SlideShare a Scribd company logo
1 of 38
Download to read offline
11
MOTI SAGEY | HEAD OF STRATEGIC MARKETING & INTELLIGENCE
CREATED EQUAL
ARE ALL SECURITY PRODUCTS
?
[Protected] Distribution is subject to approval ​
2
FOR THE IMAGINATION OF MAN'S HEART IS EVIL FROM HIS YOUTH
THE STATE OF CYBER SECURITY TODAY
Mostly Gen I-III Deployed (AV, FW, IPS)
Genesis 8:21
Gen I security - AV Gen II,III security - FW + IPS
3©2018 Check Point Software Technologies Ltd.
GEN IV – THE ERA OF POINT SOLUTIONS
4
THE CHALLENGE
EVERY VENDOR WILL TELL YOU
THEY HAVE THE BEST SECURITY
WHAT IS THE BEST SECURITY ?
HOW DO WE TEST IT?
IN GOD WE TRUST,
ALL OTHERS MUST
BRING DATA”
“
W.H DEMING
5
WHAT IS THE BEST SECURITY ?
GEN V SECURITY THAT IS :
effective
efficient
everywhere
6
“EFFECTIVE SECURITY”, WHAT DOES IT MEAN?
IT ALL STARTS WITH THE
RIGHT FOCUS
7
TO KEEP YOUR BUSINESS
PROTECTED
1402R&D ENGINEERS
31% OF EMPLOYEES
16% OF TOTAL
25% OF TOTAL
31% OF TOTALCHECK POINT
FORTINET
PALO ALTO
1402
1225
787
Source: SEC Data: Palo Alto Form 10-Q | Fortinet 10-K | Check Point 20-F
8
“EFFECTIVE SECURITY”, WHAT DOES IT MEAN?
WITH THE RIGHT PHILOSOPHY:
REAL-TIMEPREVENTION
9
HENRY FORD
“IF I HAD ASKED PEOPLE
WHAT THEY WANTED,
THEY WOULD HAVE SAID
FASTER HORSES”
CHECK POINT REAL-TIME PREVENTION INNOVATIONS
10
CHECK POINT REAL-TIME PREVENTION INNOVATIONS
“IF I HAD ASKED PEOPLE WHAT THEY WANTED, THEY WOULD HAVE SAID FASTER HORSES”
“Check Point has gained ground
from an innovation standpoint
and can boast one of the most
complete offerings in the
network security market today.
“Perhaps the most impressive
element of Check Point’s malware
analysis approach is the ability to
capture an email attachment,
analyze it, and render the
content for the end user or
security team while the malware is
mitigated.
11
FIVE MINUTES
NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
12
1MB SIZE LIMIT
NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
13
DOES NOT BLOCK
NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
14
“WE CAN’T HOLD ON TO
A FILE “ CISCO
“DETECTION NOT BLOCKING/PREVENTION”
FIREEYE
NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
15
“EFFECTIVE SECURITY”, WHAT DOES IT MEAN?
WITHANUNPARALLELEDSENSEOF
URGENCY
16
TO MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED…
1.02
Mature SW Code
Swift response to
SW vulnerabilities
221.3
62
183.6
93
48.2
99
# Total of SW vulnerabilities(2016,2017) Average fix time (days)
Source: vendors security advisories web pages & http://tiny.cc/urgency
17
AVERAGE RESPONSE TIME FOR TOP VULNERABILITIES(IPS) IN 2017
Source: vendors security advisories web pages & http://tiny.cc/urgency
