0% found this document useful (0 votes)
66 views52 pages

7 - FINAL - CPX Keynote - Infinity 2.0 V15 Jan13 (1) - Final

Uploaded by

antonio hh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
66 views52 pages

7 - FINAL - CPX Keynote - Infinity 2.0 V15 Jan13 (1) - Final

Uploaded by

antonio hh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

CYBER SECURITY

FOR 2020

Gil Shwed | Founder and CEO


Check Point Software Technologies

©2020 Check Point Software Technologies Ltd.


©2020 Check Point Software Technologies Ltd. ‹#›
©2020 Check Point Software Technologies Ltd. ‹#›
My Favorite Bangkok Experience

©2020 Check Point Software Technologies Ltd. ‹#›


Living in the Connected World
©2020 Check Point Software Technologies Ltd. ‹#›
CONNECTED
WORLD

5
CONNECT THE WORLD
in a celebration of friendship, respect and excellence
6
EVOLUTION OF HUMANITY THROUGH TECHNOLOGY

ATLANTA 1996 RIO 2016

171 hours of coverage 6,755 hours of coverage

7
My Personal Olympic Evolution

10,000 X
Growth!
9600 bps 1 Gbps
10 Mbps 100 Gbps

8
New York to London 100 Meters
in 3 Sec. in 0.001 Sec.

1994 2020
Check Point FireWall-1 Check Point Maestro
10Mbps 1.5 Tbps
9
Driven by IT, Connecting the world has
gone a long way

10
All these Environments Need to Be Secure

CHECK POINT SECURES IT ALL

11
CHECK POINT SECURING THE OLYMPICS IN THE LAST DECADE

12
CYBER CRIME
BECOMING A GLOBAL THREAT

13
WORLD LEADERS RECOGNIZE:
CYBER SECURITY IS TOP CONCERN

Donald J. Trump Florence Parley


President of the United States French Defense Minister

AN EXISTENTIAL THE CYBER WAR HAS


THREAT BEGUN
Escalating Cyber risks present an France must be ready to fight.
existential threat to economic Cyberspace has become
stability and national security. a place of confrontation.

14
RECENT ATTACKS…

Banking Healthcare Aviation

2000 Beds were at risk. Malicious Cyber Attack


100 Million Accounts
Hospital in “Degraded” forces Airline to cut
Breached in the Cloud
mode flights
Jul. 2019 Nov. 2019 Dec. 2019

15
FIVE PHENOMENONS IN CYBER CRIME

CYBER CRIME BECOMES ORGANIZED

CLOUD SECURITY RISKS EVOLVE

RANSOMWARE ON THE RISE

MOBILE MALWARE INCREASE

NEW ATTACK VECTORS - 5G & IoT

16
NOT PROTECTED AGAINST CURRENT
ATTACK LEVELS
Most Gen 6

?
Enterprises
Why
Gen 5
EVERYTHING
Are
Gen 4 At Gen 3 MULTI VECTOR

Gen 3 PAYLOAD
Nano security
Gen 2 APPLICATIONS
Multi Vector Prevention
Gen 1 NETWORKS Behavioural Analysis
Intrusion prevention (IPS)
VIRUS
The Firewall
The Anti-Virus protection

1990 2000 2010 2015 2018 2020


©2020 Check Point Software Technologies Ltd.
IT’S NOT SIMPLE, IT’S NOT AGILE

Security Engineer DevOps CISO


I need to secure Cloud Security should be I have too many point-
and IoT. automatic. I can’t wait products. We need to
for human approval. consolidate.

©2020 Check Point Software Technologies Ltd. 18


HOW DO I SOLVE Security Level
THE PARADOX
Secure & Manageable

Startup/Point Product

Coverage
Stitched
Products

Native Security

©2020 Check Point Software Technologies Ltd. 19


DEFINING SECURITY PRINCIPLES

01 02 03

REAL-TIME PREVENTION AGILE CONSOLIDATION


Prevention protects your assets. Secure new assets Consolidated security for Cloud,
Detection produces alerts in seconds IoT, Networks, Workloads,
Mobile and Endpoint

©2020 Check Point Software Technologies Ltd. 20


IT’S TIME TO REDEFINE SECURITY

©2020 Check Point Software Technologies Ltd. 21


INTRODUCING INFINITY NEXT
SECURITY THAT POWERS INNOVATION

©2020 Check Point Software Technologies Ltd. 22


INFINITY NEXT
DESIGNED FOR THE MULTI-CLOUD
DIGITAL ERA Adaptive protection for
all workloads & services

