SlideShare une entreprise Scribd logo
1  sur  39
Check Point
SMB Proposition:
Small Size. Big Security

Ofer Or
April 2013

©2013 Check Point Software Technologies Ltd.
KEY INSIGHTS FROM
CHECK POINT 2013
SECURITY REPORT

©2013 Check Point Software Technologies Ltd.

2
63%

of organizations are infected
with bots

63%

©2013 Check Point Software Technologies Ltd.

3
In

75%

of organizations, a host accesses
a malicious website

75%

Source: Check Point 2013 Security Report
©2013 Check Point Software Technologies Ltd.

4
In

61%

of organizations, a P2P file
sharing application is used

72 % APAC

62 % Americas

55 % EMEA

61%

Source: Check Point 2013 Security Report
©2013 Check Point Software Technologies Ltd.

5
So what does it
mean for SMBs?

©2013 Check Point Software Technologies Ltd.

6
Cyber-Security is important for defense contractors,
and critical infrastructure…Right?

©2013 Check Point Software Technologies Ltd.

7
I’m too small…
Why should hackers attack me…Right?

©2013 Check Point Software Technologies Ltd.

8
My company is OK…we’ve got security! Right?

©2013 Check Point Software Technologies Ltd.

9
77%

of SMBs think their company is
safe from cyber threats

77%

Source: NCSA National Small Business Study 2012
©2013 Check Point Software Technologies Ltd.

10
SMBs don’t think they’re a target for cyber-attacks
Why do you not consider cyber-attacks a
serious threat to your company?
We are too small to be targeted for an attack

47%

We protect our business
Other

50%

7%

Source: SMB Threat Awareness Poll 2012
©2013 Check Point Software Technologies Ltd.

11
So we’re good…
Right?

©2013 Check Point Software Technologies Ltd.

12
Cost of Data Breach (in $M)
$8.93

$5.95
$5.15
$3.25

$3.39

UK

AU

JP

DE

US

Source: 2012 Cost of Cyber Security Study, Ponemon Institute
©2013 Check Point Software Technologies Ltd.

13
67%

of reported data breaches were at
companies with 11-100 employees

“Smaller businesses
are an ideal target for
cyber raids, and cyber
criminals understand
this very well…

”

67%

Source: Verizon Data Breach Investigation Report 2012
©2013 Check Point Software Technologies Ltd.

14
90%

of SMBs do not have a
professional IT Manager

90%

Source: NCSA National Small Business Study 2012
©2013 Check Point Software Technologies Ltd.

15
70%

of SMBs do not provide any Internet
Safety training to employees

70%

Source: NCSA National Small Business Study 2012
©2013 Check Point Software Technologies Ltd.

16
SMBs represent the best ROI for cyber-criminals

Enterprise

Value of
information
(in $)

SMB

Sweet-spot

Consumer

Level of protection

©2013 Check Point Software Technologies Ltd.

17
So what should
SMBs do?

©2013 Check Point Software Technologies Ltd.

18
Essential Security Tools for SMBs

1

Network Firewall
©2013 Check Point Software Technologies Ltd.

19
Essential Security Tools for SMBs

2

Threat Prevention & Anti-Malware Solutions
©2013 Check Point Software Technologies Ltd.

20
Essential Security Tools for SMBs

3

Educate & Involve the End User
©2013 Check Point Software Technologies Ltd.

21
New Check Point 600

C o m i n g S o o n t o T h e a t e r s N e a r Yo u

©2013 Check Point Software Technologies Ltd.

22
Network Firewall

A Firewall is only as good as its Security Configuration
Simple
activation
of security
policy
Easily see
what
security
functions
are in use

©2013 Check Point Software Technologies Ltd.

23
Threat Prevention & Anti-Malware

Threat Prevention setup by non-experts in seconds

Add
exceptions
if needed

Default
policies
based
on best
practices
for easy
setup

©2013 Check Point Software Technologies Ltd.

24
User Education & Involvement

Security needs to educate and engage end-users

www.flickr.com

Educate
users on
risk and
Internet
usage
policies

Make
control
more
practical

©2013 Check Point Software Technologies Ltd.

