SlideShare une entreprise Scribd logo
1  sur  42
Télécharger pour lire hors ligne
1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd.
Advanced Threat Prevention Security for Public
and Hybrid Clouds
CHECK POINT VSEC: SECURE YOUR AZURE
WORKLOADS
May 4, 2017
2©2017 Check Point Software Technologies Ltd.
Corey Roberts
Director of Cloud Services
Daymark Solutions
Rachel Yehezkel
Technical Evangelist
Microsoft Azure
Krish Subramanian
Product Marketing Manager
Check Point Software Technologies
TODAY’S SPEAKERS
3©2017 Check Point Software Technologies Ltd.
MICROSOFT AZURE OVERVIEW
4©2017 Check Point Software Technologies Ltd.
Openness and flexibility
Data and intelligence
Trust
Application innovation
5©2017 Check Point Software Technologies Ltd.
38Azure regions
NEWLY ANNOUNCED:
France: France Central and France South
Korea: Korea Central and Korea South
DoD East and Central
Achieve global scale, in local regions
Trust
6©2017 Check Point Software Technologies Ltd.
Platform Services
Infrastructure Services
Web
Apps
Mobile
Apps
API
Apps
Notification
Hubs
Hybrid
Cloud
Backup
StorSimple
Azure Site
Recovery
Import/Export
SQL
Database DocumentDB
Redis
Cache
Azure
Search
Storage
Tables
SQL Data
Warehouse
Azure AD
Health Monitoring
AD Privileged
Identity
Management
Operational
Analytics
Cloud
Services
Batch
RemoteApp
Service
Fabric
Visual Studio
Application
Insights
VS Team Services
Domain Services
HDInsight Machine
Learning Stream Analytics
Data
Factory
Event
Hubs
Data Lake
Analytics Service
IoT Hub
Data
Catalog
Security &
Management
Azure Active
Directory
Multi-Factor
Authentication
Automation
Portal
Key Vault
Store/
Marketplace
VM Image Gallery
& VM Depot
Azure AD
B2C
Scheduler
Xamarin
HockeyApp
Power BI
Embedded
SQL Server
Stretch Database
Mobile
Engagement
Functions
Cognitive Services Bot Framework Cortana
Security Center
Container
Service
VM
Scale Sets
Data Lake Store
BizTalk
Services
Service Bus
Logic
Apps
API
Management
Content
Delivery
Network
Media
Services
Media
Analytics
7©2017 Check Point Software Technologies Ltd.
Apps and Data
SaaS
MICROSOFT PROTECTING YOU
Malware Protection Center Cyber Hunting Teams Security Response Center
DeviceInfrastructure
CERTs
PaaS IaaS
Identity
INTELLIGENT SECURITY GRAPH
Cyber Defense
Operations Center
Digital Crimes Unit
Antivirus NetworkIndustry Partners
8©2017 Check Point Software Technologies Ltd.
AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD
SECURITY
Customers protect
their apps and data in
the cloud
Azure takes care of
protecting the cloud
infrastructure
9©2017 Check Point Software Technologies Ltd.
 Create Virtual Networks
with Subnets and Private
IP addresses
 Configure access control
rules, which can be
applied across Virtual
Networks to thousands
of machines in seconds
 Can bring your own DNS
and can domain join
your VMs
VIRTUAL NETWORKS & SECURITY GROUPS
Customer 2
INTERNET
Isolated Virtual
Networks
Customer 1
Subnet 1 Deployment X Deployment Y
VLAN-to-VLAN
Cloud Access
Layer
RDP Endpoint
(password access)
Client
Subnet 2 Subnet 3
DNS Server
VPN
Microsoft Azure
Corp 1
10©2017 Check Point Software Technologies Ltd.
USER DEFINED ROUTING AND VIRTUAL APPLIANCES
11©2017 Check Point Software Technologies Ltd.
AZURE MARKETPLACE
12©2017 Check Point Software Technologies Ltd.
