SlideShare une entreprise Scribd logo
1  sur  30
Télécharger pour lire hors ligne
CHECK POINT CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
2©2018 Check Point Software Technologies Ltd.
*Gartner, 2016
OVER 70% OF ENTERPRISES
ADOPTED CLOUD
APPLICATIONS*
ARE WE SECURE?
3©2017 Check Point Software Technologies Ltd.
SaaS Applications are Hacked
4©2018 Check Point Software Technologies Ltd.
THE CASE OF
KAYE FINANCIALS
$2M Stolen
Kaye moved its
email to the
cloud
Kaye’s customers received
email invoices with fake
bank accounts
Emails were sent by hackers
who took over Kaye’s
accountant email account
Reported on July 2017 to Check Point IRT
©2018 Check Point Software Technologies Ltd. 5
Unauthorized access to an individual
or organization’s SaaS account for
malicious purposes.
Making headlines:
ACCOUNT TAKEOVER
Account takeover becomes common in the cloud:
- Cloud services are externally exposed
- Default SaaS security does not protect against them
6©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd.
Account Takeover
54%
Malware Delivery
35%
Mindless Data
Sharing
11%
Biggest Threat to SaaS Applications:
Account Takeover
Check Point Incident Response Data
Customers=250, Cloud breaches=55%, Check Point Q1-3-2017
7©2018 Check Point Software Technologies Ltd.
A C C OU N T TAKEOVER
MALWARE DELIVERY
ZER O - D AY TH R EATS
IS YOUR FOCUS IN THE RIGHT PLACE?
EXTEN SIVE TH R EAT PR EVEN TION , B LOC K IN G OF A C C OU N T TA K EOVER S
SAAS SECURITY - WHAT’S NEEDED?
8©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 8©2018 Check Point Software Technologies Ltd.
INTRODUCING
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
©2018 Check Point Software Technologies Ltd. 9
CLOUD SERVICE HELPS YOU
ELIMINATE REAL SAAS THREATS
10©2018 Check Point Software Technologies Ltd.
Authentication
CHECK POINT SECURITY STACK
Data Leak
Prevention
Reveal
Shadow IT
Zero-day Threats
Protection
Simplified
Management
Identity
Protection
Award-winning technologies
HOW IT WORKS:
Azure AD
11©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 11©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
ZERO-DAY
THREATS
PROTECTION
DATA
LEAKAGE
PREVENTION
SIMPLIFIED
MANAGEMENT
SHADOW IT
DISCOVERY
COMPREHENSIVE
THREAT
INTELLIGENCE
IDENTITY
PROTECTION
Prevent account
takeovers
12©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
THREAT PROTECTION
ZERO-DAY THREAT PROTECTION
• Prevent malware and zero-day threats from getting to SaaS users
• Block phishing emails for Office365 and Gmail
• Protect file sharing, messaging, and more
©2018 Check Point Software Technologies Ltd.
13©2018 Check Point Software Technologies Ltd.
ADVANCED THREAT PREVENTION
5TH GENERATION OF CYBER SECURITY
Threat Emulation
Blocks zero-day attacks
The only evasion resistant CPU-Level sandbox
Anti-Phishing for Email
Advanced protection of user emails
SANDBLAST SCORED 100% BREACH PREVENTION
Breach Prevention System Test 11/2017
Threat Extraction
Delivers safe files
Proactive prevention through file sanitation
14©2018 Check Point Software Technologies Ltd.
API: New File
Detected
Quarantine
file
THREAT PREVENTION
FOR SAAS APPS
HOW IT WORKS: Hacker
Shares / emails
malicious content
Scan
File
Found
malware
Threat Prevention
15©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
IDENTITY PROTECTION
IDENTITY PROTECTION
©2018 Check Point Software Technologies Ltd.
• ID-Guard technology identifies imposturous access
• Blocks unauthorized users and devices, on mobile and PCs
16©2018 Check Point Software Technologies Ltd.
Attempts to
access with
stolen
credentials
Hacker
Intelligence
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY PROTECTION
Agentless Mode
Identity
Provider
 Policy rules for: device type, OS, IP, location
 Centralized multi-factor authentication
 Machine learning engines validate user
logins and identify bad scenarios:
• Unusual SaaS app activities
• Different locations
• Different devices
 Status check-ups for: rules, permissions,
privileges, etc.
©2018 Check Point Software Technologies Ltd. 17
PREVENTING ACCOUNT TAKEOVER
3. Allow access
WITHOUT disturbing user workflow
1. Pair user to device
USERS: Continue to use username and password
HACKERS: Can’t break in with stolen credentials
2. Verify that user and
device are paired
Authentication interception
19©2018 Check Point Software Technologies Ltd.
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY PROTECTION
Accesses
app
Attempts
to access
with
Stolen
credentials
Hacker
Identifies DeviceEmployee
Identity
Provider
Identity
Provider
Identifies Device
Illegitimate Login
 Only agent-registered devices allowed
to access your SaaS app
 Frictionless UX without 2FA:
• CloudGuard SaaS prevents
phishing attacks and malware
that can bypass traditional 2FA
• If found, SaaS access is blocked
• Hassle free to users
 Visibility into detected threats for
admins and users
20©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
THREAT INTELLIGENCE
©2018 Check Point Software Technologies Ltd.
COMPREHENSIVE THREAT INTELLIGENCE
•Comprehensive security coverage across the enterprise
•Shared threat intelligence across network, cloud, and mobile devices
Translates threat intelligence data into
actionable security protections
Security updates in Real Time
Daily inputs from traffic across 150K
security gateways world wide
23©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SIMPLIFIED MANAGEMENT
SIMPLIFIED MANAGEMENT
•Deploy within minutes, scan instantly for previous threats
•Centralize configuration and monitoring through intuitive web console
©2018 Check Point Software Technologies Ltd.
24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 24©2018 Check Point Software Technologies Ltd.
DEPLOY WITHIN MINUTES
25©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
DATA LEAKAGE PREVENTION
•Block sharing of sensitive data and files
•Over 800 data types identified
CLOUDGUARD SAAS
DATA LEAKAGE PREVENTION
©2018 Check Point Software Technologies Ltd.
Shared
documents
Email Chat
26©2018 Check Point Software Technologies Ltd.
API: New File
Detected
Quarantine
file
DATA LEAKAGE
PREVENTION FOR
SAAS APPS
HOW IT WORKS: Shares sensitive content
Scan
File
Found a
sensitive
financial report
Employee
Data Leak
Prevention
27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SHADOW IT DISCOVERY
©2018 Check Point Software Technologies Ltd.
SHADOW IT DISCOVERY
•Easy discovery of shadow SaaS apps
•Granular, comprehensive shadow IT discovery with Check Point security gateways
28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 28©2018 Check Point Software Technologies Ltd.
COMPLEMENTING, GRANULAR SHADOW IT CONTROL
WITH CHCK POINT SECURITY GATEWAYS
Over 7859 applications and
in-app activities
Highly granular policy with content, user-
awareness and engagement policies
29©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd.
EXECUTIVE REPORTING
WITH CHECK POINT SMARTEVENT
30©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
ZERO-DAY
THREATS
PROTECTION
DATA
LEAKAGE
PREVENTION
SIMPLIFIED
MANAGEMENT
SHADOW IT
DISCOVERY
COMPREHENSIVE
THREAT
INTELLIGENCE
IDENTITY
PROTECTION
Prevent account
takeovers
35©2018 Check Point Software Technologies Ltd.
SAAS ATTACKS
CAN BE PREVENTED
PREVENTS ACCOUNT
TAKEOVER
BLOCKS ZERO-DAY
ADVANCED THREATS
END-TO-END
SAAS SECURITY COVERAGE
36©2018 Check Point Software Technologies Ltd.
THANK YOU