IOT & MOBILE DEVICES


Discover and Protect
any connected device

NETWORKS
Any Network, Any Speed

©2020 Check Point Software Technologies Ltd. 23


HOW DO I SOLVE Security Level
THE PARADOX
Secure & Manageable

Startup/Point Product

Coverage
Stitched
Products

Native Security

©2020 Check Point Software Technologies Ltd. 24


CONSOLIDATED SOLUTION

©2020 Check Point Software Technologies Ltd. 25


MEET ROMAN Located in Spain 740 Beds
CISO OF Across 2 campuses
ST. MARTIN HOSPITAL

5,200 employees 1 data center

©2020 Check Point Software Technologies Ltd. 26


Roman: I have so many
types of assets. How
many products do I need
Serverless
Platforms Mobile OSs Endpoints Environments to secure them ?

Cloud Medical Devices


accounts Data Center Campuses (IoT)

Web Mobile PaaS


Containers Apps SaaS Apps
Applications services

©2020 Check Point Software Technologies Ltd. 27


Platforms Mobile OSs Serverless
Endpoints Environments

Cloud Data Centers Branches IoT


19 Vendors
This is a
Nightmare!
Web Mobile PaaS
Containers Apps SaaS Apps
Applications services

©2020 Check Point Software Technologies Ltd. 28


Platforms Mobile OSs Serverless
Endpoints Environments

Cloud Data Centers Branches IoT


19 Vendors
This is a
Nightmare!
Web Mobile PaaS
Containers Apps SaaS Apps
Applications services

©2020 Check Point Software Technologies Ltd. 29


EVER INCREASING COMPLEXITY
Serverless Web Mobile PaaS
Platforms Mobile OSs Endpoints Containers SaaS Apps Cloud Data Centers Branches IoT
Environments Applications Apps services

Firewall ? ? ? ? ? ? ? ?
IPS
? ? ? ? ? ? ? ? ? ?
WAAP
? ? ? ? ? ? ?
A Nightmare of
? ?
50 ?X 60 ? ? ? ?
Anti
Phishing

DDOS ? ?
Combinations ? ?
Dynamic
? ? ? ? ? ? ? ?
Are you ready?
Code
Analysis

SSL
Inspection ? ? ? ? ? ? ? ? ? ? ? ?
DNS
? ? ? ? ? ? ? ? ? ?
DLP ? ? ? ? ? ? ? ?

©2020 Check Point Software Technologies Ltd. 30


COMPLETE SECURITY

31
COMPLETE SECURITY
WE SECURE 50+ TYPES MOBILE
CLOUD
OF ASSETS Android 4.0 & up

iOS 9.0 & up

WORKLOADS
ENDPOINT 7-10 32/64-bit

x10.8- x10.12

UDP IP TCP

NETWORKS IoT

©2020 Check Point Software Technologies Ltd. 32


COMPLETE SECURITY
WITH 60+ DLP

SECURITY SERVICES Threat


Huntress extraction

3Zero Trust Access


Cloud
Native
Access
Mobile
Apps
Security
Micro
Segmentation Firewall

Campaign CPU-level Account Remote URL Application Identity


hunting inspection takeover access filtering Control Awareness

DNA
2
Malware Anti-
ransomware
Context
aware
detection

3
SDN VPN
HIPA

2
Prevent Unknown
Malware Threat Cloud
Zero IaaS LAMBDA
evasion emulation phishing SOC Bot

44
Compliance
resistance
Hardening &
remediation

Linux
Compliance

Compliance
Linux
UEBA
Run-time
security
Linux
Hardening GDPR

1
Anti Domain

1 Prevent Known Prevent Known


Anti URL 1
Phishing Anti-virus reputation

Intrusion Static
Code Container SD-WAN DDoS

2
Spam reputation

55
prevention Zero Trust
Analysis
Prevent Unknown IP Binary
Anti-bot Vulnerability
Hidden
reputation Attacks Vulnerability

3
management scanning

Zero Trust Access Code & API WAAP


One-line
Security
Dynamic
Vulnerability Code
Scanning
API
Analysis

4 Hardening & Compliance Python


Code scan
Terraform
Integration

5 Code & API Security Open


Source

©2020 Check Point Software Technologies Ltd. 33


COMPLETE SECURITY
WITH 60+ DLP

SECURITY SERVICES Threat


Huntress extraction
Cloud
Native
Access
Mobile
Apps
Security
Micro
Segmentation Firewall