Visibility &
Control
Deploy &
Detect
Set Policy &
Monitor
Understand
Current
State
Deploy
Integrated
Solutions
Respond &
recover faster
Find
threats that
might go
unnoticed
Continue
learning
 Gain visibility and control
 Integrated security, monitoring,
policy management
 Built in threat detections and
alerts
 Works with broad ecosystem of
industry leading 3rd party security
solutions including:
AZURE SECURITY CENTER
13©2017 Check Point Software Technologies Ltd.
HIPAA /
HITECH Act
Moderate
JAB P-ATO
FIPS 140-2
FERPA
DoD DISA
SRG Level 2
ITAR CJIS
GxP
21 CFR Part 11
IRS 1075Section
508 VPAT
ISO 27001 SOC 1
Type 2
ISO 27018 CSA STAR
Self-Assessment
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC
Japan
China
DJCP
New
Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
SP 800-171
China
TRUCS
Spain
ENS
PCI DSS
Level 1
CDSA Shared
Assessments
MPAA
Japan
My
Number
Act
FACT
UK
High
JAB P-ATO
GLBA
DoD DISA
SRG Level 4
MARS-E FFIEC
ISO 27017 SOC 2
Type 2
SOC 3
India
MeitY
Canada
Privacy
Laws
Privacy
Shield
ISO 22301
Germany IT
Grundschutz
workbook
Spain
DPA
CSA STAR
Certification
CSA STAR
Attestation
HITRUST IG Toolkit
UK
Trust
THE MOST TRUSTED AND COMPLIANT CLOUD
GLOBALUSGOVINDUSTRYREGIONAL
14©2017 Check Point Software Technologies Ltd.
UNDERSTANDING CLOUD SECURITY
CHALLENGES
WHY DO WE NEED
ADVANCED SECURITY IN
THE CLOUD?
15©2017 Check Point Software Technologies Ltd.
CLOUD SECURITY REQUIREMENTS
Increasing sophistication of threats & malware
Consistent protections and policy management
Consolidated visibility, logging and reporting
Sacrificing speed and agility for security
Lateral spread of threats
16©2017 Check Point Software Technologies Ltd.
What are your greatest concerns about deploying and managing them?
Loss of control 80%
Data security
Data portability and ownership 73%
Regulatory compliance 62%
Reliability 60%
Source: Morgan Stanley CIO Cloud Survey
SECURITY IS A TOP CONCERN FOR CLOUD
76%
17©2017 Check Point Software Technologies Ltd.
CHALLENGE:
The Cloud is Already Secure, Why Do I Need Additional Security?
Perception:
• Security handled by cloud provider
• Segmentation or isolation = security
Cloud provider secures the cloud infrastructure , not
customer data or apps = SHARED RESPONSIBILITY
Data isolation does not protect against malware or
other threats
18©2017 Check Point Software Technologies Ltd.
AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD
SECURITY
Customers protect
their apps and data in
the cloud
Azure takes care of
protecting the cloud
infrastructure
19©2017 Check Point Software Technologies Ltd.
SOLUTION:
Advanced Security Protects Customer Assets in the Cloud
Advanced security methods in Public Clouds:
• Prevent threats within Public Clouds
• Comprehensive protections to prevent breaches and data loss
• Security Groups with Advanced Threat Prevention:
• Fine-tuned policies and layered protections (Firewall, IPS,
Anti-Virus, AntiBot, and more)
• Segmentation achieved between VNETS using network
firewall and segments and UDR
20©2017 Check Point Software Technologies Ltd.
CHALLENGE:
Network Security Solutions Don’t Fit in Public Cloud Architectures
Perception:
• Environment is too dynamic
• Rapid adding/removing of VMs, subnets etc.
• Network security solutions single point of failure /
don’t support HA configuration / cannot scale
automatically
• Cloud networks are too opaque with no visibility
or control on network traffic
21©2017 Check Point Software Technologies Ltd.
