CYBER SECURITY
FOR 2020
Gil Shwed | Founder and CEO
Check Point Software Technologies
©2020 Check Point Software Technologies Ltd.
©2020 Check Point Software Technologies Ltd. ‹#›
©2020 Check Point Software Technologies Ltd. ‹#›
My Favorite Bangkok Experience
©2020 Check Point Software Technologies Ltd. ‹#›
Living in the Connected World
©2020 Check Point Software Technologies Ltd. ‹#›
CONNECTED
WORLD
5
CONNECT THE WORLD
in a celebration of friendship, respect and excellence
6
EVOLUTION OF HUMANITY THROUGH TECHNOLOGY
ATLANTA 1996 RIO 2016
171 hours of coverage 6,755 hours of coverage
7
My Personal Olympic Evolution
10,000 X
Growth!
9600 bps 1 Gbps
10 Mbps 100 Gbps
8
New York to London 100 Meters
in 3 Sec. in 0.001 Sec.
1994 2020
Check Point FireWall-1 Check Point Maestro
10Mbps 1.5 Tbps
9
Driven by IT, Connecting the world has
gone a long way
10
All these Environments Need to Be Secure
CHECK POINT SECURES IT ALL
11
CHECK POINT SECURING THE OLYMPICS IN THE LAST DECADE
12
CYBER CRIME
BECOMING A GLOBAL THREAT
13
WORLD LEADERS RECOGNIZE:
CYBER SECURITY IS TOP CONCERN
Donald J. Trump Florence Parley
President of the United States French Defense Minister
AN EXISTENTIAL THE CYBER WAR HAS
THREAT BEGUN
Escalating Cyber risks present an France must be ready to fight.
existential threat to economic Cyberspace has become
stability and national security. a place of confrontation.
14
RECENT ATTACKS…
Banking Healthcare Aviation
2000 Beds were at risk. Malicious Cyber Attack
100 Million Accounts
Hospital in “Degraded” forces Airline to cut
Breached in the Cloud
mode flights
Jul. 2019 Nov. 2019 Dec. 2019
15
FIVE PHENOMENONS IN CYBER CRIME
CYBER CRIME BECOMES ORGANIZED
CLOUD SECURITY RISKS EVOLVE
RANSOMWARE ON THE RISE
MOBILE MALWARE INCREASE
NEW ATTACK VECTORS - 5G & IoT
16
NOT PROTECTED AGAINST CURRENT
ATTACK LEVELS
Most Gen 6
?
Enterprises
Why
Gen 5
EVERYTHING
Are
Gen 4 At Gen 3 MULTI VECTOR
Gen 3 PAYLOAD
Nano security
Gen 2 APPLICATIONS
Multi Vector Prevention
Gen 1 NETWORKS Behavioural Analysis
Intrusion prevention (IPS)
VIRUS
The Firewall
The Anti-Virus protection
1990 2000 2010 2015 2018 2020
©2020 Check Point Software Technologies Ltd.
IT’S NOT SIMPLE, IT’S NOT AGILE
Security Engineer DevOps CISO
I need to secure Cloud Security should be I have too many point-
and IoT. automatic. I can’t wait products. We need to
for human approval. consolidate.
©2020 Check Point Software Technologies Ltd. 18
HOW DO I SOLVE Security Level
THE PARADOX
Secure & Manageable
Startup/Point Product
Coverage
Stitched
Products
Native Security
©2020 Check Point Software Technologies Ltd. 19
DEFINING SECURITY PRINCIPLES
01 02 03
REAL-TIME PREVENTION AGILE CONSOLIDATION
Prevention protects your assets. Secure new assets Consolidated security for Cloud,
Detection produces alerts in seconds IoT, Networks, Workloads,
Mobile and Endpoint
©2020 Check Point Software Technologies Ltd. 20
IT’S TIME TO REDEFINE SECURITY
©2020 Check Point Software Technologies Ltd. 21
INTRODUCING INFINITY NEXT
SECURITY THAT POWERS INNOVATION
©2020 Check Point Software Technologies Ltd. 22
INFINITY NEXT
DESIGNED FOR THE MULTI-CLOUD
DIGITAL ERA Adaptive protection for
all workloads & services
IOT & MOBILE DEVICES
Discover and Protect
any connected device
NETWORKS
Any Network, Any Speed
©2020 Check Point Software Technologies Ltd. 23
HOW DO I SOLVE Security Level
THE PARADOX
Secure & Manageable
Startup/Point Product
Coverage
Stitched
Products
Native Security
©2020 Check Point Software Technologies Ltd. 24
CONSOLIDATED SOLUTION
©2020 Check Point Software Technologies Ltd. 25
MEET ROMAN Located in Spain 740 Beds
CISO OF Across 2 campuses
ST. MARTIN HOSPITAL
5,200 employees 1 data center
©2020 Check Point Software Technologies Ltd. 26
Roman: I have so many
types of assets. How
many products do I need
Serverless
Platforms Mobile OSs Endpoints Environments to secure them ?
