the difference and why it matters - 8o infocom · pdf filethe difference and why it matters...

Post on 28-Mar-2018

225 Views

Category:

Documents

1 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

Moti Sagey | Head of Strategic Marketing & Intelligence

THE DIFFERENCE AND WHY IT MATTERS

[Confidential] ONLY for designated groups and individuals

2©2017 Check Point Software Technologies Ltd.

“IN GOD WE TRUST

ALL OTHERS

MUST BRING DATA“

W. Edwards Deming

[Confidential] ONLY for designated groups and individuals

3©2017 Check Point Software Technologies Ltd.

3OPERATIONAL

EFFICIENCY

2EVERYWHERE

ARCHITECTURE

UNCOMPROMISED

SECURITY1

[Confidential] ONLY for designated groups and individuals

WHAT DOES IT TAKE TO GAIN YOUR TRUST ?

4©2017 Check Point Software Technologies Ltd.

UNCOMPROMISED

SECURITY1

3OPERATIONAL

EFFICIENCY

2EVERYWHERE

ARCHITECTURE

Vendor

DNA

The CORE of Vendor DNA:COMMITMENTTO CUSTOMER SUCCESS

WHAT DOES IT TAKE TO GAIN YOUR TRUST ?

[Confidential] ONLY for designated groups and individuals

5©2017 Check Point Software Technologies Ltd.

Commitment to customer success, what does it mean?

IT ALL STARTS WITH THE RIGHT FOCUS..

[Confidential] ONLY for designated groups and individuals

6©2017 Check Point Software Technologies Ltd.

… TO KEEP CUSTOMERS PROTECTED

1337 R&D Engineers

31% of Employees

Source: Palo Alto’s Form 10-Q for the quarterly period ended October 31, 2016Fortinet Q3 2016 Financial Results October 27, 2016

[Confidential] ONLY for designated groups and individuals

2X more than Palo Alto

“Do they put their Headcount where their

MOUTH is???

648

1155

1337

Palo Alto

Fortinet

Check Point

25% of total

31% of total

16% of total

7©2017 Check Point Software Technologies Ltd.

Commitment to customer success, what does it mean?

[Confidential] ONLY for designated groups and individuals

WITH THE RIGHT PHILOSOPHY:PREVENTION

8©2017 Check Point Software Technologies Ltd.

THE IMPORTANCE OF REAL-TIME PREVENTION

[Confidential] ONLY for designated groups and individuals

9©2017 Check Point Software Technologies Ltd.

THE IMPORTANCE OF REAL-TIME PREVENTION

[Confidential] ONLY for designated groups and individuals

10©2017 Check Point Software Technologies Ltd.

Commitment to customer success, what does it mean?

WITH AN UNPARALLELEDSENSE OF URGENCY

[Confidential] ONLY for designated groups and individuals

11©2017 Check Point Software Technologies Ltd.

62

1738

170.4

112.5 117.1

#of software vulnerabilities in 2016Source: vendors security advisories web pages & http://goo.gl/5ZsHv6

[Confidential] ONLY for designated groups and individuals

2 1.0

# Total of SW vulnerabilities(2016) Average fix time (days)

Mature SW CodeSwift response to SW vulnerabilities

TO MAKE SURE CUSTOMERS ARE NOT EXPOSED…

©2016 Check Point Software Technologies Ltd. 12

Vendor

DNA

The Right

Focus (R&D)

Prevention

Philosophy

Sense of

Urgency

[Confidential] ONLY for designated groups and individuals

COMMITMENTTO CUSTOMER SUCCESS

SUMMARY:THE CORE OF VENDOR DNA

©2016 Check Point Software Technologies Ltd. 13

3OPERATIONAL

EFFICIENCY

UNCOMPROMISED

SECURITY1

2EVERYWHERE

ARCHITECTURE

[Confidential] ONLY for designated groups and individuals

WHAT DOES IT TAKE TO GAIN YOUR TRUST ?

14©2017 Check Point Software Technologies Ltd.

46

4 31

1 2 4

2

10

75

3

UNCOMPROMISED SECURITY STARTS WITH 3RD PARTY PROVEN TRACK RECORD OF SECURITY EXCELLENCE

Source: NSS Labs Network Security tests (FW/NGFW/IPS/NGIPS/DCIPS/BDS) * PAN NGFW solution have not been recommended since 2013

*

Recommended:

13/13=100%

Recommended:

50%

Recommended:

54%

Recommended:

67%

Recommended:

22%Recommended:

0%

[Confidential] ONLY for designated groups and individuals

Neutral Caution Recommended

13

15©2017 Check Point Software Technologies Ltd.

SECURITY SHORTCUTS RISK AND REWARD

Hidden configuration page

16©2017 Check Point Software Technologies Ltd.

HOW TO EXPOSE SECURITY SHORTCUTS IN POC’SDOWNLOAD THE GUIDE http://tiny.cc/poc-shortcuts

17©2017 Check Point Software Technologies Ltd.

THE CHECK-BOXSYNDROME

17©2017 Check Point Software Technologies Ltd.

“ ”

18©2017 Check Point Software Technologies Ltd.

