Professional Documents
Culture Documents
INNOVATION 2020
Itai Greenberg | VP Product Management
Check Point Software Technologies
2008:
BEIJING OLYMPIC GAMES
CHINESE INNOVATION
2
3
10-Feb-20
3
4
4
PRACTICAL CONSOLIDATED
PREVENTION SOLUTION
5
CHECK POINT INNOVATION
CHECK POINT INNOVATION 2020
6
Secure the Secure Cloud Secure
Cloud Connectivity Devices
Secure Consolidated
7
IoT Security
Secure
the Cloud
8
4000+ Customers
use CloudGuard To Secure their Cloud
9
IaaS PaaS
Infrastructure Services
10
Advanced Threat Prevention Cloud Security Posture
with Auto-Segmentation & Compliance
11
IT IS HARD TO LEARN ABOUT SECURITY RISKS IN THE CLOUD.
INVESTIGATING A BREACH IS EVEN HARDER.
12
Transforming Logs into Security Logic
13 10-Feb-20
CloudGuard Log.ic Demo
Amir Kaushansky
Head of Product Management – Cloud
14
CloudGuard Log.ic Demo
Amir Kaushansky
Head of Product Management – Cloud
16
Linux & Windows Containers Serverless
19
Cloudguard Workload Demo
20
21 10-Feb-20
Cloudguard Workload Demo
22
SEE IT. CONTROL IT. SECURE IT
BETA BETA
23
Secure Cloud
Connectivity
24
What‘s important
when you connect to the cloud?
25
Best Solution to Connecting the Cloud
26
Scalable Datacenter Security
1. Hyper-scale security
Datacenter
2. Scale with any Gateway
3. 2 minutes to scale
1500 Gbps
Threat Prevention
Cloud X52 Gateways
27
Securely Connect Offices to the Cloud
Branch A
1) CloudGuard Connect (SaaS)
3 minutes to secure all offices SD-WAN
Branch B
2) CloudGuard Edge (uCPE)
On-prem best prevention
SD-WAN
28
CloudGuard Connect Demo
Aviv Abramovich
Head of Product management – Security Services
29
CloudGuard Connect Demo
Aviv Abramovich
Head of Product management – Security Services
31
CONNECT TO CLOUD
SECURE. HYPER-SCALE. FAST.
MAESTRO
32
Secure
Your Devices
33
How do you protect users’ web connectivity
when 80% of the traffic is SSL?
WWW
A CLOUD SERVICE
DOESN'T SOLVE THIS PROBLEM!
34
Check Point
Protect Users Everywhere
35
Nano-Agent Security
Inside Your Web Browsers
BETA
36
IOT
Security
37
IOT / OT Devices Become the Weakest Link
38
BETA
CHECK POINT
IOT SECURITY
39
Tailored for Different IoT Environments
40
IoT Firmware Risk Assessment
Weak/Known Credentials
41
END TO END IOT SECURITY
42
Consolidated
Security
43
The Cyber Security Architecture For Everything
44
Infinity NEXT - The Most Complete Security
60+ 50+
BEST SECURITY SERVICES PROTECTED ASSET TYPES
45
WHAT IF YOU COULD MANAGE
YOUR ENTIRE SECURITY FROM THE CLOUD?
46 10-Feb-20
Introducing:
Check Point Management as a Service
47 10-Feb-20
SECURITY AT HYPERSCALE
48
..AND WHAT IF YOUR SOC COULD HAVE
FULL ACCESS
TO CHECK POINT THREAT INTELLIGENCE ?
49
INTRODUCING: BETA
50
IfinitySOC Demo
Eytan Segal
Head of Product Management - Threat Prevention
51
52 10-Feb-20
SUMMARY
53
BEIJING INNOVATION 2008
54
54
BEIJING INNOVATION 2008
55
55
CHECK POINT INNOVATION 2020
Consolidated Everywhere
56
57
THANK YOU