Contenu connexe

Tendances

Tendances (20)

Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10Check Point Infinity powered by R80.10
Check Point Infinity powered by R80.10
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Cyber intro 2017_hebrew
Cyber intro 2017_hebrew Cyber intro 2017_hebrew
Cyber intro 2017_hebrew
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBETENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
 
INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 

Similaire à 2018 06 Presentation Cloudguard SaaS de Checkpoint

End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
Harry Gunns
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
 

Similaire à 2018 06 Presentation Cloudguard SaaS de Checkpoint (20)

End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
Be Aware Webinar – Office 365 Seguro? Sym, Cloud!
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
CheckPoint Software
CheckPoint SoftwareCheckPoint Software
CheckPoint Software
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Kba talk track 2018
Kba talk track 2018Kba talk track 2018
Kba talk track 2018
 
Top Priorities for Cloud Application Security
Top Priorities for Cloud Application SecurityTop Priorities for Cloud Application Security
Top Priorities for Cloud Application Security
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Akamai Intelligent Edge Security
Akamai Intelligent Edge SecurityAkamai Intelligent Edge Security
Akamai Intelligent Edge Security
 
API Security Best Practices and Guidelines
API Security Best Practices and GuidelinesAPI Security Best Practices and Guidelines
API Security Best Practices and Guidelines
 
Digitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředíDigitální transformace: zabezpečení agilních prostředí
Digitální transformace: zabezpečení agilních prostředí
 
AWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at ScaleAWS Security Week: Lacework - Automating Cloud Security at Scale
AWS Security Week: Lacework - Automating Cloud Security at Scale
 
Security as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud AdoptionSecurity as an Accelerator for Cloud Adoption
Security as an Accelerator for Cloud Adoption
 
Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2Augusta gen v presentation adapture v2
Augusta gen v presentation adapture v2
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week Presentation
 
Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9Automate compliance with cloud guard dome9
Automate compliance with cloud guard dome9
 
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
[WSO2 Integration Summit San Francisco 2019] Protecting API Infrastructures —...
 
Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018Pgatss slide deck june 7, 2018
Pgatss slide deck june 7, 2018
 

Plus de e-Xpert Solutions SA

Plus de e-Xpert Solutions SA (20)

Event e-Xpert Solutions et Tufin - 28 mars 2019
Event e-Xpert Solutions et Tufin - 28 mars 2019Event e-Xpert Solutions et Tufin - 28 mars 2019
Event e-Xpert Solutions et Tufin - 28 mars 2019
 
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018 Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
Présentation d'e-Xpert Solutions et F5 Networks - Event Oct 2018
 
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
Mise en place d'un Use Case d'Adaptive Authentication avec F5 APM et Insight ...
 
Présentation de nos MVP - F5 devCentral - Event 09-10-18
Présentation de nos MVP - F5 devCentral - Event 09-10-18Présentation de nos MVP - F5 devCentral - Event 09-10-18
Présentation de nos MVP - F5 devCentral - Event 09-10-18
 
2018-08_Présentation Corporate
2018-08_Présentation Corporate2018-08_Présentation Corporate
2018-08_Présentation Corporate
 
2018 06 nouvelles APIs checkpoint e-Xpert solutions
2018 06 nouvelles APIs checkpoint e-Xpert solutions2018 06 nouvelles APIs checkpoint e-Xpert solutions
2018 06 nouvelles APIs checkpoint e-Xpert solutions
 
2018 06 Demo Checkpoint et Splunk e-Xpert solutions
2018 06 Demo Checkpoint et Splunk e-Xpert solutions2018 06 Demo Checkpoint et Splunk e-Xpert solutions
2018 06 Demo Checkpoint et Splunk e-Xpert solutions
 
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
Fédération d’identité : des concepts Théoriques aux études de cas d’implément...
 
Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014Fédération d'identité, séminaire du 27 novembre 2014
Fédération d'identité, séminaire du 27 novembre 2014
 
Séminaire Evolution de la Mobilité - Subir ou gérer ?
Séminaire Evolution de la Mobilité - Subir ou gérer ?Séminaire Evolution de la Mobilité - Subir ou gérer ?
Séminaire Evolution de la Mobilité - Subir ou gérer ?
 
Le DLP vu sous un angle pragmatique
Le DLP vu sous un angle pragmatiqueLe DLP vu sous un angle pragmatique
Le DLP vu sous un angle pragmatique
 
Plus de mobilité ! Moins de sécurité ?
Plus de mobilité ! Moins de sécurité ?Plus de mobilité ! Moins de sécurité ?
Plus de mobilité ! Moins de sécurité ?
 