• Operate in HA mode in cloud
• Within VNET(HA-cluster)
• Across availability-set
• Security policies updated automatically
• Auto-discovery of cloud assets (new VM’s ,
subnets, etc) reflected in automated policy
updates
• Deployed in VMs within VNETs
• Single or multiple NICs
• Private or Public IPs
• UDR’s
• Auto-scales to meet elastic demand
• Integrates with built-in Azure Load Balancer
• Triggered based on threshold from App
insights metrics
SOLUTION:
Network Security FITS in Public Cloud
22©2017 Check Point Software Technologies Ltd.
PROTECTING DATA & APPS IN AZURE
INTRODUCING CHECK POINT VSEC
23©2017 Check Point Software Technologies Ltd.
CHECK POINT VSEC FOR MICROSOFT AZURE
Advanced Threat Prevention Security for Hybrid Clouds
vSEC GATEWAY
• Comprehensive protections
including: Firewall, IPS,
AntiBot, AntiVirus, VPN, DLP
and SandBlast Zero-Day
Protections
• Secure traffic between
applications in the hybrid
cloud
vSEC CONTROLLER
• Automated security with
unified management
• Context-aware policies and logs
leveraging Azure defined
objects
• Consolidated logging and
reporting across private, public
and hybrid clouds
24©2017 Check Point Software Technologies Ltd.
QUICKLY ENABLE VSEC ADVANCED SECURITY IN AZURE
MARKETPLACE
Enable a Check Point vSEC
Gateway in the Azure Cloud1. Selected Desired Protection
Levels2.
Flexible Delivery Models: PAYG or BYOL
25©2017 Check Point Software Technologies Ltd.
SECURITY AS DYNAMIC AS THE CLOUD
• Full Support for Auto-scaling, Load
Balancing , Application Insights, multiple
Regions, and Cloud object discovery
• Rapid and Easy Deployment with Single
Click deployment from Azure
Marketplace
• Automated with ARM Templates and
Azure Security Center, Free Trial and Test
Drive
26©2017 Check Point Software Technologies Ltd.
Reference Architecture
• Auto-discovery of Azure defined
objects
• Leverages Azure objects like VPC’s,
Subnets and Instances in security
policies and logs
• Policies updated in real-time
• Improved visibility and forensics
AZURE CLOUD OBJECT DISCOVERY WITH VSEC
27©2017 Check Point Software Technologies Ltd.
TYPICAL DEPLOYMENT SCENARIOS
Public cloud only – Cloud Native with remote access
• Migration of on-premise data and apps to public cloud
Hybrid Cloud – securely connect on-premise with
cloud with site-to-site VPN
• Distributed Architecture ( Web tier in public cloud and
App and DB tiers on-premise )
• DR architecture with secure backup to public cloud
• Legacy applications isolated in the public cloud
• Branch services delivered from the cloud
• Phased migration , cloud bursting, optimal resource
utilization
28©2017 Check Point Software Technologies Ltd.
Reference Architecture
• Check Point vSEC protects assets in
Azure vNET
• Complete Reference Architecture
• Deployment Scenarios and Demo –
YouTube video
• Clustering for HA
• ExpressRoute for Hybrid Cloud
• Autoscaling and vNET peering
CHECK POINT VSEC FOR AZURE HYBRID CLOUDS
29©2017 Check Point Software Technologies Ltd.
Customer Case Study
30©2017 Check Point Software Technologies Ltd.
• Founded in 2001, Daymark is a 50 employee datacenter technology consulting firm
• Certified Microsoft Gold and Check Point Star partner as well as a long time Check
Point and Azure customer
• Daymark Solutions helps customers by architecting and implementing complex
data center infrastructure, cloud and hybrid solutions, and managed services
• Enable customers to securely utilize cloud platforms with confidence
• Assisted customers impacted by security breaches and malware attacks
WHO ARE WE
31©2017 Check Point Software Technologies Ltd.
BUSINESS AND TECHNICAL CHALLENGES
Business Challenges
• Securely migrate critical services to Azure Cloud to speed up
service delivery and reduce data center footprint
• Enable a mobile workforce without compromising security
• Simplify disaster recovery/ business continuity
• Help customers securely migrate workloads to Azure cloud
Technical Challenges
• Lack of visibility into threats and traffic using Azure networking
• Protect cloud data and workloads against cyber threats,
malware and ransomware
• Single pane of Glass, common security policies, centralized logs
32©2017 Check Point Software Technologies Ltd.
