Stay One Step Ahead of Cyber Threats - Check Point
1.
Stay One Step Ahead of Cyber Threats
2.
Mobile is overtaking desktop, social is beating search, messaging
apps are challenging email, and everything around us is becoming
connected.
THE ERA OF DIGITAL TRANSFORMATION
14.
THE CYBER THREAT
LANDSCAPE IS EVOLVING
WITH RAPID PACE
more sophisticated
and more advanced
15.
Most security technologies are
PATCHWORK OF POINT SOLUTIONS
COMPLEX SOLUTIONS WITH
UNCERTAIN SECURITY COVERAGE
• Looking for yesterday’s signatures
• Detection instead of prevention
ONE STEP BEHIND
16.
THE Almost, Sort of GREAT DEBATE ?
DETECT PREVENT
27.
Integrated
Threat Management
Efficient,
Automated Operations
Unified
Policy Management
A SINGLE
MANAGEMENT
PLATFORM TO
CONSOLIDATE
ALL YOUR
SECURITY
28.
20%REDUCTION in
consolidating on single architecture
SECURITY SPEND
50%REDUCTION in
HUMAN CAPITAL
With single management platform
29.
Stops exploits of
known vulnerabilities
IPS
Prevents bot damage
from infected devicesAnti-Bot
Blocks download of
known malware infested filesAntivirus
Stops unknown
zero-day malware in filesThreat Emulation
Multi Layer Detection and Threat PreventionKNOWNUNKNOWN
Remove Zero Day malware in Zero
SecondsThreat Extraction
30.
Successful Defense Components
[Restricted] ONLY for designated groups and individuals
Reconnaissance Weaponization Delivery Exploitation Installation
Command &
Control
Act on
Objectives
P r e - C o m p r o m i s e C o m p r o m i s e P o s t - C o m p r o m i s e
DLP
Threat
Intelligence
Firewall Anti-Virus Anti-Bot Anti-BotIPS
Firewall
DLP
Document
Security
Anti-Spam
URL Filtering
Threat
Emulation
Threat
Extraction
Mobile Threat
Prevention
IPS
Threat
Emulation
Endpoint
Security
Endpoint
Security
Forensics
Mobile Threat
Prevention
Document
Security
Firewall
IPS
• Extensive research
• Collaboration with industry leading
services
• Sharing across users community
• Multi-layer architecture
• Evasion-resistant detection
• Best catch rate
• Proactive practical prevention
• Effective containment
• Clear visibility and insight
INTELLIGENCE DETECTION PREVENTION
32.
3 VECTORS OF
Network Attacks OS ExploitsInfected Apps
33.
TURN ON THE
MICROPHONE
TURN ON THE
CAMERA
TRACK DEVICE
LOCATION
CAPTURE
EMAILS
EXTRACT
DATA
STEAL USERNAME
& PASSWORD
34.
MOBILE
SECURITY
BUILDING
BLOCKS
Mobile Device
Management
Policy Enforcement
Secure
Containers
Data Leakage
Prevention
Anti-Virus,
App Reputation
Known Threats
Mobile Threat Prevention
Unknown Threats and Zero Day
People FACE - Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision.
Because there are more and more areas we don’t control, IT environment is more and more shared and open and less and less controlled With IoT, Cloud, Mobile, Software defined….
Because there are more and more threats and hackers we don’t know
Threat landscape is evolving so fast with new threats, new techniques, new actors and new targets.
Impossible to predict with certainty what the next waves of malware will look like.
Biggest challenge for businesses today is how to make the best possible decision for the business, without compromising security; Security is a factor in almost any business decision.
Alternative stat In 2015 almost half of boards participate in the overall security strategy of the company* *PWC The Global State of Information Security® Survey 2016
Situation: The world wants to tell that breaches are inevitable
Situation: breaches keep happening, that’s true, so should you just wait until it’s your turn?
Industry says The only way to catch advanced malware like ransomware or an advanced persistent threat is to investigate after it has breached your business
Board down to Admins – What should we do?
Security technologies are embattled in constantly chasing after these threats to close the gaps. An overabundance of security solutions makes it more complicated and challenging for IT managers to keep up. Organizations need to constantly gain new knowledge and hire talented people to continuously understand what is going on their network.
Not really
One step ahead means a number of things:
Prevention, Not Detection or remediation
Prevention on each part of the kill Chain
One step ahead means a number of things:
Prevention, Not Detection or remediation
Prevention on each part of the kill Chain
Known GOOD instead of Known BAD
Instead of lots of Point solutions
Protect your assets, data and your brand - and to do that in a way that allows the business the freedom to make the choices they need to make to run their business - without compromising security.
Our next generation policies provide a radically different way of approaching policy management. We’ve taken a long hard look at how daily tasks are performed and consolidated and streamlined features to make it as efficient as possible for the security admin to do his work. With R80’s automation capabilities, we are paving the way for automated security provisioning and controls. And when it comes to security visibility - we’ve fully integrated threat management into the main console so security teams can pivot quickly from policy to incidence response and have a holistic view of their security posture in one single place.
Il semblerait que vous ayez déjà ajouté cette diapositive à .
Créer un clipboard
Vous avez clippé votre première diapositive !
En clippant ainsi les diapos qui vous intéressent, vous pourrez les revoir plus tard. Personnalisez le nom d’un clipboard pour mettre de côté vos diapositives.
Créer un clipboard
Partager ce SlideShare
Offre spéciale pour les lecteurs de SlideShare
Juste pour vous: Essai GRATUIT de 60 jours dans la plus grande bibliothèque numérique du monde.
La famille SlideShare vient de s'agrandir. Profitez de l'accès à des millions de livres numériques, livres audio, magazines et bien plus encore sur Scribd.