DDoS, la nouvelle arme des hackers
DDoS, la nouvelle arme des hackersDDoS, la nouvelle arme des hackers
DDoS, la nouvelle arme des hackers
 
Sandboxing, une nouvelle défense contre les menaces intelligentes
Sandboxing, une nouvelle défense contre les menaces intelligentesSandboxing, une nouvelle défense contre les menaces intelligentes
Sandboxing, une nouvelle défense contre les menaces intelligentes
 
Evolution du paysage sécurité
Evolution du paysage sécuritéEvolution du paysage sécurité
Evolution du paysage sécurité
 
Partie III – APM Application Policy Manager
Partie III – APM Application Policy ManagerPartie III – APM Application Policy Manager
Partie III – APM Application Policy Manager
 
Partie II – ASM Application Security Manager
Partie II – ASM Application Security ManagerPartie II – ASM Application Security Manager
Partie II – ASM Application Security Manager
 
Partie I – Décodage technologie ADN
Partie I – Décodage technologie ADNPartie I – Décodage technologie ADN
Partie I – Décodage technologie ADN
 
Séminaire Web Services
Séminaire Web ServicesSéminaire Web Services
Séminaire Web Services
 
Séminaire Sécurisation de la messagerie
Séminaire Sécurisation de la messagerieSéminaire Sécurisation de la messagerie
Séminaire Sécurisation de la messagerie
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Dernier (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