18
EFFECTIVE SECURITY MUST HAVE 3RD PARTY
PROVEN TRACK RECORD OF SECURITY EXCELLENCE
Source: http://tiny.cc/nss_stats NSS Labs Network Security tests (FW/NGFW/IPS/NGIPS/DCIPS/BDS) * PAN NGFW solution have not been recommended since 2013
Neutral Caution Recommended
19
EFFECTIVE SECURITY MUST NOT HAVE SECURITY SHORTCUTS
FORWARD SEGMENTS EXCEEDING
TCP CONTENT INSPECTION QUEUE
INTELLIGENT-MODE :ENABLE
HTTP CLIENT BODY EXTRACTION DEPTH 4000
20
VULNERABLE (BYPASSED MORE THAN 100 DIFFERENT
WAYS WITH VENDOR BEST PRACTICES CONFIGURATION)
GOOGLE “HTTP EVADER”
AND TEST FOR YOURSELF
http://tiny.cc/httpevader
21
EFFECTIVE SECURITY MUST NOT HAVE SECURITY SHORTCUTS
PROTECTED. PERIOD.
http://tiny.cc/httpevader
22
WHAT IS THE BEST SECURITY ?
GEN V SECURITY THAT IS :
effective
efficient
everywhere
23
24
25
26
27
CHECK POINT SOFTWARE BASED ARCHITECTURE MEANS
EVERYWHERE AGILE SECURITY
28
1040
9.4
Lowest
Application
Latency
4410
3.4
930
208.5
SOFTWARE BASED ARCHITECTURE MEANS
BETTER & FASTER USER EXPERIENCE
22031.7
2140
121
UDP Latency (64 Bytes) no inspection (μsec) Application Latency (10 KB) NGFW inspection (μsec)
Source: Shadow Peak INC.
29
160+TECHNOLOGY PARTNERS
CHECK POINT PROVIDES ITS CUSTOMERS
THE BEST SECURITY EVERYWHERE
WITH THE INDUSTRY’S LARGEST
SECURITY ECOSYSTEM
30
WHAT IS THE BEST SECURITY ?
GEN V SECURITY THAT IS :
effective
efficient
everywhere
31
OPERATIONAL EFFICIENCY
MAN HOURS REQUIRED FOR YEARLY MANAGEMENT OF 50 GATEWAYS PER SITE
“The Check Point management remains the de facto “GOLD STANDARD”
against which other consoles are measured” Gartner
1000
1500 1500
2000 2000
Source: Shadow Peak INC.
32
THE WHY - UNMATCHED UNIFIED ACCESS POLICY
ONECONSOLE.ONEUNIFIEDPOLICY.
33©2018 Check Point Software Technologies Ltd.
FIGHTING OBJECTIONS AND FUD
(Fear, Uncertainty & Doubt)
[Confidential] ONLY for designated groups and individuals​
34©2018 Check Point Software Technologies Ltd.
FIGHTING OBJECTIONS AND FUD
(Fear, Uncertainty & Doubt)
[Confidential] ONLY for designated groups and individuals​
35©2018 Check Point Software Technologies Ltd.
FIGHT OBJECTIONS AND FUD (Fear, Uncertainty & Doubt)
WITH FUD = FACTS, UNDERSTANDING AND DETAILS
[Confidential] ONLY for designated groups and individuals​
To be bigger
than your peer,
there is no
need to pull
him down.
Simply elevate
yourself!”
Maharash
36
37
THE PEOPLE
WHO WILL GET YOU THERE
1402R&D ENGINEERS
31% OF EMPLOYEES
1402
1225
787PALO ALTO
FORTINET
CHECK POINT 31% OF TOTAL
25% OF TOTAL
16% OF TOTAL
Source: SEC Data: Palo Alto Form 10-Q | Fortinet 10-K | Check Point 20-F
3838
THANK YOU
http://tiny.cc/genv

