Contenu connexe Similaire à 2018 06 Presentation Cloudguard SaaS de Checkpoint (20) Plus de e-Xpert Solutions SA (20) 2018 06 Presentation Cloudguard SaaS de Checkpoint 2. 2©2018 Check Point Software Technologies Ltd.
*Gartner, 2016
OVER 70% OF ENTERPRISES
ADOPTED CLOUD
APPLICATIONS*
ARE WE SECURE?
4. 4©2018 Check Point Software Technologies Ltd.
THE CASE OF
KAYE FINANCIALS
$2M Stolen
Kaye moved its
email to the
cloud
Kaye’s customers received
email invoices with fake
bank accounts
Emails were sent by hackers
who took over Kaye’s
accountant email account
Reported on July 2017 to Check Point IRT
5. ©2018 Check Point Software Technologies Ltd. 5
Unauthorized access to an individual
or organization’s SaaS account for
malicious purposes.
Making headlines:
ACCOUNT TAKEOVER
Account takeover becomes common in the cloud:
- Cloud services are externally exposed
- Default SaaS security does not protect against them
6. 6©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd.
Account Takeover
54%
Malware Delivery
35%
Mindless Data
Sharing
11%
Biggest Threat to SaaS Applications:
Account Takeover
Check Point Incident Response Data
Customers=250, Cloud breaches=55%, Check Point Q1-3-2017
7. 7©2018 Check Point Software Technologies Ltd.
A C C OU N T TAKEOVER
MALWARE DELIVERY
ZER O - D AY TH R EATS
IS YOUR FOCUS IN THE RIGHT PLACE?
EXTEN SIVE TH R EAT PR EVEN TION , B LOC K IN G OF A C C OU N T TA K EOVER S
SAAS SECURITY - WHAT’S NEEDED?
8. 8©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 8©2018 Check Point Software Technologies Ltd.
INTRODUCING
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
9. ©2018 Check Point Software Technologies Ltd. 9
CLOUD SERVICE HELPS YOU
ELIMINATE REAL SAAS THREATS
10. 10©2018 Check Point Software Technologies Ltd.
Authentication
CHECK POINT SECURITY STACK
Data Leak
Prevention
Reveal
Shadow IT
Zero-day Threats
Protection
Simplified
Management
Identity
Protection
Award-winning technologies
HOW IT WORKS:
Azure AD
11. 11©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 11©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
ZERO-DAY
THREATS
PROTECTION
DATA
LEAKAGE
PREVENTION
SIMPLIFIED
MANAGEMENT
SHADOW IT
DISCOVERY
COMPREHENSIVE
THREAT
INTELLIGENCE
IDENTITY
PROTECTION
Prevent account
takeovers
12. 12©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
THREAT PROTECTION
ZERO-DAY THREAT PROTECTION
• Prevent malware and zero-day threats from getting to SaaS users
• Block phishing emails for Office365 and Gmail
• Protect file sharing, messaging, and more
©2018 Check Point Software Technologies Ltd.
13. 13©2018 Check Point Software Technologies Ltd.
ADVANCED THREAT PREVENTION
5TH GENERATION OF CYBER SECURITY
Threat Emulation
Blocks zero-day attacks
The only evasion resistant CPU-Level sandbox
Anti-Phishing for Email
Advanced protection of user emails
SANDBLAST SCORED 100% BREACH PREVENTION
Breach Prevention System Test 11/2017
Threat Extraction
Delivers safe files
Proactive prevention through file sanitation
14. 14©2018 Check Point Software Technologies Ltd.
API: New File
Detected
Quarantine
file
THREAT PREVENTION
FOR SAAS APPS
HOW IT WORKS: Hacker
Shares / emails
malicious content
Scan
File
Found
malware
Threat Prevention
15. 15©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
IDENTITY PROTECTION
IDENTITY PROTECTION
©2018 Check Point Software Technologies Ltd.
• ID-Guard technology identifies imposturous access
• Blocks unauthorized users and devices, on mobile and PCs
16. 16©2018 Check Point Software Technologies Ltd.