2018 06 Presentation Cloudguard SaaS de Checkpoint

  • 1. CHECK POINT CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS
  • 2. 2©2018 Check Point Software Technologies Ltd. *Gartner, 2016 OVER 70% OF ENTERPRISES ADOPTED CLOUD APPLICATIONS* ARE WE SECURE?
  • 3. 3©2017 Check Point Software Technologies Ltd. SaaS Applications are Hacked
  • 4. 4©2018 Check Point Software Technologies Ltd. THE CASE OF KAYE FINANCIALS $2M Stolen Kaye moved its email to the cloud Kaye’s customers received email invoices with fake bank accounts Emails were sent by hackers who took over Kaye’s accountant email account Reported on July 2017 to Check Point IRT
  • 5. ©2018 Check Point Software Technologies Ltd. 5 Unauthorized access to an individual or organization’s SaaS account for malicious purposes. Making headlines: ACCOUNT TAKEOVER Account takeover becomes common in the cloud: - Cloud services are externally exposed - Default SaaS security does not protect against them
  • 6. 6©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd. Account Takeover 54% Malware Delivery 35% Mindless Data Sharing 11% Biggest Threat to SaaS Applications: Account Takeover Check Point Incident Response Data Customers=250, Cloud breaches=55%, Check Point Q1-3-2017
  • 7. 7©2018 Check Point Software Technologies Ltd. A C C OU N T TAKEOVER MALWARE DELIVERY ZER O - D AY TH R EATS IS YOUR FOCUS IN THE RIGHT PLACE? EXTEN SIVE TH R EAT PR EVEN TION , B LOC K IN G OF A C C OU N T TA K EOVER S SAAS SECURITY - WHAT’S NEEDED?
  • 8. 8©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 8©2018 Check Point Software Technologies Ltd. INTRODUCING CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS
  • 9. ©2018 Check Point Software Technologies Ltd. 9 CLOUD SERVICE HELPS YOU ELIMINATE REAL SAAS THREATS
  • 10. 10©2018 Check Point Software Technologies Ltd. Authentication CHECK POINT SECURITY STACK Data Leak Prevention Reveal Shadow IT Zero-day Threats Protection Simplified Management Identity Protection Award-winning technologies HOW IT WORKS: Azure AD
  • 11. 11©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 11©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS ZERO-DAY THREATS PROTECTION DATA LEAKAGE PREVENTION SIMPLIFIED MANAGEMENT SHADOW IT DISCOVERY COMPREHENSIVE THREAT INTELLIGENCE IDENTITY PROTECTION Prevent account takeovers
  • 12. 12©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS THREAT PROTECTION ZERO-DAY THREAT PROTECTION • Prevent malware and zero-day threats from getting to SaaS users • Block phishing emails for Office365 and Gmail • Protect file sharing, messaging, and more ©2018 Check Point Software Technologies Ltd.
  • 13. 13©2018 Check Point Software Technologies Ltd. ADVANCED THREAT PREVENTION 5TH GENERATION OF CYBER SECURITY Threat Emulation Blocks zero-day attacks The only evasion resistant CPU-Level sandbox Anti-Phishing for Email Advanced protection of user emails SANDBLAST SCORED 100% BREACH PREVENTION Breach Prevention System Test 11/2017 Threat Extraction Delivers safe files Proactive prevention through file sanitation
  • 14. 14©2018 Check Point Software Technologies Ltd. API: New File Detected Quarantine file THREAT PREVENTION FOR SAAS APPS HOW IT WORKS: Hacker Shares / emails malicious content Scan File Found malware Threat Prevention
  • 15. 15©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS IDENTITY PROTECTION IDENTITY PROTECTION ©2018 Check Point Software Technologies Ltd. • ID-Guard technology identifies imposturous access • Blocks unauthorized users and devices, on mobile and PCs
