12.07.2015 Views

Virtualization Solutions from Check Point Software ... - Stallion

Virtualization Solutions from Check Point Software ... - Stallion

Virtualization Solutions from Check Point Software ... - Stallion

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Installing the MX-Edit VST Hardware Plug-In...................................................35Connecting the MX200 .....................................................................................35<strong>Software</strong> Configuration .....................................................................................36Using the MX200 Plug-In Window....................................................................36Controls.............................................................................................................36MIDI Port Error Message ..................................................................................37CC Mapping .............................................................................................................37MIDI Implementation Chart ......................................................................................37Specifications ...........................................................................................................38Appendix ..................................................................................................................39Program List.............................................................................................................40


<strong>Check</strong> <strong>Point</strong> Stays Ahead…Defined 3 domains:Endpoint and data, network andgateway, managementTotal security solutionsComprehensive gateways,including appliances<strong>Software</strong> BladesThe architecture that changes security200720082009More, Better, Simpler SecurityA holistic approach where endpoint and network areintegrated and DLP, IPS impact all domains of security2010©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |7


Agenda1 Who are we?2 <strong>Virtualization</strong> and Clouds3 Security at Virtualized Core4 Desktop <strong>Virtualization</strong>©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |8


Data Center Trends‣ The New Computer‣ Data center capacity, not server capacity,is the new metric‣ Consolidation‣ High Computational Density‣ Physical Location Consolidation‣ Green‣ Efficient Power Management‣ <strong>Virtualization</strong>‣ On Demand Provisioning‣ Hardware Independence / High Availability‣ Location Independence‣ Network / Storage Convergence©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |9


Next Generation Data CenterIP-netAutomated Metering and BilllingService ManagementAutomated Orchestration and ProvisioningServersServersVirtual InfrastuctrureStorage NetworkPhysical InfrastructureStorage NetworkFacilitiesConfiguration Management Database (CMDB)©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |10


Different Services <strong>from</strong> CloudIaaSPaaSSaaSStaaSInfrastructureas a Service• Servers• Network• Storage• Managedservices (FW)Platform as aService:• Applicationbuildingblocks<strong>Software</strong> as aService:• Applications• ASPStorage as aService:• Primary• Backup andarchieve• DisasterrecoveryMultipleServiceProvidersAmazon EC2 Salesforce.com Amazon S3Capacity / Utility Based Computing, Delivered <strong>from</strong> NGDCCloud = IT as a Service (ITaas)Cloud Computing = Business Model for Delivering ITaaS<strong>Virtualization</strong> = Techology that Enables Cloud Computing©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |11


<strong>Virtualization</strong> Overview• <strong>Virtualization</strong>decouples physicalresources <strong>from</strong> theOS & applications<strong>Virtualization</strong> Layer• Machines areencapsulated asfiles©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |13


Agenda1 Who are we?2 <strong>Virtualization</strong> and Clouds3 Security at Virtualized Core4 Desktop <strong>Virtualization</strong>©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |14


<strong>Virtualization</strong>, Like Every NewTechnology, Presents New Risks• New attack vectors• Loss of segmentation• New managementrequirements• Operational teams willbe mixed (Server,Security, Network…)©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |15


Security Challenges In VirtualEnvironments<strong>Virtualization</strong> BenefitsEasy machine creationSecurity and Compliance ConcernsVulnerabilities on a VM are not detected by externalscannersMultiple apps/servers consolidatedinto VM’s on single ESXExternal security devices on physical LAN can’tautomatically detect events on virtual devicesVM’s operating and communicatingentirely within virtual environmentVisibility gap; Lack of inter-VM visibility formonitoring and enforcementVMotion (live migration) - Mobilityenables high availability, dynamicresource optimizationHypervisor enables consolidationMaintain security and isolationAccess to sensitive data in VM©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |16


<strong>Check</strong> <strong>Point</strong> Security Gateway VE R70Total SecurityFor Virtual Environments• Best-in-class security for virtual applications• Separates virtual machines and protects inter-VM traffic• Protects against external threats with full IPS & UTM functionality• Unified management of physical and virtual environment©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |18