Cloud Medical Devices
accounts Data Center Campuses (IoT)
Web Mobile PaaS
Containers Apps SaaS Apps
Applications services
©2020 Check Point Software Technologies Ltd. 27
Platforms Mobile OSs Serverless
Endpoints Environments
Cloud Data Centers Branches IoT
19 Vendors
This is a
Nightmare!
Web Mobile PaaS
Containers Apps SaaS Apps
Applications services
©2020 Check Point Software Technologies Ltd. 28
Platforms Mobile OSs Serverless
Endpoints Environments
Cloud Data Centers Branches IoT
19 Vendors
This is a
Nightmare!
Web Mobile PaaS
Containers Apps SaaS Apps
Applications services
©2020 Check Point Software Technologies Ltd. 29
EVER INCREASING COMPLEXITY
Serverless Web Mobile PaaS
Platforms Mobile OSs Endpoints Containers SaaS Apps Cloud Data Centers Branches IoT
Environments Applications Apps services
Firewall ? ? ? ? ? ? ? ?
IPS
? ? ? ? ? ? ? ? ? ?
WAAP
? ? ? ? ? ? ?
A Nightmare of
? ?
50 ?X 60 ? ? ? ?
Anti
Phishing
DDOS ? ?
Combinations ? ?
Dynamic
? ? ? ? ? ? ? ?
Are you ready?
Code
Analysis
SSL
Inspection ? ? ? ? ? ? ? ? ? ? ? ?
DNS
? ? ? ? ? ? ? ? ? ?
DLP ? ? ? ? ? ? ? ?
©2020 Check Point Software Technologies Ltd. 30
COMPLETE SECURITY
31
COMPLETE SECURITY
WE SECURE 50+ TYPES MOBILE
CLOUD
OF ASSETS Android 4.0 & up
iOS 9.0 & up
WORKLOADS
ENDPOINT 7-10 32/64-bit
x10.8- x10.12
UDP IP TCP
NETWORKS IoT
©2020 Check Point Software Technologies Ltd. 32
COMPLETE SECURITY
WITH 60+ DLP
SECURITY SERVICES Threat
Huntress extraction
3Zero Trust Access
Cloud
Native
Access
Mobile
Apps
Security
Micro
Segmentation Firewall
Campaign CPU-level Account Remote URL Application Identity
hunting inspection takeover access filtering Control Awareness
DNA
2
Malware Anti-
ransomware
Context
aware
detection
3
SDN VPN
HIPA
2
Prevent Unknown
Malware Threat Cloud
Zero IaaS LAMBDA
evasion emulation phishing SOC Bot
44
Compliance
resistance
Hardening &
remediation
Linux
Compliance
Compliance
Linux
UEBA
Run-time
security
Linux
Hardening GDPR
1
Anti Domain
1 Prevent Known Prevent Known
Anti URL 1
Phishing Anti-virus reputation
Intrusion Static
Code Container SD-WAN DDoS
2
Spam reputation
55
prevention Zero Trust
Analysis
Prevent Unknown IP Binary
Anti-bot Vulnerability
Hidden
reputation Attacks Vulnerability
3
management scanning
Zero Trust Access Code & API WAAP
One-line
Security
Dynamic
Vulnerability Code
Scanning
API
Analysis
4 Hardening & Compliance Python
Code scan
Terraform
Integration
5 Code & API Security Open
Source
©2020 Check Point Software Technologies Ltd. 33
COMPLETE SECURITY
WITH 60+ DLP
SECURITY SERVICES Threat
Huntress extraction
Cloud
Native
Access
Mobile
Apps
Security
Micro
Segmentation Firewall
Campaign CPU-level Account Remote URL Application Identity
hunting inspection takeover access filtering Control Awareness
Anti- Context
Malware aware SDN VPN
3
DNA ransomware HIPAA
detection
2
Malware Threat Cloud
Zero IaaS LAMBDA
evasion emulation phishing SOC Bot
Compliance Compliance
resistance remediation
4 Linux
UEBA
Linux
Run-time
security
Linux
Hardening GDPR
1
Anti Domain
1 Prevent Known Phishing Anti-virus reputation