WHY CHECK POINT?
Seamless
integration and
management of Azure
Scalability &
Flexibility
to support additional
users
Industry Leader
in Security
33©2017 Check Point Software Technologies Ltd.
THE SOLUTION – CHECK POINT AND AZURE
Capabilities and Technical Benefits
• Robust and Advanced Security
• Secure Remote Access for branch offices
• High availability with redundancy
• Automation and orchestration
• In depth Forensics and reporting
34©2017 Check Point Software Technologies Ltd.
“ Leveraging Check Point vSEC both on premise and
in Microsoft Azure gave us a 100 percent increase in
visibility into the threats that were impacting our
environment. Check Point was able not only to
prevent threats, but also detect and alert us every
time they occurred.”
THE SOLUTION – CHECK POINT VSEC AND AZURE
Corey Roberts,
Director of Technology, Daymark Solutions
35©2017 Check Point Software Technologies Ltd.
DEPLOYMENT ARCHITECTURE AND IMPLEMENTATION
• Check Point vSEC for Azure for advanced security,
perimeter protection, remote access and hybrid
connectivity
• Check Point 5200 Appliances deployed on-premises
• Check Point Smart-1 Security Management
Appliance for security management across the
hybrid cloud and deployed on-premises
• Azure ExpressRoute, Azure LB, High Availability
Regions, Azure vNET, Azure Compute, Built-in
security controls
36©2017 Check Point Software Technologies Ltd.
NETWORK SECURITY DEPLOYED IN AZURE VNET–
HYBRID CLOUD
Customer Data
CenterAvailability Region 1
Availability Region 2
Load
Balancing
Internet and
SaaS apps
Branches /
Mobile Users
Smart
management
Check Point
46xx
Check Point
42xx
Private
Subnet
Public
Subnet
Private
Subnet
Public
Subnet
Enterprise
servers
Azure
37©2017 Check Point Software Technologies Ltd.
SOLUTION RESULTS
• Rapid and easy deployment, provisioning, automation
and orchestration
• Unified management across multiple cloud
environments
• Consolidated view of on-premise and cloud security from
a single pane of glass
• Advanced and scalable security for cloud apps to support
speed and agility
38©2017 Check Point Software Technologies Ltd.
39©2017 Check Point Software Technologies Ltd.
MORE INFORMATION - RESOURCES
• Check Point vSEC for Azure product page and collateral – Joint Solution Brief
• Check Point vSEC for Azure landing page with webinar recording and White Paper
• Cloud Security Shared Responsibility Whitepaper
• vSEC on Azure MarketPlace
• Check Point Reference Architectures /ARM templates for vSEC
• Customer References – case study and video
• Free Trial promotion – Azure credits
• vSEC for Azure Test Drive and User Guide
40©2017 Check Point Software Technologies Ltd.
SUMMARY: WHY CHECK POINT VSEC FOR AZURE CLOUD?
Unified management for public cloud and hybrid cloud environments
Adaptive security with auto-scaling and auto-provisioning
Flexible deployment and extend security to Azure
Advanced threat prevention for Azure applications
41©2017 Check Point Software Technologies Ltd.
• Krish Subramanian – Product Marketing Manager, Check Point - ksubrama@checkpoint.com
• Rachel Yehezkel - Technical Evangelist, Microsoft Azure -rachelye@microsoft.com
• Corey Roberts - Director of Cloud Services - croberts@daymarksi.com
Q
A
42©2017 Check Point Software Technologies Ltd.