Campaign CPU-level Account Remote URL Application Identity


hunting inspection takeover access filtering Control Awareness

Anti- Context
Malware aware SDN VPN

3
DNA ransomware HIPAA
detection

2
Malware Threat Cloud
Zero IaaS LAMBDA
evasion emulation phishing SOC Bot
Compliance Compliance
resistance remediation

4 Linux
UEBA
Linux
Run-time
security
Linux
Hardening GDPR

1
Anti Domain

1 Prevent Known Phishing Anti-virus reputation

Anti URL Intrusion Static


Code Container SD-WAN DDoS

2
Spam reputation prevention
Analysis Zero Trust
Prevent Unknown
Anti-bot
IP
reputation 5 Vulnerability
Hidden Binary
Attacks Vulnerability

3
management scanning

Zero Trust Access One-line Dynamic


Vulnerability WAAP Code
Scanning
API
Analysis

4 Hardening & Compliance Python


Code scan
Terraform
Integration

5 Code & API Security Open


Source

©2020 Check Point Software Technologies Ltd. 34


THE MOST COMPLETE SECURITY

OVER 60 SECURITY PROTECTING 50+


SERVICES TYPES OF ASSESTS

©2020 Check Point Software Technologies Ltd. 35


UNIFIED SECURITY ACROSS ALL ASSETS

Web IoT
Containers Mobile OSs Endpoints Applications Platforms

Mobile Apps PaaS Serverless Cloud accounts


services SaaS Apps Branches Data Centers Environments

©2020 Check Point Software Technologies Ltd. 36


GEN
HOW6 DOES
NANOITSECURITY
WORK ?

37
HOW DO WE DO IT?
NANO AGENT SECURITY
ALWAYS THE LATEST SECURITY

NO UPGRADES
5 GB SOFTWARE EVERYWHERE
LIGHTWEIGHT < 50 MB
©2020 Check Point Software Technologies Ltd. 38
INFINITY NEXT - NANO AGENT ARCHITECTURE

INFINITY CLOUD NANO AGENTS


Security Services Security Delivery

©2020 Check Point Software Technologies Ltd. 39


INFINITY NEXT - THE CLOUD SERVICE
NANO AGENT INFINITY CLOUD
Security Delivery Security Services
Code Analysis

Linux Proxy

Serverless
Runtime Prevention
Web Application & API Protection
©2020 Check Point Software Technologies Ltd. 40
INFINITY NEXT - THE CLOUD SERVICE

INFINITY CLOUD NANO AGENTS


Security Services Security Delivery

Availability ?
Latency ?
Privacy ?

©2020 Check Point Software Technologies Ltd. 41


INFINITY NEXT - THE FOG
YOUR PRIVATE INFINITY CLOUD
INFINITY CLOUD NANO AGENTS
Security Services Security Delivery

Tenant Cloud

©2020 Check Point Software Technologies Ltd. 42


INFINITY NEXT - AGILE AND COMPLETE
INFINITY CLOUD NANO AGENTS
Security Services Security Delivery

IP Network

Container

Linux Proxy

Serverless

IOT
©2020 Check Point Software Technologies Ltd. 43
THE BUSINESS VALUE OF INFINITY NEXT

Dan Roman

Number of Security Vendors 19 4

IT Security Engineers 24 6

Security Level Gen 3+ Gen 6

Annual Cost ~$5.9M ~$2.7M

©2020 Check Point Software Technologies Ltd. 44


TO SUMMARIZE…

45
INFINITY NEXT – THE FUTURE OF CYBER SECURITY

Cloud Data Center

Best Security Prevention

IoT Branch Office Best Service SLA

Easy to deploy. Easy to use

Mobile Endpoint
SECURE YOUR EVERYTHING

©2020 Check Point Software Technologies Ltd. 46


START YOUR JOURNEY TO GEN 6 TODAY!

©2020 Check Point Software Technologies Ltd. 47


SO WE CAN SECURE YOUR TOMORROW

AI-BASED TECHNOLOGY
NANO SENSOR DATA COLLECTION
ROBOT BASED INDUSTRY
PERSONAL & PRIVATE
©2020 Check Point Software Technologies Ltd. 48
CYBER SECURITY FOR 2020

49
THANK YOU

©2020 Check Point Software Technologies Ltd.


©2020 Check Point Software Technologies Ltd. ‹#›
SO WE CAN SECURE YOUR TOMORROW

AI-BASED ONCOLOGY
NANO SENSOR DATA COLLECTION
ROBOT DELIVERED SURGERIES
PERSONALIZED TREATMENT

©2020 Check Point Software Technologies Ltd. 51


CYBER SECURITY FOR 2020
DON’T SETTLE FOR #2

52

You might also like