Security Architecture Overview Module 1 Agenda § Sections covered in this Module:
§ 1.1 Introduction to Check Point and Next Generation Cyber Security
§ 1.2 The Basic Components of Check Point Perimeter Security Arch. § 1.3 Check Point Security Gateway Appliances Portfolio § 1.4 Firewall Deployment Mode Options § 1.5 Check Point Software Blade Architecture Overview § 1.6 Check Point Gateway Software Blades § 1.7 Check Point Management Software Blades
Check Point R80.10 Training Bootcamp
Check Point R80.10 Training Bootcamp
1.1 Introduction to Check Point and
Next Generation Cyber Security Who is Check Point Software Technologies ? § Israeli multinational company founded in 1993, provider of software and combined hardware and software products for IT Cyber Security
§ Check Point’s focus is real time PREVENTION and NOT
DETECTION with the best technologies, across the entire attack surface, with consolidated management
§ Let’s drill down …
Check Point R80.10 Training Bootcamp
Prevention vs Detection § Detection – the action of monitoring a network or system for malicious activity or policy violation
§ Prevention – the action of monitoring and identifying a
a malicious activity, logging this information, reporting it AND attempting to BLOCK or STOP it.
§ Check Point implements Prevention in REAL TIME
Check Point R80.10 Training Bootcamp
Check Point Complete Security Architecture § We need to protect all entry points into the organization; Can you guess what are these ?
§ Endpoint – laptops, PCs
§ Mobile – phones, tablets
§ Cloud – public, private or hybrid
Check Point R80.10 Training Bootcamp
Check Point Complete Security Architecture § Data Center – prevent threats lateral movement inside the DC
§ What’s missing ? What is the most implemented and
widely spread security solution ?
§ Exactly – The FIREWALL – Network Perimeter
Check Point R80.10 Training Bootcamp
Check Point Security Management § RECAP : Check Point delivers best in class security for all entry points in the organization: endpoint, mobile, cloud and network perimeter & data centers
§ How do we manage all these solutions ?
§ Consolidated Security Management through R80.10
Smart Console, one single pane of glass for the entire security portfolio solutions and products !!!