THANK YOU

Contenu connexe

Tendances

2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint e-Xpert Solutions SA
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...MarketingArrowECS_CZ
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Moti Sagey מוטי שגיא
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionMarketingArrowECS_CZ
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey מוטי שגיא
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraMarketingArrowECS_CZ
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomwareAlgoSec
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat PreventionMarketingArrowECS_CZ
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021lior mazor
 

Tendances (20)

2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 

Similaire à Check Point vSEC for Microsoft Azure Webinar

(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital SecurityShawn Wells
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Amazon Web Services
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS WorkloadsAmazon Web Services
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for EnterprisesAmazon Web Services
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionTom Laszewski
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use CasesJason Singh
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAmazon Web Services
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Digital Transformation EXPO Event Series
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Jeremy Gray
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformShashi Kiran
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company PresentationRapidScale
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonDigital Catapult
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfErikHof4
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraRogerChaucaZea
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Cisco Canada
 

Similaire à Check Point vSEC for Microsoft Azure Webinar (20)

(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
 

Dernier

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Dernier (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Check Point vSEC for Microsoft Azure Webinar

  • 1. 1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd. Advanced Threat Prevention Security for Public and Hybrid Clouds CHECK POINT VSEC: SECURE YOUR AZURE WORKLOADS May 4, 2017
  • 2. 2©2017 Check Point Software Technologies Ltd. Corey Roberts Director of Cloud Services Daymark Solutions Rachel Yehezkel Technical Evangelist Microsoft Azure Krish Subramanian Product Marketing Manager Check Point Software Technologies TODAY’S SPEAKERS
  • 3. 3©2017 Check Point Software Technologies Ltd. MICROSOFT AZURE OVERVIEW
  • 4. 4©2017 Check Point Software Technologies Ltd. Openness and flexibility Data and intelligence Trust Application innovation
  • 5. 5©2017 Check Point Software Technologies Ltd. 38Azure regions NEWLY ANNOUNCED: France: France Central and France South Korea: Korea Central and Korea South DoD East and Central Achieve global scale, in local regions Trust
  • 6. 6©2017 Check Point Software Technologies Ltd. Platform Services Infrastructure Services Web Apps Mobile Apps API Apps Notification Hubs Hybrid Cloud Backup StorSimple Azure Site Recovery Import/Export SQL Database DocumentDB Redis Cache Azure Search Storage Tables SQL Data Warehouse Azure AD Health Monitoring AD Privileged Identity Management Operational Analytics Cloud Services Batch RemoteApp Service Fabric Visual Studio Application Insights VS Team Services Domain Services HDInsight Machine Learning Stream Analytics Data Factory Event Hubs Data Lake Analytics Service IoT Hub Data Catalog Security & Management Azure Active Directory Multi-Factor Authentication Automation Portal Key Vault Store/ Marketplace VM Image Gallery & VM Depot Azure AD B2C Scheduler Xamarin HockeyApp Power BI Embedded SQL Server Stretch Database Mobile Engagement Functions Cognitive Services Bot Framework Cortana Security Center Container Service VM Scale Sets Data Lake Store BizTalk Services Service Bus Logic Apps API Management Content Delivery Network Media Services Media Analytics
