You are on page 1of 29

CHECKPOINT SECURITY CHECKUP RESULT

PT Asuransi Jiwasraya

Dimas Wibisono | Solutions Architect

©2019 Check Point


©2019 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 1
Agenda
• Background

• Hasil Assessment

• Solusi yang di tawarkan

• Rekomendasi

• Kesimpulan

©2019 Check Point Software Technologies Ltd. 2


BACKGROUND

©2019 Check Point


©2019 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 3
Background
The Security Landscape
27 Years Ago: 22 Years Ago: 15 Years Ago: 10 Years Ago: 5 Years Ago: Now:
Invention of Invention of Prevalent use of URL Filtering, NGFW, Threat Intelligence
Firewall Stateful Inspection Antivirus, VPN, IPS UTM Mobile Security Threat Prevention

1994: 2003: 2007:


Green Card Anonymous Zeus Trojan 2014:
Lottery Formed Bitcoin
2000: 2011:
2006: Stolen 2012:
I Love You WikiLeaks Flame Malware
authentication
information
1988: 1998: 2010: 2013:
Morris Worm Melissa DDoS attacks: Dragonfly
Stuxnet SCADA

©2019 Check Point Software Technologies Ltd. 4


HASIL ASSESSMENT

©2019 Check Point


©2019 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 5
12200 Appliance

©2019 Check Point Software Technologies Ltd. 6


12200 Appliance

©2019 Check Point Software Technologies Ltd. 7


Smart-1 210 Appliance

Date | GB | Count
2019-07-14 | 7.0316 | 79998060
2019-07-15 | 11.3287 | 126917206
2019-07-16 | 10.4497 | 117157576
2019-07-17 | 10.2544 | 115120608
2019-07-18 | 10.0590 | 113040614
2019-07-19 | 8.5942 | 96841123

©2019 Check Point Software Technologies Ltd. 8


Smart-1 210 Appliance

©2019 Check Point Software Technologies Ltd. 9


Security Check Up

©2019 Check Point Software Technologies Ltd. 10


Security Check Up

©2019 Check Point Software Technologies Ltd. 11


SOLUSI DITAWARKAN

©2019 Check Point


©2019 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 12
CheckPoint License

©2019 Check Point Software Technologies Ltd. 13


CheckPoint Multi Layered Protection

(pre) Stop L3 + L4 Unauthorize Access


NG Firewall with User Identity Integration
(pre) Stops Malicious Apps + URL
Apps Ctrl + URL Filter
Access

(pre) Stops exploits of


IPS
known vulnerabilities
(pre) Blocks download of
Antivirus known malware infested files

(post) Detects & prevents


Anti-Bot
bot damage
SANDBLAST Network + (pre) Stops unknown
Agent zero-day malware in files

©2019 Check Point Software Technologies Ltd. 14


Real-time, Dynamic Security Intelligence

280+ 12+ 1+
Million Million
Million Bot Malware Malicious
Addresses Signatures Sites

©2019 Check Point Software Technologies Ltd. 15


The Power of Collaboration

Real-time
Attack Updates
Data

©2019 Check Point Software Technologies Ltd. 16


STAYING ONE STEP AHEAD
Introducing

Catches More Malware. Proactive Prevention. Complete Integrated Protection.

©2019 Check Point Software Technologies Ltd. 17


WHAT IS SANDBLAST?

Unprecedented real-time prevention against


unknown malware, zero-day and targeted
attacks

Sandboxing Threat Extraction

Evasion- Prompt
resistant delivery of
malware safe
detection reconstructed
files

©2019 Check Point Software Technologies Ltd. 18


Thret Emulation Can Block Even Unknown Malware

Open and detonate any files

T H R E AT C O N TA I N E D
Examine:
• System Registry
• Network Connections
• File System Activity
• System Processes

Watch for telltale signs of malicious code


at the Operating System level

©2019 Check Point Software Technologies Ltd. 19


Threat Emulation @ Work
Abnormal file activity
“Naive” processes created

Joseph_Nyee.pdf

Tampered system registry


Remote Connection to
Command & Control Sites
A STANDARD CV?

File System System System Network


Activity Registry Processes Connections

©2019 Check Point Software Technologies Ltd. 20


Threat Extraction
Document Reconstruction

Reconstructed safe Original Document Safe Copy of


Document Reconstructed Document
copy of documents
Delivered
immediately

Customizable
Protection Level

©2019 Check Point Software Technologies Ltd. 21


REKOMENDASI

Dimas Wibisono | Solutions Architect

©2019 Check Point


©2019 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 22
Pengganti 12200 Appliance

Opsi 1: sesuai dengan throughput existing 165.62 Mbps


Perangkat 5600 atau Perangkat 6500

Opsi 2: sesuai dengan lifecycle


Perangkat 5900

©2019 Check Point Software Technologies Ltd. 23


Pengganti 12200 Appliance

©2019 Check Point Software Technologies Ltd. 24


Pengganti 12200 Appliance

©2019 Check Point Software Technologies Ltd. 25


Pengganti Smart-1 210 Appliance

Opsi 1: sesuai dengan penggunaan log existing 11.3 GB


Perangkat smart-1 405

Opsi 2: sesuai dengan lifecycle


Perangkat smart-1 410

©2019 Check Point Software Technologies Ltd. 26


Pengganti Smart-1 210 Appliance

©2019 Check Point Software Technologies Ltd. 27


Mengatasi Zero Day Attack maupun Targetted Attack

©2019 Check Point Software Technologies Ltd. 28


THANK YOU

Dimas Wibisono | Solutions Architect

©2019 Check Point


©2019 Software
Check Point Technologies Ltd.
Software Technologies Ltd. 29

You might also like