More Related Content

What's hot

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008tswong
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint e-Xpert Solutions SA
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Clouditalia Telecomunicazioni
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinetinternetbrasil
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Sylvain Martinez
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationNattira Panbun
 

What's hot (20)

Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Cyber Security Coverage heat map
Cyber Security Coverage heat map Cyber Security Coverage heat map
Cyber Security Coverage heat map
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Security architecture proposal template
Security architecture proposal templateSecurity architecture proposal template
Security architecture proposal template
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
Apresentação fortinet
Apresentação fortinetApresentação fortinet
Apresentação fortinet
 
How to expose shortcuts in competitive poc
How to expose shortcuts in competitive pocHow to expose shortcuts in competitive poc
How to expose shortcuts in competitive poc
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise PortfolioKaspersky Lab new Enterprise Portfolio
Kaspersky Lab new Enterprise Portfolio
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1Talk1 esc3 muscl-standards and regulation_v1_1
Talk1 esc3 muscl-standards and regulation_v1_1
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 

Similar to Moti Sagey CPX keynote _Are All security products created equal

Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
AusCERT 2016 - An Unlikely Romance: The Current State of Bug BountiesAusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
AusCERT 2016 - An Unlikely Romance: The Current State of Bug BountiesCasey Ellis
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...lior mazor
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldMark Nunnikhoven
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastDiana Frolova
 
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIESISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIESCasey Ellis
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayHussein Khazaal
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointMarcoTechnologies
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheetUsman Arif
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxlior mazor
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security SessionSplunk
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Cenzic
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryBlack Duck by Synopsys
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliveryTim Mackey
 
Proving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsAshley Zupkus
 

Similar to Moti Sagey CPX keynote _Are All security products created equal (20)

Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
AusCERT 2016 - An Unlikely Romance: The Current State of Bug BountiesAusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
AusCERT 2016 - An Unlikely Romance: The Current State of Bug Bounties
 
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
 
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud WorldSecurity Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
 
Why Check Point - Moti Sagey
Why Check Point - Moti SageyWhy Check Point - Moti Sagey
Why Check Point - Moti Sagey
 
комплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblastкомплексная защита от современных интернет угроз с помощью Check point sandblast
комплексная защита от современных интернет угроз с помощью Check point sandblast
 
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIESISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
ISSA CISO Summit 2017 - AN UNLIKELY ROMANCE THE CURRENT STATE OF BUG BOUNTIES
 
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC GatewayWebinar - Nuage Networks Integration with Check Point vSEC Gateway
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
 
Stay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check PointStay One Step Ahead of Cyber Threats - Check Point
Stay One Step Ahead of Cyber Threats - Check Point
 
Sophos
SophosSophos
Sophos
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptxSecure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session.conf Go Zurich 2022 - Security Session
.conf Go Zurich 2022 - Security Session
 
Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...Essentials of Web Application Security: what it is, why it matters and how to...
Essentials of Web Application Security: what it is, why it matters and how to...
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous deliverySecure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
 
Proving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEs
 

Recently uploaded

Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusSkylark Nobin
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024Jan Löffler
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteMavein
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Shubham Pant
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdfShreedeep Rayamajhi
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpressssuser166378
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSlesteraporado16
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsRoxana Stingu
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSedrianrheine
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfmchristianalwyn
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilitiesalihassaah1994
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxnaveenithkrishnan
 
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxjayshuklatrainer
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxnaveenithkrishnan
 

Recently uploaded (15)

Niche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus BonusNiche Domination Prodigy Review Plus Bonus
Niche Domination Prodigy Review Plus Bonus
 
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
WordPress by the numbers - Jan Loeffler, CTO WebPros, CloudFest 2024
 
Computer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a WebsiteComputer 10 Lesson 8: Building a Website
Computer 10 Lesson 8: Building a Website
 
Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024Check out the Free Landing Page Hosting in 2024
Check out the Free Landing Page Hosting in 2024
 
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdfIntroduction to ICANN and Fellowship program  by Shreedeep Rayamajhi.pdf
Introduction to ICANN and Fellowship program by Shreedeep Rayamajhi.pdf
 
Presentation2.pptx - JoyPress Wordpress
Presentation2.pptx -  JoyPress WordpressPresentation2.pptx -  JoyPress Wordpress
Presentation2.pptx - JoyPress Wordpress
 
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASSLESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
LESSON 10/ GROUP 10/ ST. THOMAS AQUINASS
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced HorizonsVision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
Vision Forward: Tracing Image Search SEO From Its Roots To AI-Enhanced Horizons
 
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDSTYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
TYPES AND DEFINITION OF ONLINE CRIMES AND HAZARDS
 
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdfLESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
LESSON 5 GROUP 10 ST. THOMAS AQUINAS.pdf
 