  • 7. 7©2017 Check Point Software Technologies Ltd. Apps and Data SaaS MICROSOFT PROTECTING YOU Malware Protection Center Cyber Hunting Teams Security Response Center DeviceInfrastructure CERTs PaaS IaaS Identity INTELLIGENT SECURITY GRAPH Cyber Defense Operations Center Digital Crimes Unit Antivirus NetworkIndustry Partners
  • 8. 8©2017 Check Point Software Technologies Ltd. AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD SECURITY Customers protect their apps and data in the cloud Azure takes care of protecting the cloud infrastructure
  • 9. 9©2017 Check Point Software Technologies Ltd.  Create Virtual Networks with Subnets and Private IP addresses  Configure access control rules, which can be applied across Virtual Networks to thousands of machines in seconds  Can bring your own DNS and can domain join your VMs VIRTUAL NETWORKS & SECURITY GROUPS Customer 2 INTERNET Isolated Virtual Networks Customer 1 Subnet 1 Deployment X Deployment Y VLAN-to-VLAN Cloud Access Layer RDP Endpoint (password access) Client Subnet 2 Subnet 3 DNS Server VPN Microsoft Azure Corp 1
  • 10. 10©2017 Check Point Software Technologies Ltd. USER DEFINED ROUTING AND VIRTUAL APPLIANCES
  • 11. 11©2017 Check Point Software Technologies Ltd. AZURE MARKETPLACE
  • 12. 12©2017 Check Point Software Technologies Ltd. Visibility & Control Deploy & Detect Set Policy & Monitor Understand Current State Deploy Integrated Solutions Respond & recover faster Find threats that might go unnoticed Continue learning  Gain visibility and control  Integrated security, monitoring, policy management  Built in threat detections and alerts  Works with broad ecosystem of industry leading 3rd party security solutions including: AZURE SECURITY CENTER
  • 13. 13©2017 Check Point Software Technologies Ltd. HIPAA / HITECH Act Moderate JAB P-ATO FIPS 140-2 FERPA DoD DISA SRG Level 2 ITAR CJIS GxP 21 CFR Part 11 IRS 1075Section 508 VPAT ISO 27001 SOC 1 Type 2 ISO 27018 CSA STAR Self-Assessment Singapore MTCS UK G-Cloud Australia IRAP/CCSL FISC Japan China DJCP New Zealand GCIO China GB 18030 EU Model Clauses ENISA IAF Argentina PDPA Japan CS Mark Gold SP 800-171 China TRUCS Spain ENS PCI DSS Level 1 CDSA Shared Assessments MPAA Japan My Number Act FACT UK High JAB P-ATO GLBA DoD DISA SRG Level 4 MARS-E FFIEC ISO 27017 SOC 2 Type 2 SOC 3 India MeitY Canada Privacy Laws Privacy Shield ISO 22301 Germany IT Grundschutz workbook Spain DPA CSA STAR Certification CSA STAR Attestation HITRUST IG Toolkit UK Trust THE MOST TRUSTED AND COMPLIANT CLOUD GLOBALUSGOVINDUSTRYREGIONAL
  • 14. 14©2017 Check Point Software Technologies Ltd. UNDERSTANDING CLOUD SECURITY CHALLENGES WHY DO WE NEED ADVANCED SECURITY IN THE CLOUD?
  • 15. 15©2017 Check Point Software Technologies Ltd. CLOUD SECURITY REQUIREMENTS Increasing sophistication of threats & malware Consistent protections and policy management Consolidated visibility, logging and reporting Sacrificing speed and agility for security Lateral spread of threats
  • 16. 16©2017 Check Point Software Technologies Ltd. What are your greatest concerns about deploying and managing them? Loss of control 80% Data security Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Source: Morgan Stanley CIO Cloud Survey SECURITY IS A TOP CONCERN FOR CLOUD 76%
  • 17. 17©2017 Check Point Software Technologies Ltd. CHALLENGE: The Cloud is Already Secure, Why Do I Need Additional Security? Perception: • Security handled by cloud provider • Segmentation or isolation = security Cloud provider secures the cloud infrastructure , not customer data or apps = SHARED RESPONSIBILITY Data isolation does not protect against malware or other threats
  • 18. 18©2017 Check Point Software Technologies Ltd. AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD SECURITY Customers protect their apps and data in the cloud Azure takes care of protecting the cloud infrastructure
