1 / 30

Endpoint Security Current portfolio and looking forward

Endpoint Security Current portfolio and looking forward. October 2010. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80. Conclusion. Agenda. 1. 2. 3. Background: Current Endpoint Portfolio. Looking Forward: Endpoint Security R80.

lupita
Download Presentation

Endpoint Security Current portfolio and looking forward

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Endpoint SecurityCurrent portfolio and lookingforward October2010

  2. Agenda 1 2 3 Background: Current Endpoint Portfolio LookingForward: Endpoint Security R80 Conclusion

  3. Agenda 1 2 3 Background: Current Endpoint Portfolio LookingForward: Endpoint Security R80 Conclusion

  4. Endpoint Security today • Our current portfolio Abra R73 (HFA1) Mobile clients (VPN, Encryption)

  5. R73 Evolution R7x R73 / HFA1 R71 / R72 Unified Client Project R70 Pointsec Acquisition ZoneLabs Acquisition 2004 2008 2009 2010 2007

  6. Endpoint Security R73 • Unified Endpoint Protection • Best of breed Components • Data Security • Network Security • Remote Access components • Provides full security coverage • Flexible & Modular • Deploy what you need now, add what you need in the future • Multiple component and suite deployment options

  7. R73 – Data Security • Full Disk Encryption protects data at rest • Combines full hard drive encryption and pre-boot authentication • Media Encryption protects your removable medias • Combines Media Encryption and Port Protection

  8. R73 HFA1 – Network Protection • Not just a firewall • Innovative Network Protection Technologies • Program Advisor, WebCheck • Complementary Anti-Malware • Award-winning, high-performance

  9. R73 HFA1 - Remote Access • Choice of two VPN clients: • Endpoint Connect • Smart connection, whatever the network or connectivity challenges • Transparent “in the office” user experience • Embedded hot-spot handling • 32- and 64-bit client support • Legacy SecureClient • Ensuring topology and deployment compatibility

  10. Endpoint Security R73 – New features • Support of Windows 7 • New Anti Malware engine   • ME new features • Serial ID device filtering • Nero v9+ support for CD/DVD encryption • Local File & Folder Encryption • FDE • Support of IRRT enabledlaptops (Dell E-Series) • Improved client-side performance

  11. Fast User Experience Lowest CPU and Memory Utilization CheckPoint Symantec McAfee CheckPoint Symantec McAfee 130 - 100 - 70 - 40 - 10 - 175 - 160 - 145 - 130 - 115 - Megabytes Seconds Memory footprint System Boot Time Endpoint and Data Security on Windows XP SP3 Source: Check Point Labs

  12. Fast User Experience Fastest Anti-malware Scan Time CheckPoint CheckPoint 1600 - 1200 - 800 - 400 - 0 - 1600 - 1200 - 800 - 400 - 0 - Seconds Seconds McAfee Symantec McAfee Anti-malware RECURRING scan time Anti-malware INITIAL scan time Symantec Anti-malware tests on Windows 7 Source: Check Point Labs

  13. Endpoint Security R73 HFA1 – What's new • Support of Windows Server 2003 and 2008 32bit • FDE new features • Supports latestintel chipset • Supports hibernation on 64bits OS • ME new features • Encrypted client-side logs & profiles • Temp folder drive/location definition • Remote Help for non-AD users • WebRH • AD integration • Support of SQL Server 2008 • SA new features • Server Support for Anti-malware • Check Point R71 management support

  14. Abra R70 • Turn any PC into a corporate desktop • USB-based form factor with HW/SW encryption • Requires no admin, host OS, or reboot • On- and off-line working modes supported • Keep mobile data secure • Secure Workspace isolates/protects data from host • Central SW policy controls applications & features • Maintain secure connectivity • Provide flexible, secure access to corporate resources, info repositories, and applications • Leverage existing CP gateway protections/features

  15. Mobile Clients • VPN client is available on the following platforms: • Windows Mobile • Symbian • And now iPhone (SecureConnect) • Encryption is available on the following: • Windows Mobile • Symbian

  16. Agenda 1 2 3 Background: Current Endpoint Portfolio Looking Forward: Endpoint Security R80 Conclusion

  17. R80 Evolution R8x 2,5 years of development R80 Unified Management Project R7x R73 / HFA1 R71 / R72 Unified Client Project R70 Pointsec Acquisition ZoneLabs Acquisition 2004 2008 2009 2010 2007

  18. A new era in Endpoint Security! Coming Soon Q4 FDE Central Management Simple, Flexible Enhanced Monitoring ME

  19. R80: Unique Core Values • TrulyUnified Management • Organization-centric Management • Simple, efficient policydefinition • Flexible client deployment • Enhanced Monitoring • Leveraging CP Infrastructure • Comprehensive & Innovative

  20. R80: Truly Unified Management • All endpoint blades and policies managed from the same place • Consistent look and feel • No nested admin console • One component to install

  21. R80: Organization-Centric Management • Assignment Policy Model based on organization • Policies can be assigned based on connectivity state and/or compliance level • Leverage current AD architecture to manage & monitor endpoints

  22. R80: Simple, Efficient Policy Definition • Best practice out of the box policies protect endpoints quickly • Advanced configuration options always available for added granularity

  23. R80: Flexible Client Deployment • Ability to create MSI package for deployment • Device Agent only or featured package • Full handling of client deployment based on policy

  24. R80: Enhanced Monitoring • Full view on current endpoint status and events • Customizable & Exportable • Adaptable Drill-down reporting based on organization level

  25. R80: Leveraging CP Infrastructure • Combined Network & Endpoint Log Management provides total security view – useful for compliance • Sharing of Network Objects and Administration provides stronger, simpler security

  26. R80: Comprehensive and Innovative • Comprehensivefeatures: Media Encryption, Integrated FW, Integrated VPN, and Data Security • Unique Innovations: Anti-Malware with Program Control/Program Advisor, WebChecksecurebrowsing

  27. Agenda 1 2 3 Background: Current Endpoint Portfolio Looking Forward: Endpoint Security R80 Conclusion

  28. Conclusion • Check Point continues to improveits portfolio withinnovative and performant solutions • R73, Abra, SecureConnect for iPhone • Laterthisyear, R80 willbring us to a new way of managing Endpoint Security • Afterbeing the first one to release a (really) unified client to the market, no doubtthatwewillbe the first one to release a (really) unified management

  29. Questions?

  30. Thank you!

More Related