Anti URL Intrusion Static
Code Container SD-WAN DDoS
2
Spam reputation prevention
Analysis Zero Trust
Prevent Unknown
Anti-bot
IP
reputation 5 Vulnerability
Hidden Binary
Attacks Vulnerability
3
management scanning
Zero Trust Access One-line Dynamic
Vulnerability WAAP Code
Scanning
API
Analysis
4 Hardening & Compliance Python
Code scan
Terraform
Integration
5 Code & API Security Open
Source
©2020 Check Point Software Technologies Ltd. 34
THE MOST COMPLETE SECURITY
OVER 60 SECURITY PROTECTING 50+
SERVICES TYPES OF ASSESTS
©2020 Check Point Software Technologies Ltd. 35
UNIFIED SECURITY ACROSS ALL ASSETS
Web IoT
Containers Mobile OSs Endpoints Applications Platforms
Mobile Apps PaaS Serverless Cloud accounts
services SaaS Apps Branches Data Centers Environments
©2020 Check Point Software Technologies Ltd. 36
GEN
HOW6 DOES
NANOITSECURITY
WORK ?
37
HOW DO WE DO IT?
NANO AGENT SECURITY
ALWAYS THE LATEST SECURITY
NO UPGRADES
5 GB SOFTWARE EVERYWHERE
LIGHTWEIGHT < 50 MB
©2020 Check Point Software Technologies Ltd. 38
INFINITY NEXT - NANO AGENT ARCHITECTURE
INFINITY CLOUD NANO AGENTS
Security Services Security Delivery
©2020 Check Point Software Technologies Ltd. 39
INFINITY NEXT - THE CLOUD SERVICE
NANO AGENT INFINITY CLOUD
Security Delivery Security Services
Code Analysis
Linux Proxy
Serverless
Runtime Prevention
Web Application & API Protection
©2020 Check Point Software Technologies Ltd. 40
INFINITY NEXT - THE CLOUD SERVICE
INFINITY CLOUD NANO AGENTS
Security Services Security Delivery
Availability ?
Latency ?
Privacy ?
©2020 Check Point Software Technologies Ltd. 41
INFINITY NEXT - THE FOG
YOUR PRIVATE INFINITY CLOUD
INFINITY CLOUD NANO AGENTS
Security Services Security Delivery
Tenant Cloud
©2020 Check Point Software Technologies Ltd. 42
INFINITY NEXT - AGILE AND COMPLETE
INFINITY CLOUD NANO AGENTS
Security Services Security Delivery
IP Network
Container
Linux Proxy
Serverless
IOT
©2020 Check Point Software Technologies Ltd. 43
THE BUSINESS VALUE OF INFINITY NEXT
Dan Roman
Number of Security Vendors 19 4
IT Security Engineers 24 6
Security Level Gen 3+ Gen 6
Annual Cost ~$5.9M ~$2.7M
©2020 Check Point Software Technologies Ltd. 44
TO SUMMARIZE…
45
INFINITY NEXT – THE FUTURE OF CYBER SECURITY
Cloud Data Center
Best Security Prevention
IoT Branch Office Best Service SLA
Easy to deploy. Easy to use
Mobile Endpoint
SECURE YOUR EVERYTHING
©2020 Check Point Software Technologies Ltd. 46
START YOUR JOURNEY TO GEN 6 TODAY!
©2020 Check Point Software Technologies Ltd. 47
SO WE CAN SECURE YOUR TOMORROW
AI-BASED TECHNOLOGY
NANO SENSOR DATA COLLECTION
ROBOT BASED INDUSTRY
PERSONAL & PRIVATE
©2020 Check Point Software Technologies Ltd. 48
CYBER SECURITY FOR 2020
49
THANK YOU
©2020 Check Point Software Technologies Ltd.
©2020 Check Point Software Technologies Ltd. ‹#›
SO WE CAN SECURE YOUR TOMORROW
AI-BASED ONCOLOGY
NANO SENSOR DATA COLLECTION
ROBOT DELIVERED SURGERIES
PERSONALIZED TREATMENT
©2020 Check Point Software Technologies Ltd. 51
CYBER SECURITY FOR 2020
DON’T SETTLE FOR #2
52