Check Point Data Security - PowerPoint PPT Presentation

Loading...

PPT – Check Point Data Security PowerPoint presentation | free to download - id: 1f0d75-ZTFjY



Loading


The Adobe Flash plugin is needed to view this content

Get the plugin now

View by Category
About This Presentation
Title:

Check Point Data Security

Description:

Check Point Data Security – PowerPoint PPT presentation

Number of Views:1464
Avg rating:3.0/5.0
Slides: 34
Provided by: Ward167
Learn more at: http://www.ward.ie
Category:
Tags: check | data | icc | point | security

less

Write a Comment
User Comments (0)
Transcript and Presenter's Notes

Title: Check Point Data Security


1
Check Point Data Security
2
Agenda
  • Introduction
  • Why is Data Security a hot topic?
  • The Check Point Difference
  • Data Security Product Portfolio
  • Product Summary

3
Ward Solutions Company Overview
4
Competency Areas Solutions and Partners
Security Assessments Secure Coding
Practices Computer and Network Forensics PCI
DSS BS7799/ISO 27001 Ethical Hacking and
Penetration Testing Identity and Access
Management
Perimeter and Network Security WLAN VPN/Remote
Access LAN/WAN design and implementation. Intrusio
n Detection and Prevention Identity and Access
Management
SharePoint development Services Custom
Application Development Oracle Database SQL
Sever Exchange and Messaging
Project and Program Management Vendor
Management Architecture and Solutions
Roadmaps Business and Technical Advisory
Information Lifecycle Management DR/BC Network
and Systems Management
Strategic IT Consulting
Security Consulting Services
Networking and Security Integration
Database and Application
Infrastructure Management Services
Practice Areas
Niche
Ward Solutions Increasing Value Add
Delivered with Partners
5
Why Secure Data?
  • What does it cost your company to bein the
    papers with a security breach?
  • Loss of reputation and image
  • Reduced ability to attract and retain customers
  • Regulations may apply as well
  • Personal Privacy Laws 33 US States w/ personal
    privacy laws, HIPAA, PIPEDA (Canada)
  • Governance laws such as SOX, GLBA, Basel II
    (Europe), Data Protection Act (UK), Personal
    Information Protection Law (Japan), Privacy Act
    (Australia), Indian IT Act of 2000 (India)
  • HSPD12, FISMA (US Government)

Ensure company trade secrets and proprietary
information are fully protected
6
Public Exposure Impact
Data Loss ImpactAverages 140 Per Customer
  • Direct costs - 50 per customer (Legal,
    notification, etc.)
  • Indirect costs - 15 per customer (Lost employee
    productivity)
  • Opportunity costs - 75 per customer(Loss of
    customer and recruiting new ones)
  • Government Fines
  • Exposure to legal action
  • Shareholder value loss
  • Diminished Goodwill
  • 33 Other states with legislation

(Source Gartner, CIO Update)
7
Leadership Position Gartner Analysis
2001
Microsoft
Check Point ranked leaderin Gartners Mobile
Data Protection Magic Quadrant!
Check Point
F-Secure
Ability To Execute
Aliroo
Ensure Technologies
Utimaco Safeware AG
Vasco
WinMagic
CopyTele
Completeness of Vision
8
Leadership Position Gartner Analysis
2006
Check Point
Check Point ranked leaderin Gartners Mobile
Data Protection Magic Quadrant for 6 years in a
row!
Information Security Corp.
WinMagic
Ability To Execute
PGP
Entrust
Bluefire Security Technologies
GuardianEdge Technologies
Sybase (Anywhere)
Reflex Magnetics
Completeness of Vision
9
Proven Lowest Total Cost of Ownership
3 Year Total Cost Per Seat
(1,000 Seat Installation)
(10,000 Seat Installation)
700
600
500
400
300
200
100
Endpoint Security Full Disk Encryption
Competitor 1
Competitor 2
Endpoint Security Full Disk Encryption
Competitor 1
Competitor 2
  • Proven fastest to deploy
  • No costly servers or D-bases
  • Highly scalable
  • Simple administration
  • Quick password resets
  • Ease of maintenance work