Attempts to
access with
stolen
credentials
Hacker
Intelligence
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY PROTECTION
Agentless Mode
Identity
Provider
Policy rules for: device type, OS, IP, location
Centralized multi-factor authentication
Machine learning engines validate user
logins and identify bad scenarios:
• Unusual SaaS app activities
• Different locations
• Different devices
Status check-ups for: rules, permissions,
privileges, etc.
17. ©2018 Check Point Software Technologies Ltd. 17
PREVENTING ACCOUNT TAKEOVER
3. Allow access
WITHOUT disturbing user workflow
1. Pair user to device
USERS: Continue to use username and password
HACKERS: Can’t break in with stolen credentials
2. Verify that user and
device are paired
Authentication interception
18. 19©2018 Check Point Software Technologies Ltd.
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY PROTECTION
Accesses
app
Attempts
to access
with
Stolen
credentials
Hacker
Identifies DeviceEmployee
Identity
Provider
Identity
Provider
Identifies Device
Illegitimate Login
Only agent-registered devices allowed
to access your SaaS app
Frictionless UX without 2FA:
• CloudGuard SaaS prevents
phishing attacks and malware
that can bypass traditional 2FA
• If found, SaaS access is blocked
• Hassle free to users
Visibility into detected threats for
admins and users
19. 20©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
THREAT INTELLIGENCE
©2018 Check Point Software Technologies Ltd.
COMPREHENSIVE THREAT INTELLIGENCE
•Comprehensive security coverage across the enterprise
•Shared threat intelligence across network, cloud, and mobile devices
20. Translates threat intelligence data into
actionable security protections
Security updates in Real Time
Daily inputs from traffic across 150K
security gateways world wide
21. 23©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SIMPLIFIED MANAGEMENT
SIMPLIFIED MANAGEMENT
•Deploy within minutes, scan instantly for previous threats
•Centralize configuration and monitoring through intuitive web console
©2018 Check Point Software Technologies Ltd.
22. 24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 24©2018 Check Point Software Technologies Ltd.
DEPLOY WITHIN MINUTES
23. 25©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
DATA LEAKAGE PREVENTION
•Block sharing of sensitive data and files
•Over 800 data types identified
CLOUDGUARD SAAS
DATA LEAKAGE PREVENTION
©2018 Check Point Software Technologies Ltd.
Shared
documents
Email Chat
24. 26©2018 Check Point Software Technologies Ltd.
API: New File
Detected
Quarantine
file
DATA LEAKAGE
PREVENTION FOR
SAAS APPS
HOW IT WORKS: Shares sensitive content
Scan
File
Found a
sensitive
financial report
Employee
Data Leak
Prevention
25. 27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SHADOW IT DISCOVERY
©2018 Check Point Software Technologies Ltd.
SHADOW IT DISCOVERY
•Easy discovery of shadow SaaS apps
•Granular, comprehensive shadow IT discovery with Check Point security gateways
26. 28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 28©2018 Check Point Software Technologies Ltd.
COMPLEMENTING, GRANULAR SHADOW IT CONTROL
WITH CHCK POINT SECURITY GATEWAYS
Over 7859 applications and
in-app activities
Highly granular policy with content, user-
awareness and engagement policies
27. 29©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd.
EXECUTIVE REPORTING
WITH CHECK POINT SMARTEVENT
28. 30©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
ZERO-DAY
THREATS
PROTECTION
DATA
LEAKAGE
PREVENTION
SIMPLIFIED
MANAGEMENT
SHADOW IT
DISCOVERY
COMPREHENSIVE
THREAT
INTELLIGENCE
IDENTITY
PROTECTION
Prevent account
takeovers
29. 35©2018 Check Point Software Technologies Ltd.
SAAS ATTACKS
CAN BE PREVENTED
PREVENTS ACCOUNT
TAKEOVER
BLOCKS ZERO-DAY
ADVANCED THREATS
END-TO-END
SAAS SECURITY COVERAGE