  • 16. 16©2018 Check Point Software Technologies Ltd. Attempts to access with stolen credentials Hacker Intelligence PREVENT ACCOUNT TAKEOVER WITH CLOUDGUARD SAAS IDENTITY PROTECTION Agentless Mode Identity Provider  Policy rules for: device type, OS, IP, location  Centralized multi-factor authentication  Machine learning engines validate user logins and identify bad scenarios: • Unusual SaaS app activities • Different locations • Different devices  Status check-ups for: rules, permissions, privileges, etc.
  • 17. ©2018 Check Point Software Technologies Ltd. 17 PREVENTING ACCOUNT TAKEOVER 3. Allow access WITHOUT disturbing user workflow 1. Pair user to device USERS: Continue to use username and password HACKERS: Can’t break in with stolen credentials 2. Verify that user and device are paired Authentication interception
  • 18. 19©2018 Check Point Software Technologies Ltd. PREVENT ACCOUNT TAKEOVER WITH CLOUDGUARD SAAS IDENTITY PROTECTION Accesses app Attempts to access with Stolen credentials Hacker Identifies DeviceEmployee Identity Provider Identity Provider Identifies Device Illegitimate Login  Only agent-registered devices allowed to access your SaaS app  Frictionless UX without 2FA: • CloudGuard SaaS prevents phishing attacks and malware that can bypass traditional 2FA • If found, SaaS access is blocked • Hassle free to users  Visibility into detected threats for admins and users
  • 19. 20©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS THREAT INTELLIGENCE ©2018 Check Point Software Technologies Ltd. COMPREHENSIVE THREAT INTELLIGENCE •Comprehensive security coverage across the enterprise •Shared threat intelligence across network, cloud, and mobile devices
  • 20. Translates threat intelligence data into actionable security protections Security updates in Real Time Daily inputs from traffic across 150K security gateways world wide
  • 21. 23©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SIMPLIFIED MANAGEMENT SIMPLIFIED MANAGEMENT •Deploy within minutes, scan instantly for previous threats •Centralize configuration and monitoring through intuitive web console ©2018 Check Point Software Technologies Ltd.
  • 22. 24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 24©2018 Check Point Software Technologies Ltd. DEPLOY WITHIN MINUTES
  • 23. 25©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. DATA LEAKAGE PREVENTION •Block sharing of sensitive data and files •Over 800 data types identified CLOUDGUARD SAAS DATA LEAKAGE PREVENTION ©2018 Check Point Software Technologies Ltd. Shared documents Email Chat
  • 24. 26©2018 Check Point Software Technologies Ltd. API: New File Detected Quarantine file DATA LEAKAGE PREVENTION FOR SAAS APPS HOW IT WORKS: Shares sensitive content Scan File Found a sensitive financial report Employee Data Leak Prevention
  • 25. 27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SHADOW IT DISCOVERY ©2018 Check Point Software Technologies Ltd. SHADOW IT DISCOVERY •Easy discovery of shadow SaaS apps •Granular, comprehensive shadow IT discovery with Check Point security gateways
  • 26. 28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 28©2018 Check Point Software Technologies Ltd. COMPLEMENTING, GRANULAR SHADOW IT CONTROL WITH CHCK POINT SECURITY GATEWAYS Over 7859 applications and in-app activities Highly granular policy with content, user- awareness and engagement policies
  • 27. 29©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd. EXECUTIVE REPORTING WITH CHECK POINT SMARTEVENT
  • 28. 30©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS ZERO-DAY THREATS PROTECTION DATA LEAKAGE PREVENTION SIMPLIFIED MANAGEMENT SHADOW IT DISCOVERY COMPREHENSIVE THREAT INTELLIGENCE IDENTITY PROTECTION Prevent account takeovers
  • 29. 35©2018 Check Point Software Technologies Ltd. SAAS ATTACKS CAN BE PREVENTED PREVENTS ACCOUNT TAKEOVER BLOCKS ZERO-DAY ADVANCED THREATS END-TO-END SAAS SECURITY COVERAGE
  • 30. 36©2018 Check Point Software Technologies Ltd. THANK YOU