25
and also featuring…

[Protected] For public distribution

©2013 Check Point Software Technologies Ltd.

26
Secured Guest Wireless Network

©2013 Check Point Software Technologies Ltd.

27
3G Modem Support (USB/ExpressCard)

©2013 Check Point Software Technologies Ltd.

28
…and Cloud-based Management Service

Security Policy
Configuration and updates

©2013 Check Point Software Technologies Ltd.

29
Check Point 600 Appliance

Small Size. BIG Security.

©2013 Check Point Software Technologies Ltd.

30
C O M I N G SOON
SOON
COMING

©2013 Check Point Software Technologies Ltd.

31
Thank you!

©2013 Check Point Software Technologies Ltd.
Introducing

New Check Point 600
©2013 Check Point Software Technologies Ltd.

33
New Check Point 600

©2013 Check Point Software Technologies Ltd.

34
©2013 Check Point Software Technologies Ltd.

35
Easy & Intuitive Local Management
Blade Activation

Policy Configuration

Event Monitoring

©2013 Check Point Software Technologies Ltd.

36
©2013 Check Point Software Technologies Ltd.

37
Network Firewall

A Firewall is only as good as its Security Configuration

©2013 Check Point Software Technologies Ltd.

38
User Education & Involvement

Security needs to educate and engage end-users

www.netflix.com

Educate
users on
risk and
Internet
usage
policies

Make
control
more
practical

©2013 Check Point Software Technologies Ltd.

39

Contenu connexe

Tendances

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10MarketingArrowECS_CZ
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesInfosec
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Management Associates
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problemNathan Burke
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...Kaspersky
 

Tendances (19)

Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Check Point Consolidation
Check Point ConsolidationCheck Point Consolidation
Check Point Consolidation
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 
Solar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenchesSolar winds supply chain breach - Insights from the trenches
Solar winds supply chain breach - Insights from the trenches
 
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
Enterprise Zero Trust Networking Strategies: Secure Remote Access and Network...
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problem
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
A Buyers Guide to Investing in Endpoint Detection and Response for Enterprise...
 

Similaire à Check Point SMB Proposition

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondSecPod Technologies
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursSurfWatch Labs
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Corporation
 
Controle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDCControle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDCThierry TROUIN ☁
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfMetaorange
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxMetaorange
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020TestingXperts
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008ValueMentor Consulting
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Enterprise Management Associates
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data CenterGroup of company MUK
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Avantika University
 

Similaire à Check Point SMB Proposition (20)

How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and BeyondHow BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
 
EMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-SecurityEMA Megatrends in Cyber-Security
EMA Megatrends in Cyber-Security
 
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach OccursHow to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
How to Connect Your Server Room to the Board Room – Before a Data Breach Occurs
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
16231
1623116231
16231
 
Softchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey ResultsSoftchoice Security Consolidation Survey Results
Softchoice Security Consolidation Survey Results
 
Controle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDCControle de configuration ou fuite de donnees, comment mieux securiser SFDC
Controle de configuration ou fuite de donnees, comment mieux securiser SFDC
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdfHow to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pdf
 
How to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptxHow to assess your Cybersecurity Vulnerability_.pptx
How to assess your Cybersecurity Vulnerability_.pptx
 
CPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor LandscapeCPX 2016 Moti Sagey Security Vendor Landscape
CPX 2016 Moti Sagey Security Vendor Landscape
 
Security Testing Trends for 2020
Security Testing Trends for 2020Security Testing Trends for 2020
Security Testing Trends for 2020
 
India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008India Start-ups IT Security & IT Act 2008
India Start-ups IT Security & IT Act 2008
 
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
Managed Detection and Response: Selective Outsourcing for Understaffed SOCs a...
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Check Point: From Branch to Data Center
Check Point: From Branch to Data CenterCheck Point: From Branch to Data Center
Check Point: From Branch to Data Center
 
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
Why is Cyber Security Important - Importance of Cyber Security - Avantika Uni...
 