Zero-day Vulnerabilities
Zero-day VulnerabilitiesZero-day Vulnerabilities
Zero-day Vulnerabilities
 
Bio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptxBio Medical Waste Management Guideliness 2023 ppt.pptx
Bio Medical Waste Management Guideliness 2023 ppt.pptx
 
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptxA_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
A_Z-1_0_4T_00A-EN_U-Po_w_erPoint_06.pptx
 
world Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptxworld Tuberculosis day ppt 25-3-2024.pptx
world Tuberculosis day ppt 25-3-2024.pptx
 

Moti Sagey CPX keynote _Are All security products created equal

  • 1. 11 MOTI SAGEY | HEAD OF STRATEGIC MARKETING & INTELLIGENCE CREATED EQUAL ARE ALL SECURITY PRODUCTS ? [Protected] Distribution is subject to approval ​
  • 2. 2 FOR THE IMAGINATION OF MAN'S HEART IS EVIL FROM HIS YOUTH THE STATE OF CYBER SECURITY TODAY Mostly Gen I-III Deployed (AV, FW, IPS) Genesis 8:21 Gen I security - AV Gen II,III security - FW + IPS
  • 3. 3©2018 Check Point Software Technologies Ltd. GEN IV – THE ERA OF POINT SOLUTIONS
  • 4. 4 THE CHALLENGE EVERY VENDOR WILL TELL YOU THEY HAVE THE BEST SECURITY WHAT IS THE BEST SECURITY ? HOW DO WE TEST IT? IN GOD WE TRUST, ALL OTHERS MUST BRING DATA” “ W.H DEMING
  • 5. 5 WHAT IS THE BEST SECURITY ? GEN V SECURITY THAT IS : effective efficient everywhere
  • 6. 6 “EFFECTIVE SECURITY”, WHAT DOES IT MEAN? IT ALL STARTS WITH THE RIGHT FOCUS
  • 7. 7 TO KEEP YOUR BUSINESS PROTECTED 1402R&D ENGINEERS 31% OF EMPLOYEES 16% OF TOTAL 25% OF TOTAL 31% OF TOTALCHECK POINT FORTINET PALO ALTO 1402 1225 787 Source: SEC Data: Palo Alto Form 10-Q | Fortinet 10-K | Check Point 20-F
  • 8. 8 “EFFECTIVE SECURITY”, WHAT DOES IT MEAN? WITH THE RIGHT PHILOSOPHY: REAL-TIMEPREVENTION
  • 9. 9 HENRY FORD “IF I HAD ASKED PEOPLE WHAT THEY WANTED, THEY WOULD HAVE SAID FASTER HORSES” CHECK POINT REAL-TIME PREVENTION INNOVATIONS
  • 10. 10 CHECK POINT REAL-TIME PREVENTION INNOVATIONS “IF I HAD ASKED PEOPLE WHAT THEY WANTED, THEY WOULD HAVE SAID FASTER HORSES” “Check Point has gained ground from an innovation standpoint and can boast one of the most complete offerings in the network security market today. “Perhaps the most impressive element of Check Point’s malware analysis approach is the ability to capture an email attachment, analyze it, and render the content for the end user or security team while the malware is mitigated.
  • 11. 11 FIVE MINUTES NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  • 12. 12 1MB SIZE LIMIT NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  • 13. 13 DOES NOT BLOCK NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  • 14. 14 “WE CAN’T HOLD ON TO A FILE “ CISCO “DETECTION NOT BLOCKING/PREVENTION” FIREEYE NOT ALL VENDORS PROVIDE GEN V REAL-TIME PREVENTION
  • 15. 15 “EFFECTIVE SECURITY”, WHAT DOES IT MEAN? WITHANUNPARALLELEDSENSEOF URGENCY
