Upload
reina
View
24
Download
2
Embed Size (px)
DESCRIPTION
IDG CIO Government Securing Information Assets: Architecture, Not Devices! Scott Ferguson Regional Director ANZ Check Point Software Technologies. A Changing World. 2004. Security threats. Worst Year On Record. Internet reliance. 1993. 1996. 2000. 2003. 2004. - PowerPoint PPT Presentation
Citation preview
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
IDG CIO GovernmentSecuring Information Assets:
Architecture, Not Devices!
Scott FergusonRegional Director ANZCheck Point Software Technologies
2©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
A Changing World
1993 2003
Internet reliance
Security threats
1996 2000
Worst Year On Record
2004
2004
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
2004’s Top Security Concerns
Security: Still A Challenge!
New Constituents; Web Services;
Partner Web Access; WLAN; Remote
EmployeesNew, Dynamic & Blended
Security Threats
IT Budgets need to stay productivity focused
Security Breach:Network Downtime,
Lost Revenue, Regulatory
Commitments, Damage to Corporate Reputation
Dedicated Security Resources are Limited
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Why is Security such a Big Challenge?
In a connected world everyone is a target Attacks spread quickly Multitude of distributed systems to protect (and
connect) Multiple disparate technologies to implement
and manageWeb
Server
Exponential ManagementComplexity
5©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
Industry Trends - Enterprises
Resource Limitations 5-5.5% of IT budget
designated for security Average of 1 full-time
security employee/1,000 users
Top Security Concerns: Protection of company/
private information Protection against financial
losses Need for customer and
supplier confidence Concerns around internal
network/system security Use of Web services Shareholder confidence
Increased Risk 84% suffer operational or
financial losses Application level attacks
highest consequences Current security system
shortcomings– Depth of protection– Management complexity
Sources:Information Security, Does Size Matter survey, Sept 2002 Information Security, META Group, August 2003Vanson Bourne, The Global IT Security Report, 2003
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Australia’s Position
Relaxed culture, plague of set and forget strategies that are not sufficient
Point products permeate Complexity = complacency Behind the 8-ball (especially the mid-tier) Lag behind US, Europe, Asia Pac and
NZ in management involvement Opportunity For Change!
7©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
Risks to Your Infrastructure
InternalSecurity
WebSecurity
(Web protection andaccess control)
PerimeterSecurity
Worms/viruses LAN exposure Access abuse Unpatched systems
• Expanding perimeter• Sophisticated attacks• Application-level attacks
• Increased Webdependence • Secure access• Web serverexposure
8©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
Options in Today’s Market
InternalSecurity
WebSecurity
PerimeterSecurity
App Specific
Personal FW
HIDS
NIDS
SSL VPNs
SSO
Portal
Web FW
VPN
Authentication
App Firewall
NW FirewallMultiple Technologies,Inconsistent and Disparate
Management Systems
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Stateful Inspection/
FireWall-1
Stateful Inspection/
FireWall-1
1993
OPSECOPSEC
1997
VPN-1VPN-1
1998
Next GenerationNext Generation
2001
SmartDefenseSmartDefense
2002
Application IntelligenceApplication Intelligence
2003 2004
EAL 4 EAL 4+Check Point: security is our focusCheck Point: security is our focus
A History of Innovation
1994 1995 1996 1999 2000
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Architecture – What does it mean?
1. The art or science of building (Webster)
2. The way in which anything is physically constructed or designed (Cambridge)
3. (Computing) The general specification and configuration of the internal design of computer or LAN (Allwords.com)
4. (Vendors) Anything with our brand
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Architecture Not Devices
People
Culture
+Behaviour
+Education
Process
Policy
Publication+
Review
Technology
Deployment of multiple technologies
+Integrate
+ Single Management
+ Scale (from the
mobile phone PDA and Laptop)
12©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
Architecture Not Devices
SMARTmanagement
Worry-freeprotection
Intelligent Security Solutions
Perimeter
In-depth inspection
Inte
rnal W
eb
13©2002 Check Point Software Technologies Ltd. Proprietary & Confidential
Architecture Not Devices
InteroperabilityTrend MicroSurfControlSun Micro
CitrixTivoliNortel
Nokia
+171 Other product sets
Integrated Management & Reporting
CP Multiple, Market Leading Technologies
OP
SE
C
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Managing Security with IntelligenceManaging Security with Intelligence
Enforce SecurityDefine Policy
Monitor & ReportAnalyze & Change
IntelligentSecurity Lifecycle
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Security Management Life Cycle
Security Management
Life Cycle
Define Policy• Easy-to-use Graphical interface• Graphical policy visualization
Monitor & Report• Real-time monitoring• Instant status of all security elements• Automatic reports
Analyze & Change• Detailed logging
Enforce Security• Stateful Inspection• Application Intelligence
SMART Management
Your Goal:
Lowest Total Cost of OwnershipLowest Total Cost of Ownership - Automated administrative tasks - Automated administrative tasks save time and money save time and money
- Centralised information database - Centralised information database minimises capital expenditures minimises capital expenditures
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Architecture Not Devices
Protect investments Enhance client relationships through IT
enablement Allow you to focus on your business, not
on IT Increase productivity
SMARTmanagement
Worry-freeprotection
Intelligent Security Solutions
Perimeter
In-depth inspection
Inte
rnal W
eb
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Moving Forward:Deeper, Broader, Smarter Security
Broader deployments gateways, switches, clients, servers desktop, handheld
Smarter security management,integrated management tools, event analysis and correlation
Deeper content analysis, multi-layer analysis, application specific
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Summary
Intelligently Managed Security Process Perimeter, Internal and Web Security
– Broader, Deeper, Smarter
1993 2003
Internet reliance Security threats
1996 2000
Security Technology
Evolution
Intelligent SecuritySolutions
FireW
all-1VPN-1
2005
©2004 Check Point Software Technologies Ltd. Proprietary & Confidential
Architecture Not Devices
Visit the Check Point Stand and register for a free evaluation kit