  • 19. 19©2017 Check Point Software Technologies Ltd. SOLUTION: Advanced Security Protects Customer Assets in the Cloud Advanced security methods in Public Clouds: • Prevent threats within Public Clouds • Comprehensive protections to prevent breaches and data loss • Security Groups with Advanced Threat Prevention: • Fine-tuned policies and layered protections (Firewall, IPS, Anti-Virus, AntiBot, and more) • Segmentation achieved between VNETS using network firewall and segments and UDR
  • 20. 20©2017 Check Point Software Technologies Ltd. CHALLENGE: Network Security Solutions Don’t Fit in Public Cloud Architectures Perception: • Environment is too dynamic • Rapid adding/removing of VMs, subnets etc. • Network security solutions single point of failure / don’t support HA configuration / cannot scale automatically • Cloud networks are too opaque with no visibility or control on network traffic
  • 21. 21©2017 Check Point Software Technologies Ltd. • Operate in HA mode in cloud • Within VNET(HA-cluster) • Across availability-set • Security policies updated automatically • Auto-discovery of cloud assets (new VM’s , subnets, etc) reflected in automated policy updates • Deployed in VMs within VNETs • Single or multiple NICs • Private or Public IPs • UDR’s • Auto-scales to meet elastic demand • Integrates with built-in Azure Load Balancer • Triggered based on threshold from App insights metrics SOLUTION: Network Security FITS in Public Cloud
  • 22. 22©2017 Check Point Software Technologies Ltd. PROTECTING DATA & APPS IN AZURE INTRODUCING CHECK POINT VSEC
  • 23. 23©2017 Check Point Software Technologies Ltd. CHECK POINT VSEC FOR MICROSOFT AZURE Advanced Threat Prevention Security for Hybrid Clouds vSEC GATEWAY • Comprehensive protections including: Firewall, IPS, AntiBot, AntiVirus, VPN, DLP and SandBlast Zero-Day Protections • Secure traffic between applications in the hybrid cloud vSEC CONTROLLER • Automated security with unified management • Context-aware policies and logs leveraging Azure defined objects • Consolidated logging and reporting across private, public and hybrid clouds
  • 24. 24©2017 Check Point Software Technologies Ltd. QUICKLY ENABLE VSEC ADVANCED SECURITY IN AZURE MARKETPLACE Enable a Check Point vSEC Gateway in the Azure Cloud1. Selected Desired Protection Levels2. Flexible Delivery Models: PAYG or BYOL
  • 25. 25©2017 Check Point Software Technologies Ltd. SECURITY AS DYNAMIC AS THE CLOUD • Full Support for Auto-scaling, Load Balancing , Application Insights, multiple Regions, and Cloud object discovery • Rapid and Easy Deployment with Single Click deployment from Azure Marketplace • Automated with ARM Templates and Azure Security Center, Free Trial and Test Drive
  • 26. 26©2017 Check Point Software Technologies Ltd. Reference Architecture • Auto-discovery of Azure defined objects • Leverages Azure objects like VPC’s, Subnets and Instances in security policies and logs • Policies updated in real-time • Improved visibility and forensics AZURE CLOUD OBJECT DISCOVERY WITH VSEC
  • 27. 27©2017 Check Point Software Technologies Ltd. TYPICAL DEPLOYMENT SCENARIOS Public cloud only – Cloud Native with remote access • Migration of on-premise data and apps to public cloud Hybrid Cloud – securely connect on-premise with cloud with site-to-site VPN • Distributed Architecture ( Web tier in public cloud and App and DB tiers on-premise ) • DR architecture with secure backup to public cloud • Legacy applications isolated in the public cloud • Branch services delivered from the cloud • Phased migration , cloud bursting, optimal resource utilization
  • 28. 28©2017 Check Point Software Technologies Ltd. Reference Architecture • Check Point vSEC protects assets in Azure vNET • Complete Reference Architecture • Deployment Scenarios and Demo – YouTube video • Clustering for HA • ExpressRoute for Hybrid Cloud • Autoscaling and vNET peering CHECK POINT VSEC FOR AZURE HYBRID CLOUDS
  • 29. 29©2017 Check Point Software Technologies Ltd. Customer Case Study
  • 30. 30©2017 Check Point Software Technologies Ltd. • Founded in 2001, Daymark is a 50 employee datacenter technology consulting firm • Certified Microsoft Gold and Check Point Star partner as well as a long time Check Point and Azure customer • Daymark Solutions helps customers by architecting and implementing complex data center infrastructure, cloud and hybrid solutions, and managed services • Enable customers to securely utilize cloud platforms with confidence • Assisted customers impacted by security breaches and malware attacks WHO ARE WE