Cisco FirePower 95.6% 97.5% 83.0% 74.2%

Dell SonicWall 98.5% 97.5% 82.5% 83.9%

Fortinet 99.5% 100% 94.3% 100%

Palo Alto Networks

94.6% 97.5% 83.0% 87.1%

NSS LABS NGFW 2016 TEST EXPLOIT BLOCK-RATE BY YEAR

2012 2013 2014 2015Check Point 100% 100% 100% 100%

Source: http://www.slideshare.net/zztop_2764/fortinet-nss-ngfw-2016-latency-catchrate

[Confidential] ONLY for designated groups and individuals

# of exploitsmissed (of 1999)

3

87

52

14

83

19©2017 Check Point Software Technologies Ltd.

23792622

3289

901 924

1290

642 698 803

ITS NOT BY CHANCE: NUMBER OF THREATS (CVE’S) COVERED BY IPS (2010-2016)

Information is current as of Jan 2010 - Oct 2016 | Source: Check Point Advisories| Palo Alto ThreatVault |Fortinet FortiGuard|Mcafee Threat Intelligence|Tipping Point Digital Vaccine|SourceFire Advisories

[Confidential] ONLY for designated groups and individuals

3792

1433

962

# CVE’s Microsoft CVE’s Adobe CVE’s

60% More than PAN, 45% more than Trend Micro

20©2017 Check Point Software Technologies Ltd.

3OPERATIONAL

EFFICIENCY

UNCOMPROMISED

SECURITY1

2EVERYWHERE

ARCHITECTURE

[Confidential] ONLY for designated groups and individuals

WHAT DOES IT TAKE TO GAIN YOUR TRUST ?

21©2017 Check Point Software Technologies Ltd.

THE CHALLENGE OF SECURING BORDERLESS NETWORKS

[Confidential] ONLY for designated groups and individuals

©2016 Check Point Software Technologies Ltd.

THE NEED: BLOCKING ATTACKS IN ANY ENVIRONMENT

SECURITY ACROSS

ALLBUSINESS

PLATFORMS

©2017 Check Point Software Technologies Ltd.

22

23©2017 Check Point Software Technologies Ltd.

CHECK POINT SOFTWARE BASED ARCHITECTURE MEANSEVERYWHERE AGILE SECURITY

Open ServersPrivate

CloudVirtualization/NFV Cloud Mobile

Partial

Threat Prevention

Partial

Threat Prevention

Partial

Threat Prevention

Not

Cisco certified

ASAv only

No threat prevention

H1 2017

24©2017 Check Point Software Technologies Ltd.

3OPERATIONAL

EFFICIENCY

2EVERYWHERE

ARCHITECTURE

UNCOMPROMISED

SECURITY1

[Confidential] ONLY for designated groups and individuals

WHAT DOES IT TAKE TO GAIN YOUR TRUST ?

25©2017 Check Point Software Technologies Ltd.

1000

1500 1500

2000 2000

Check Point Fortinet Juniper PANCisco

Source: NSS Labs NGFW Group Test

IMPROVED PRODUCTIVITYMan hours required for yearly management of 50 gateways per site

“The Check Point management remains the de facto “GOLD STANDARD” against which other consoles are measured”

26©2017 Check Point Software Technologies Ltd.

THE WHY - UNMATCHED UNIFIED ACCESS POLICY

Users Devices Applications Data Gateways Mobile Public Cloud Private Cloud

[Confidential] ONLY for designated groups and individuals

27©2017 Check Point Software Technologies Ltd.

SUMMARY

[Confidential] ONLY for designated groups and individuals

28©2017 Check Point Software Technologies Ltd.

THE DIFFERENCE

1337 R&D Engineers

31% of Employees

Source: Palo Alto’s Form 10-Q for the quarterly period ended October 31, 2016Fortinet Q3 2016 Financial Results October 27, 2016

[Confidential] ONLY for designated groups and individuals

2X more than Palo Alto

“Do they put their Headcount where their

MOUTH is???

648

1155

1337

Palo Alto

Fortinet

Check Point

25% of total

31% of total

16% of total

29©2017 Check Point Software Technologies Ltd.

3OPERATIONAL

EFFICIENCY

2EVERYWHERE

ARCHITECTURE

UNCOMPROMISED

SECURITY1

[Confidential] ONLY for designated groups and individuals

…WHY IT MATTERS

30©2017 Check Point Software Technologies Ltd.

UNCOMPROMISED

SECURITY1

3OPERATIONAL

EFFICIENCY

2EVERYWHERE

ARCHITECTURE

vendor

DNA

The CORE of Vendor DNA:

COMMITMENTTO CUSTOMER SUCCESS

[Confidential] ONLY for designated groups and individuals

…WHY IT MATTERS

31©2017 Check Point Software Technologies Ltd.

Mobile

Endpoint

Critical

Infra.

National

Security

UNCOMPROMISED

SECURITY1

3OPERATIONAL

EFFICENCY

2EVERYWHERE

ARCHITECTURE

Vendor

DNA

The Right

Focus (R&D)

Prevention

Philosophy

Sense of

Urgency

[Confidential] ONLY for designated groups and individuals

COMMITMENTTO CUSTOMER SUCCESS

Smart

Event

Compliance

Automotive

The CORE of Vendor DNA:

…WHY IT MATTERS

IOTNetwork

Cloud

MTP

32©2017 Check Point Software Technologies Ltd. ©2017 Check Point Software Technologies Ltd.

T H A N K Y O U

[Confidential] ONLY for designated groups and individuals

http://tiny.cc/thedifference

top related