10
Highest Level Number of Certifications
  • FIPS 140-1 FIPS 140-2 (Federal Information
    Processing Standards)
  • Certification for entire PC product received
    March 22, 2002
  • NIST Listing Certification 208
  • NIST Listing AES Certification 17
  • NIST Listing Certification 237
  • CSE Pre-Qualifies Endpoint Security Full Disk
    Encryption 4.1 Under ITS
  • Common Criteria EAL4 (Certification Awarded
    February 2004)
  • Executively sponsored by the DEA
  • BITS Tested Compliance
  • UK CSIA Claims Tested (CCT) Mark
  • Export Mass Market Status Under CCATS ECCN
    All Products
  • DCSSI Certification (French Authority) Approved
    To Furnish Import Cryptographic Products
  • n 43589. PS PC v4.2 and higher.
  • Australian Government Department of Defense
  • Endpoint Security Media Encryption Certifications
  • Common Criteria EAL2(Certification Awarded April
    2005)
  • Novell Yes Certification
  • Certified at the FIPS 197 level
  • Submission of crypto libraries for FIPS 140-2

11
Check Point Data Security Solutions
Check PointMobile Symbian OS
Check PointMobilePalm OS
Check PointMobile Smartphone
Endpoint Security Media Encryption Media
Encryption
Check PointMobile Pocket PC
Endpoint Security Full Disk Encryption Linux
Endpoint Security Media Encryption Port Management
Endpoint Security Full Disk Encryption Windows
12
Endpoint Security Full Disk Encryption Complete
Data Protection

Check Point provides the most complete
comprehensive protection for all data!
13
Customizable, Pre-Boot Login Screen
INCLUDES
Native Logon Credentials
Custom Background
Logon Logo
Legal Disclaimer
14
Efficient Transparent Encryption
  • Encryption Rate Approximately 12-15 GB / Hour
  • Regardless of info amount on the hard drive
  • Only 3-5 system performance degradationafter
    disk is fully encrypted (Invisible to the end
    user)
  • Configurable algorithm AES, CAST, Blowfish,
    3DES
  • Throttled Background Encryption Service
  • Low priority process
  • Allows other applications priority to access
    processor
  • Continued end user productivity
  • Fault Tolerant
  • User may shut down during encryption process
  • Power outage does not effect encryption process
  • Highly Scalable, Easy To Deploy Manage And
    Enforceable
  • User may not un-install without administrator
    approval
  • Lowers total cost of ownership (Configure and
    forget)
  • Suspend, Hibernation, Mouse Support

15
Ease of Deployment
Deployment Is Very FastUsing Single
Configuration File Existing Deployment
Strategies
16
Proven Recovery
User Workstation
Central File Server
Unique key for each device No master key
vulnerability Created automatically at
installation Updated automatically when changes
occur Requires 2 authorized administrators to
unlock Your company can always recover a
workstation
17
Options For Recovery Key Escrow
  • 4 Methods of Recovery
  • User forgot password? User password reset (Next
    slide)
  • User left company? Log on as Check Point
    Administrator
  • Operating system died? Check Point Alternative
    Boot Menu
  • Catastrophic failure? Check Point Recovery Media
    withDevice Key
  • Slave Hard Drive After Authentication
  • Login from another Check Point encrypted machine
  • Enterprise Access
  • Works with forensics tools
  • Imaging
  • Re-image Boot Volume with Windows
  • Create new Gold images w/ Ghost