  • 16. 16 TO MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED… 1.02 Mature SW Code Swift response to SW vulnerabilities 221.3 62 183.6 93 48.2 99 # Total of SW vulnerabilities(2016,2017) Average fix time (days) Source: vendors security advisories web pages & http://tiny.cc/urgency
  • 17. 17 AVERAGE RESPONSE TIME FOR TOP VULNERABILITIES(IPS) IN 2017 Source: vendors security advisories web pages & http://tiny.cc/urgency
  • 18. 18 EFFECTIVE SECURITY MUST HAVE 3RD PARTY PROVEN TRACK RECORD OF SECURITY EXCELLENCE Source: http://tiny.cc/nss_stats NSS Labs Network Security tests (FW/NGFW/IPS/NGIPS/DCIPS/BDS) * PAN NGFW solution have not been recommended since 2013 Neutral Caution Recommended
  • 19. 19 EFFECTIVE SECURITY MUST NOT HAVE SECURITY SHORTCUTS FORWARD SEGMENTS EXCEEDING TCP CONTENT INSPECTION QUEUE INTELLIGENT-MODE :ENABLE HTTP CLIENT BODY EXTRACTION DEPTH 4000
  • 20. 20 VULNERABLE (BYPASSED MORE THAN 100 DIFFERENT WAYS WITH VENDOR BEST PRACTICES CONFIGURATION) GOOGLE “HTTP EVADER” AND TEST FOR YOURSELF http://tiny.cc/httpevader
  • 21. 21 EFFECTIVE SECURITY MUST NOT HAVE SECURITY SHORTCUTS PROTECTED. PERIOD. http://tiny.cc/httpevader
  • 22. 22 WHAT IS THE BEST SECURITY ? GEN V SECURITY THAT IS : effective efficient everywhere
  • 23. 23
  • 24. 24
  • 25. 25
  • 26. 26
  • 27. 27 CHECK POINT SOFTWARE BASED ARCHITECTURE MEANS EVERYWHERE AGILE SECURITY
  • 28. 28 1040 9.4 Lowest Application Latency 4410 3.4 930 208.5 SOFTWARE BASED ARCHITECTURE MEANS BETTER & FASTER USER EXPERIENCE 22031.7 2140 121 UDP Latency (64 Bytes) no inspection (μsec) Application Latency (10 KB) NGFW inspection (μsec) Source: Shadow Peak INC.
  • 29. 29 160+TECHNOLOGY PARTNERS CHECK POINT PROVIDES ITS CUSTOMERS THE BEST SECURITY EVERYWHERE WITH THE INDUSTRY’S LARGEST SECURITY ECOSYSTEM
  • 30. 30 WHAT IS THE BEST SECURITY ? GEN V SECURITY THAT IS : effective efficient everywhere
  • 31. 31 OPERATIONAL EFFICIENCY MAN HOURS REQUIRED FOR YEARLY MANAGEMENT OF 50 GATEWAYS PER SITE “The Check Point management remains the de facto “GOLD STANDARD” against which other consoles are measured” Gartner 1000 1500 1500 2000 2000 Source: Shadow Peak INC.
  • 32. 32 THE WHY - UNMATCHED UNIFIED ACCESS POLICY ONECONSOLE.ONEUNIFIEDPOLICY.
  • 33. 33©2018 Check Point Software Technologies Ltd. FIGHTING OBJECTIONS AND FUD (Fear, Uncertainty & Doubt) [Confidential] ONLY for designated groups and individuals​
  • 34. 34©2018 Check Point Software Technologies Ltd. FIGHTING OBJECTIONS AND FUD (Fear, Uncertainty & Doubt) [Confidential] ONLY for designated groups and individuals​
  • 35. 35©2018 Check Point Software Technologies Ltd. FIGHT OBJECTIONS AND FUD (Fear, Uncertainty & Doubt) WITH FUD = FACTS, UNDERSTANDING AND DETAILS [Confidential] ONLY for designated groups and individuals​ To be bigger than your peer, there is no need to pull him down. Simply elevate yourself!” Maharash
  • 36. 36
  • 37. 37 THE PEOPLE WHO WILL GET YOU THERE 1402R&D ENGINEERS 31% OF EMPLOYEES 1402 1225 787PALO ALTO FORTINET CHECK POINT 31% OF TOTAL 25% OF TOTAL 16% OF TOTAL Source: SEC Data: Palo Alto Form 10-Q | Fortinet 10-K | Check Point 20-F