Plus de Group of company MUK

Plus de Group of company MUK (16)

Взаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical SupportВзаимодействие с Check Point Technical Support
Взаимодействие с Check Point Technical Support
 
Check Point Products RU
Check Point Products RUCheck Point Products RU
Check Point Products RU
 
Check Point Mobile Security
Check Point Mobile SecurityCheck Point Mobile Security
Check Point Mobile Security
 
Check Point Ddos protector
Check Point Ddos protectorCheck Point Ddos protector
Check Point Ddos protector
 
Check Point: Compliance Blade
Check Point: Compliance BladeCheck Point: Compliance Blade
Check Point: Compliance Blade
 
CheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving botCheckPoint: Anatomy of an evolving bot
CheckPoint: Anatomy of an evolving bot
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
Check Point Threat emulation 2013
Check Point Threat emulation 2013Check Point Threat emulation 2013
Check Point Threat emulation 2013
 
Perfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security BlueprintPerfect Foundation for 2013 Security Blueprint
Perfect Foundation for 2013 Security Blueprint
 
Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint Check Point: Defining Your Security blueprint
Check Point: Defining Your Security blueprint
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 
Check Point designing a security
Check Point designing a securityCheck Point designing a security
Check Point designing a security
 
Check Point 2013
Check Point 2013Check Point 2013
Check Point 2013
 
Check Point appliances brochure 2012
Check Point appliances brochure 2012Check Point appliances brochure 2012
Check Point appliances brochure 2012
 
Check Point Report 2013 RU
Check Point Report 2013 RUCheck Point Report 2013 RU
Check Point Report 2013 RU
 
3D Security Report
3D Security Report3D Security Report
3D Security Report
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