18
Simple Steps For Remote Password Reset
USERNAME
REMOTEHELPER
1234567890
5544332211
REMOTEHELPER PASSWORD
1234 2234 3234 4234 4321 3321 2321
1234567890
5544332211
1234 2234 3234 4234 4321 3321 2321
19
SmartCenter for Check PointFlow
Authentication Remote Help Session
SmartCenter for Check Point Server
20
Centralized Automatic Logging
  • Automatic transfer of logs to central location
  • Central viewing of encrypted log files
  • Integrates with Windows Event Viewer
  • Counting of active licenses
  • Ability to export logs

21
Flexibility With Multi-Factor Authentication
User ID PIN Smart Card or USB Token
22
Summary of Key Strengths
23
Professional Services
24
Check Point Data Security Solutions
Check PointMobile Symbian OS
Check PointMobilePalm OS
Check PointMobile Smartphone
Endpoint Security Media Encryption Media
Encryption
Check PointMobile Pocket PC
Endpoint Security Full Disk Encryption Linux
Endpoint Security Media Encryption Port Management
Endpoint Security Full Disk Encryption Windows
25
Endpoint Security Media Encryption Product
Operation
Endpoint Security Media Encryption
Endpoint PC
Centralized Auditing and Management
Audit utility provided for initial assessment of
port usage and security policy planning
Controls Activity on ports and devices including
Wired Wireless Devices USB Bluetooth Memory
cards Firewire Infrared Digital
cameras Serial WiFi Music players Printer Modem
s IDE Smart phones Printers Keyloggers
26
Endpoint Security Media Encryption Media
Encryption
Complete Protection
Complete Protection For Data On Removable
Media(Stand Alone or Add-on To Endpoint Security
Full Disk Encryption)
  • Runs automatically and transparently to user
  • Read and encrypt data from media on unprotected
    systems without PME (Stand-Alone Feature)
  • FIPS 140-2 Certified Product
  • Remote help available for media and encrypted
    packages

27
Encrypted Packages Created By User
  • Immediate file encryption
  • Using standard Windows menus and button clicks
  • Encrypted archives for multiple files
  • Handles folders and sub-folders recursively
  • Self-extracting files for data distributing
  • No need for recipients to haveEndpoint Security
    Media Encryption media encryption
  • Hints
  • Help users remember the encryption key
  • Central policy strength password for
    protectionof encrypted archives

28
Check Point Data Security Solutions
Check PointMobile Symbian OS
Check PointMobilePalm OS
Check PointMobile Smartphone
Endpoint Security Media Encryption Media
Encryption
Check PointMobile Pocket PC
Endpoint Security Full Disk Encryption Linux
Endpoint Security Media Encryption Port Management
Endpoint Security Full Disk Encryption Windows
29
Mobile Devices Key Features
  • Real-Time Encryption
  • Automatic on-the-fly encryption of all data
    stored on a device, including encrypting
    Microsoft Outlook? data (E-mail, Calendar
    Contacts)
  • Persistent storage encryption
  • Removable Media Encryption
  • Entire disk encrypted
  • Cards can be shared
  • Unencrypted Media Policy
  • Enable organizations to allow / disallowuse of
    unencrypted removable media
  • Enforceable Mandatory Access Control
  • Prevents unauthorized use of the device and
    prevents the authorized user from uninstalling
    security software

30
References A Select Sampling
31
Solution Summary
Enforceable Security Automatic, full disk
encryption No user intervention
Complete Solution Set Covers Laptop/PC, Linux,
Port Management, Removable Media, Symbian,
Smartphone, Pocket PC Palm
Simple Password Reset Remote challenge / response
Reduced DeviceRecycle Costs No costly disk
wipe/conditioning necessary
Quick EasyTo Administer No significant
overhead
Exposure From Lost Data Eliminated Only
replacement cost for device
32
Next Steps
  • Contact Ward Solutions Checkpoint Silver
    Partner
  • Telephone 353 1 6420100
  • Fax 353 1 6420161
  • Email sales_at_ward.ie or info_at_ward.ie

33
Questions
About PowerShow.com