Firewall Security at Layer 2 with VMPktESX Server2.1.1.1 sendspacket to 2.1.1.32.1.1.1 2.1.1.2 2.1.1.3 2.1.1.4 2.1.1.5PktAgent Agent Agent Agent AgentSecurity APIPacket continues intercepted the in flow the Packet is notvSwitch<strong>from</strong> Agent where and it forwarded was intercepted to inspected the againGateway for inspectionR70 VEPktPacket passed firewallinspection and is sent back tothe Agent©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |19


Protecting the Virtualized Data CenterVMware ESX Topology with VPN-1 VE<strong>Check</strong> <strong>Point</strong> VPN-1 VESecurity GatewayWeb ServersApplication ServersDatabase ServersCardholder dataVMVMVMInternetvSwitchIntranetvSwitchWebvSwitchAppvSwitchDBvSwitchServiceConsoleNICTeamsVMwareESXInternetProductionLAN<strong>Check</strong> <strong>Point</strong> UTM-1Security GatewayManagementLANVMwarevCenter©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |20


Security Gateway VE with VMsafe• Protect the VM by inspection <strong>from</strong> inside the vSwitch• Complete integration and awareness of VMotion, Storage VMotion, HA, etc.Web ServersApplication ServersDatabase ServersCardholder data<strong>Check</strong> <strong>Point</strong> VESecurity GatewayVMVMVMInternetvSwitchInternalvSwitchServiceConsoleNICTeamsVMwareESXInternetProductionLANManagementLAN<strong>Check</strong> <strong>Point</strong> UTM-1Security GatewayVMwarevCenter©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |21


R70 VE BenefitsBest SecurityFull CoverageManagementConsistencyFirewall, IPSand UTMintegrated inthe VM-kernelProtectionagainst inter-VM andexternal threatsInteroperablewith VMware V-SphereManagementConsoleUnified securitypolicy insideand out of thevirtual zoneV-CenterManagement©2010 ©2010 <strong>Check</strong> <strong>Check</strong> <strong>Point</strong> <strong>Point</strong> <strong>Software</strong> <strong>Software</strong> Technologies Technologies Ltd. Ltd. | | [Unrestricted] [Restricted]—ONLY For Everyone for designated groups and individuals | | 2222


Agenda1 Who are we?2 <strong>Virtualization</strong> and Clouds3 Security at Virtualized Core4 Desktop <strong>Virtualization</strong>©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |23


Remote Workforce ChallengesWorking—and Accessing Files—<strong>from</strong> HomeExamples► Isolate and protect yourcorporate data while usingyour family PC“42% of US employers allowedstaff to work remotely thisyear—up <strong>from</strong> 30%.”—World at Work 2009(Survey of 2,288 U.S. employers)► Avoid unintentional data lossduring home PC usage byfamily members bysegregating corporate data©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |24


Business Continuity ChallengesThe Case of the Icelandic VolcanoExamples► Maintain productivity evenwhen large numbers of yourworkforce are stranded due toa volcanic eruption or othernatural disaster“Companies prepared forbusiness interruptions… arethe ones most likely to be keepthemselves operating.”—AP Report, Iceland Volcano 2010► Sustain business continuitywhen a snow-day forces theclosure of your office©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |25


3rd-Party Workforce ChallengesPartners, Contractors and Shared EnvironmentsExamples► Prevent contractors <strong>from</strong>exposing your sensitiveinformation to 3 rd parties“Over 44% of all cases in thisyear’s data-breach studyinvolved third-party mistakes.”—Ponemon Institute 2009► Maximize assets usage inshared environments - suchas call centers - whileproviding personal workspaceto all employees©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |26


Introducing <strong>Check</strong> <strong>Point</strong> Abra<strong>Check</strong> <strong>Point</strong> AbraPut your office in your pocketInstantly turn any PC into your own corporate desktopVirtual workspace that keeps mobile data secureIdeal for mobile workers, contractors and disaster recovery©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |27


Standard Windows EnvironmentAccessencryptedfiles on USBdriveAccess toIntranet andapprovedwebsitesLaunchapprovedapplicationsTogglebetweensecureworkspaceand host PC©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |28


Plug-and-Play Solution toFit Any PCWork Off-LineWork On-LineAccess working files anddata <strong>from</strong> thevirtual workspaceSeamless and secureconnectivity to thecorporate network©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |29


Let’s see how it works!©2010 <strong>Check</strong> <strong>Point</strong> <strong>Software</strong> Technologies Ltd. | [Unrestricted] For Everyone |30

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!