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 21 21
  • 22. Check Point Multi-Domain Security Management Check Point Eases the Way to Multi-Domain Security Management Maximize security by segmenting management in virtual domains Achieve better security with consistent global policies Deploy multi-domain management simply and affordably ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 22 22
  • 23. Get Increased Flexibility and Control Segment your Security Management Environment into Virtual Domains Multi Domains Customer A Customer B Customer C Customer D Customer E ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 23 23
  • 24. Agenda 1 Virtualization and Security 2 Private Cloud Security 3 Public Cloud Security 4 Check Point SMB Cloud ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 24 24
  • 25. Main SMB Security Challenges Running Your Business While Keeping Up With: Growing complexity in protecting your network and data Evolving and more sophisticated security threats Increasing budget pressure and unpredictable security expenses ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 25 25
  • 26. Check Point Cloud Management Services Check Point Central Management Firewall URL Filtering Check Point VPN Intrusion Prevention (IPS) Antivirus Logging & Reporting Security Management Anti-Spam Best Ongoing Protection Your Expert Management Business 24x7 Support Services Protecting Your Business, Optimizing Performance, Uptime and Flexibility ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 26 26
  • 27. Simple to Start 1. Determine # of users 2. Choose connection type 1. Activate service 3. Select protection package Set It and Forget It! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 27 27
  • 28. Cost-Effective Offerings Two All-in-One Packages to Choose From: Standard Premium  Firewall  Standard package  VPN +  Software Updates  Intrusion Prevention (IPS)  Logging & Reporting  Antivirus  Management Services  Anti-Spam  24x7 Support Services  URL Filtering Starts at $19 /month! Starts at $33 /month! ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 28 28
  • 29. Summary Check Point provides effective Cloud Security for every enviromnet Virtual Security Gateway For Multi-Tenant Cloud Environments Best Hypervisor security for Virtual Machines Cloud Managed Security for SMB ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone | 29 29
  • 30. Thank You ©2011 Check Point Software Technologies Ltd. | [Unrestricted] For everyone