You are on page 1of 58

CHECK POINT

INNOVATION 2020
Itai Greenberg | VP Product Management
Check Point Software Technologies
2008:
BEIJING OLYMPIC GAMES
CHINESE INNOVATION

2
3
10-Feb-20
3
4
4
PRACTICAL CONSOLIDATED
PREVENTION SOLUTION

5
CHECK POINT INNOVATION
CHECK POINT INNOVATION 2020

6
Secure the Secure Cloud Secure
Cloud Connectivity Devices

Secure Consolidated
7
IoT Security
Secure
the Cloud

8
4000+ Customers
use CloudGuard To Secure their Cloud

9
IaaS PaaS
Infrastructure Services

10
Advanced Threat Prevention Cloud Security Posture
with Auto-Segmentation & Compliance

11
IT IS HARD TO LEARN ABOUT SECURITY RISKS IN THE CLOUD.
INVESTIGATING A BREACH IS EVEN HARDER.
12
Transforming Logs into Security Logic

• Detect anomalies powered by AI


• Visualize policy, activities & logs
• Enrich SIEM with cloud intelligence
• Remediate risks with CloudBots

13 10-Feb-20
CloudGuard Log.ic Demo

Amir Kaushansky
Head of Product Management – Cloud

14
CloudGuard Log.ic Demo

Amir Kaushansky
Head of Product Management – Cloud

16
Linux & Windows Containers Serverless

CLOUD APPLICATION IS A MESH OF MANY MICRO-SERVICES.


A SIMPLE MISTAKE Could EXPOSE YOUR APPLICATION.
17
SECURE THE CLOUD FROM THE INSIDE
18
CI/CD Integration

Code Analysis & Runtime Security

WEB & API Security (WAAP)

Hardening & Vulnerability Scanning

19
Cloudguard Workload Demo

Tsion (TJ) Gonen


Head of Cloud Go To Market

20
21 10-Feb-20
Cloudguard Workload Demo

Tsion (TJ) Gonen


Head of Cloud Go To Market

22
SEE IT. CONTROL IT. SECURE IT

BETA BETA

23
Secure Cloud
Connectivity

24
What‘s important
when you connect to the cloud?

Secure. Scalable. Fast.

Offices Cloud Datacenter

25
Best Solution to Connecting the Cloud

Offices Cloud Datacenter

26
Scalable Datacenter Security

1. Hyper-scale security
Datacenter
2. Scale with any Gateway
3. 2 minutes to scale
1500 Gbps
Threat Prevention
Cloud X52 Gateways

27
Securely Connect Offices to the Cloud

Branch A
1) CloudGuard Connect (SaaS)
3 minutes to secure all offices SD-WAN

Branch B
2) CloudGuard Edge (uCPE)
On-prem best prevention
SD-WAN

28
CloudGuard Connect Demo

Aviv Abramovich
Head of Product management – Security Services

29
CloudGuard Connect Demo

Aviv Abramovich
Head of Product management – Security Services

31
CONNECT TO CLOUD
SECURE. HYPER-SCALE. FAST.

MAESTRO

32
Secure
Your Devices

33
How do you protect users’ web connectivity
when 80% of the traffic is SSL?

WWW

A CLOUD SERVICE
DOESN'T SOLVE THIS PROBLEM!

34
Check Point
Protect Users Everywhere

SECURE ANDROID & IOS

SECURE WINDOWS, MAC & LINUX WWW

SECURE CHROME, IE & FIREFOX


Safe & fast web browsing

35
Nano-Agent Security
Inside Your Web Browsers

BETA

• Inspect 100% of SSL traffic

• Prevent zero-day malware & phishing

• Block bad URLs

… and avoid the cost & latency of cloud operation

36
IOT
Security

37
IOT / OT Devices Become the Weakest Link

1. They are rarely patched

2. Hackers use IoT to get inside the network

38
BETA

CHECK POINT
IOT SECURITY

39
Tailored for Different IoT Environments

Smart Office & Smart Building Hospitals Industrial


Protect your business from Ensure patient safety and data Ensure reliable and
corporate spying confidentiality safe operations

40
IoT Firmware Risk Assessment

Weak/Known Credentials

Known Vulnerabilities (CVE’s)

Suspicious connected domains

41
END TO END IOT SECURITY

IoT FIRMWARE IoT NETWORK IoT NANO-AGENT


RISK ANALYSIS PROTECTION
Online service to spot IoT Automatically apply zero- On-device runtime
security flows trust security to your IoT protection & hardening

42
Consolidated
Security

43
The Cyber Security Architecture For Everything

44
Infinity NEXT - The Most Complete Security

60+ 50+
BEST SECURITY SERVICES PROTECTED ASSET TYPES

45
WHAT IF YOU COULD MANAGE
YOUR ENTIRE SECURITY FROM THE CLOUD?

46 10-Feb-20
Introducing:
Check Point Management as a Service

CLOUD SERVICE MANAGE ALL INFINITY WEB GUI


PRODUCTS

47 10-Feb-20
SECURITY AT HYPERSCALE

Auto-Scale Management Service 5 New Scalable Gateways

48
..AND WHAT IF YOUR SOC COULD HAVE
FULL ACCESS
TO CHECK POINT THREAT INTELLIGENCE ?

49
INTRODUCING: BETA

Check Point InfinitySOC

“Google” ThreatCloud Expose Infected Hosts &


to Investigate attacks Hidden Attacks

50
IfinitySOC Demo

Eytan Segal
Head of Product Management - Threat Prevention

51
52 10-Feb-20
SUMMARY

53
BEIJING INNOVATION 2008

54
54
BEIJING INNOVATION 2008

55
55
CHECK POINT INNOVATION 2020

Prevent Agile Scalable

Consolidated Everywhere

56
57
THANK YOU

You might also like