Check Point SMB Proposition

  • 1. Check Point SMB Proposition: Small Size. Big Security Ofer Or April 2013 ©2013 Check Point Software Technologies Ltd.
  • 2. KEY INSIGHTS FROM CHECK POINT 2013 SECURITY REPORT ©2013 Check Point Software Technologies Ltd. 2
  • 3. 63% of organizations are infected with bots 63% ©2013 Check Point Software Technologies Ltd. 3
  • 4. In 75% of organizations, a host accesses a malicious website 75% Source: Check Point 2013 Security Report ©2013 Check Point Software Technologies Ltd. 4
  • 5. In 61% of organizations, a P2P file sharing application is used 72 % APAC 62 % Americas 55 % EMEA 61% Source: Check Point 2013 Security Report ©2013 Check Point Software Technologies Ltd. 5
  • 6. So what does it mean for SMBs? ©2013 Check Point Software Technologies Ltd. 6
  • 7. Cyber-Security is important for defense contractors, and critical infrastructure…Right? ©2013 Check Point Software Technologies Ltd. 7
  • 8. I’m too small… Why should hackers attack me…Right? ©2013 Check Point Software Technologies Ltd. 8
  • 9. My company is OK…we’ve got security! Right? ©2013 Check Point Software Technologies Ltd. 9
  • 10. 77% of SMBs think their company is safe from cyber threats 77% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 10
  • 11. SMBs don’t think they’re a target for cyber-attacks Why do you not consider cyber-attacks a serious threat to your company? We are too small to be targeted for an attack 47% We protect our business Other 50% 7% Source: SMB Threat Awareness Poll 2012 ©2013 Check Point Software Technologies Ltd. 11
  • 12. So we’re good… Right? ©2013 Check Point Software Technologies Ltd. 12
  • 13. Cost of Data Breach (in $M) $8.93 $5.95 $5.15 $3.25 $3.39 UK AU JP DE US Source: 2012 Cost of Cyber Security Study, Ponemon Institute ©2013 Check Point Software Technologies Ltd. 13
  • 14. 67% of reported data breaches were at companies with 11-100 employees “Smaller businesses are an ideal target for cyber raids, and cyber criminals understand this very well… ” 67% Source: Verizon Data Breach Investigation Report 2012 ©2013 Check Point Software Technologies Ltd. 14
  • 15. 90% of SMBs do not have a professional IT Manager 90% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 15
  • 16. 70% of SMBs do not provide any Internet Safety training to employees 70% Source: NCSA National Small Business Study 2012 ©2013 Check Point Software Technologies Ltd. 16
  • 17. SMBs represent the best ROI for cyber-criminals Enterprise Value of information (in $) SMB Sweet-spot Consumer Level of protection ©2013 Check Point Software Technologies Ltd. 17
  • 18. So what should SMBs do? ©2013 Check Point Software Technologies Ltd. 18
  • 19. Essential Security Tools for SMBs 1 Network Firewall ©2013 Check Point Software Technologies Ltd. 19
  • 20. Essential Security Tools for SMBs 2 Threat Prevention & Anti-Malware Solutions ©2013 Check Point Software Technologies Ltd. 20
  • 21. Essential Security Tools for SMBs 3 Educate & Involve the End User ©2013 Check Point Software Technologies Ltd. 21
  • 22. New Check Point 600 C o m i n g S o o n t o T h e a t e r s N e a r Yo u ©2013 Check Point Software Technologies Ltd. 22
  • 23. Network Firewall A Firewall is only as good as its Security Configuration Simple activation of security policy Easily see what security functions are in use ©2013 Check Point Software Technologies Ltd. 23
  • 24. Threat Prevention & Anti-Malware Threat Prevention setup by non-experts in seconds Add exceptions if needed Default policies based on best practices for easy setup ©2013 Check Point Software Technologies Ltd. 24
  • 25. User Education & Involvement Security needs to educate and engage end-users www.flickr.com Educate users on risk and Internet usage policies Make control more practical ©2013 Check Point Software Technologies Ltd. 25
  • 26. and also featuring… [Protected] For public distribution ©2013 Check Point Software Technologies Ltd. 26
  • 27. Secured Guest Wireless Network ©2013 Check Point Software Technologies Ltd. 27
  • 28. 3G Modem Support (USB/ExpressCard) ©2013 Check Point Software Technologies Ltd. 28
  • 29. …and Cloud-based Management Service Security Policy Configuration and updates ©2013 Check Point Software Technologies Ltd. 29
  • 30. Check Point 600 Appliance Small Size. BIG Security. ©2013 Check Point Software Technologies Ltd. 30
  • 31. C O M I N G SOON SOON COMING ©2013 Check Point Software Technologies Ltd. 31
  • 32. Thank you! ©2013 Check Point Software Technologies Ltd.
  • 33. Introducing New Check Point 600 ©2013 Check Point Software Technologies Ltd. 33
  • 34. New Check Point 600 ©2013 Check Point Software Technologies Ltd. 34
  • 35. ©2013 Check Point Software Technologies Ltd. 35
  • 36. Easy & Intuitive Local Management Blade Activation Policy Configuration Event Monitoring ©2013 Check Point Software Technologies Ltd. 36
  • 37. ©2013 Check Point Software Technologies Ltd. 37
  • 38. Network Firewall A Firewall is only as good as its Security Configuration ©2013 Check Point Software Technologies Ltd. 38
  • 39. User Education & Involvement Security needs to educate and engage end-users www.netflix.com Educate users on risk and Internet usage policies Make control more practical ©2013 Check Point Software Technologies Ltd. 39

Notes de l'éditeur

  1. http://www.ponemon.org/local/upload/file/2012_US_Cost_of_Cyber_Crime_Study_FINAL6%20.pdfCost == direct, indirect and opportunity costs that resulted from the loss or theft of information, disruption to business operations, revenue loss and destruction of property, plant and equipment. In addition to external consequences of the cyber crime, the analysis attempted to capture the total cost spent on detection, investigation, incident response, containment, recovery and after-the-fact or “ex-post” response.
  2. SMBs are attractive targets for cyber criminals. Cybercriminals are looking for low-hanging fruit. Their targets are companies with poor defenses, a lack of security skills, and vulnerable end users.
  3. http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  4. http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  5. http://www.istockphoto.com/stock-photo-19388409-online-tools.php?st=ee092d5Easily deploy security solution at remote sitesFirewalls are essentially network access control devices that permit and deny different types of traffic on an organization’snetwork.More sophisticated firewalls can apply stricter rules because they have a deeper understanding of the protocols and can inspect traffic for viruses, malware and spam. In any case, a firewall is only as good as its configuration, so an easy-to-use inter face is important
  6. Inspired by: http://www.istockphoto.com/stock-photo-19680099-cloud-computing-services.php?st=eb02dbc