  • 31. 31©2017 Check Point Software Technologies Ltd. BUSINESS AND TECHNICAL CHALLENGES Business Challenges • Securely migrate critical services to Azure Cloud to speed up service delivery and reduce data center footprint • Enable a mobile workforce without compromising security • Simplify disaster recovery/ business continuity • Help customers securely migrate workloads to Azure cloud Technical Challenges • Lack of visibility into threats and traffic using Azure networking • Protect cloud data and workloads against cyber threats, malware and ransomware • Single pane of Glass, common security policies, centralized logs
  • 32. 32©2017 Check Point Software Technologies Ltd. WHY CHECK POINT? Seamless integration and management of Azure Scalability & Flexibility to support additional users Industry Leader in Security
  • 33. 33©2017 Check Point Software Technologies Ltd. THE SOLUTION – CHECK POINT AND AZURE Capabilities and Technical Benefits • Robust and Advanced Security • Secure Remote Access for branch offices • High availability with redundancy • Automation and orchestration • In depth Forensics and reporting
  • 34. 34©2017 Check Point Software Technologies Ltd. “ Leveraging Check Point vSEC both on premise and in Microsoft Azure gave us a 100 percent increase in visibility into the threats that were impacting our environment. Check Point was able not only to prevent threats, but also detect and alert us every time they occurred.” THE SOLUTION – CHECK POINT VSEC AND AZURE Corey Roberts, Director of Technology, Daymark Solutions
  • 35. 35©2017 Check Point Software Technologies Ltd. DEPLOYMENT ARCHITECTURE AND IMPLEMENTATION • Check Point vSEC for Azure for advanced security, perimeter protection, remote access and hybrid connectivity • Check Point 5200 Appliances deployed on-premises • Check Point Smart-1 Security Management Appliance for security management across the hybrid cloud and deployed on-premises • Azure ExpressRoute, Azure LB, High Availability Regions, Azure vNET, Azure Compute, Built-in security controls
  • 36. 36©2017 Check Point Software Technologies Ltd. NETWORK SECURITY DEPLOYED IN AZURE VNET– HYBRID CLOUD Customer Data CenterAvailability Region 1 Availability Region 2 Load Balancing Internet and SaaS apps Branches / Mobile Users Smart management Check Point 46xx Check Point 42xx Private Subnet Public Subnet Private Subnet Public Subnet Enterprise servers Azure
  • 37. 37©2017 Check Point Software Technologies Ltd. SOLUTION RESULTS • Rapid and easy deployment, provisioning, automation and orchestration • Unified management across multiple cloud environments • Consolidated view of on-premise and cloud security from a single pane of glass • Advanced and scalable security for cloud apps to support speed and agility
  • 38. 38©2017 Check Point Software Technologies Ltd.
  • 39. 39©2017 Check Point Software Technologies Ltd. MORE INFORMATION - RESOURCES • Check Point vSEC for Azure product page and collateral – Joint Solution Brief • Check Point vSEC for Azure landing page with webinar recording and White Paper • Cloud Security Shared Responsibility Whitepaper • vSEC on Azure MarketPlace • Check Point Reference Architectures /ARM templates for vSEC • Customer References – case study and video • Free Trial promotion – Azure credits • vSEC for Azure Test Drive and User Guide
  • 40. 40©2017 Check Point Software Technologies Ltd. SUMMARY: WHY CHECK POINT VSEC FOR AZURE CLOUD? Unified management for public cloud and hybrid cloud environments Adaptive security with auto-scaling and auto-provisioning Flexible deployment and extend security to Azure Advanced threat prevention for Azure applications
  • 41. 41©2017 Check Point Software Technologies Ltd. • Krish Subramanian – Product Marketing Manager, Check Point - ksubrama@checkpoint.com • Rachel Yehezkel - Technical Evangelist, Microsoft Azure -rachelye@microsoft.com • Corey Roberts - Director of Cloud Services - croberts@daymarksi.com Q A
  • 42. 42©2017 Check Point Software Technologies Ltd. THANK YOU