Document 6504533
Transcription
Document 6504533
How To Sell Check Point Advanced Comprehensive Security Solutions Solution Overview Mobile Networks Check Point provides an extensive portfolio of network security, data security, communications security, multimedia security, and security management solutions. With Check Point Open Performance Architecture, you achieve data center performance even when applying strict security policies for applications such as multimedia, VoIP, and instant messaging. All in a flexible architecture that keeps your network safe by easily adapting as new security issues emerge. Branch Offices Check Point Full Disk Encryption Port and Media Encryption Threats ` ` Check Point VPN-1 UTM Edge (Wireless) Threats Check Point VPN-1 UTM Power SSL Network Extender IP Network Sensors IP-PBX IP Services IP-PBX Check Point IPS-1 Ch Check Point IPS-1 Check Point SmartDefense Messaging IP Check Point Management Servers Provider -1 IPS-1 SmartCenter SmartView User Authority Endpoint Security Data Security Security Management VPN-1 Integrated Appliance Solution Check Point InterSpect Check Point Full Disk Encryption ■■ Check Point Connectra Check Point Endpoint Security Regional Offices Main Office Questions to Ask What is the Check Point Advantage? Check Point is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point’s PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Customers include 100% of Fortune 100 companies. ■■ What is the Business Advantage? Through its NGX platform, Check Point delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications. Check Point VPN-1 UTM y Total Security Sensors Network Security ■■ 234836 Check Point VPN-1 UTM Edge Server Things to Know Threats Check Point SecureClient Mobile Authentication Product Range Do you have firewalls that can protect VoIP/SIP communications and multimedia traffic? ■■ Do you engage in ecommerce that require a VPN or SSL? ■■ Is intrusion a concern and how are you dealing with it? ■■ Do you have remote offices that connect across the internet? ■■ Do you use wireless connections, encryption products? ■■ Are you using any products to protect your desktops, servers, or mobile devices? ■■ How are your security devices managed? ■■ How do you deal with the reports from these devices? ■■ How do you enforce user & password policies? ■■ Do you use two-factor authentication protection for remote and local log-on? ■■ How are you enforcing Web and IM use and content? ■■ How are you protecting against viruses and spam? ■■ How do you protect your internal and mobile corporate information? Check Point Mobile Encryption Check Point Endpoint Security UPS Servers Check Point Web Intelligence Check Point Web Intelligence Application Web Data Messaging Servers UPS Benefits Performance The Check Point Open Performance Architecture combines with general purpose processors to provide complete security inspection that is far faster than ASIC-based systems. ■■ VoIP/SIP Communications Security Check Point delivers intelligent VoIP security that keeps the telephone system safe without the need for reorganizing your whole security policy. ■■ Totally Integrated Endpoint Security Provides a single agent for total endpoint security that combines the highest-rated firewall, network access control (NAC), program control, antivirus, anti spyware, data security and remote access. ■■ Simplified Security Solutions Blends the simplicity of a UTM appliance with the proven security technologies that secure the world’s most demanding networks. ■■ Unified Security Management Check Point security management solutions are designed as an interoperable system based on a core unified security architecture. This enables organizations to centrally control security policy across multiple layers of the infrastructure. ■■ Complete Data Protection Secures data on all common platforms and meets strict compliance requirements related to privacy laws and regulations. Also prevents unauthorized copying of sensitive data. ■■ Target Markets Enterprise Remote Access From client VPN access to clientless VPN access for business partners and mobile employees, Check Point delivers the most comprehensive remote access solutions to meet the needs of today’s distributed business. ■■ VoIP Deployments Check Point security solutions are designed to ensure VoIP can be deployed efficiently and securely. By providing pure security solutions, Check Point is better able to support multi-vendor environments with support for not just the widest variety of VoIP protocols but VoIP vendors. ■■ Retail and Ecommerce Check Point solutions are comprehensive and integrated, serving as a solid base for PCI compliance while also supporting requirements common to other security regulations. ■■ Healthcare Check Point helps healthcare providers to monitor its avalanche of data logs, to conform to regulatory mandates, and to secure and protect its vital patient information with the highest level of data security through strong full-disk encryption and robust access control. ■■ Education Provides educational institutions with a scalable security architecture that can provide comprehensive security to protect against Internet attacks, as well as centralized management to ease the burden of defining and distributing different elements of the security policy to remote students and campus sites. ■■ securitypoint.westcon.com How To Sell Check Point Advanced Comprehensive Security Solutions Product Overview Network Security Firewall/VPN Provides organizations with the world’s most proven solution, used by 100% of the Fortune 100. Enables organizations to protect the entire network infrastructure and information with a unified security architecture that simplifies management and ensures consistent, up-to-date security everywhere. ■■ UTM (Unified Threat Management) ❏❏ VPN-1 Power VSX Virtualized security gateway that allows managed service providers and enterprises with virtualized networks to create up to 250 virtual security systems-including firewall, VPN, and intrusion prevention-on a single hardware platform. ❏❏ VPN-1 MASS (Multi-Access Security Solution) Delivers the foundation of secure fixed/mobile convergence (FMC) for carriers. Supports both 3G Wireless Interworking (3G I-WLAN) and Unlicensed Mobile Access (UMA, also known as Generic Access Network) as well as traditional remote access VPNs. Scales to provide remote access for up to 100,000 secure voice channels, and massive amounts of data connections. ❏❏ FireWall-1 GX Delivers Check Point’s market-leading security to GPRS— (2.5G) and UMTS— (3G) enabled wireless networks. With FireWall-1 GX, wireless network operators can offer seamless roaming to their data customers without exposing their network to potential security threats. ❏❏ VPN-1 Power These security gateways provide an active defense that enables you to secure your most demanding sites – such as core networks or data centers. Adapts as new applications are introduced and new threats appear. ❏❏ VPN-1 UTM Consolidates proven security functions including firewall, intrusion prevention, antivirus, antispyware, Web application firewall, and both IPSec and SSL VPN, within a single integrated solution. ❏❏ VPN-1 UTM Power These security gateways combine the accelerated security found in the VPN-1 Power product line with the simplicity of the next generation UTM features found in VPN-1 UTM. The result is a comprehensive solution with firewall, VPN, intrusion prevention, anti virus, Web filtering. ❏❏ VPN-1® Power™ Multi-core Provides integrated application security at multi-gigabit speeds. Providing the same integrated firewall, VPN, and intrusion prevention found in VPN-1 Power, VPN-1 Power Multi-core builds on the latest multi-core technologies available in servers and appliances to accelerate SmartDefense™ intrusion prevention. ❏❏ Web Intelligence Provides complete protection for the entire Web environment. Supported by VPN-1 UTM, VPN-1 Power, UTM-1, and Connectra, it provides a multi-layer defense for the network, operating systems, Web servers, and backend systems it protects. ■■ Remote Access From client VPN access to clientless VPN access, Check Point delivers the most comprehensive Remote Access Solutions to connect a diverse mix of remote users with the strongest safeguards and unified management to maximize security effectiveness. ❏❏ Connectra Complete Web Security Gateway that provides SSL VPN access and comprehensive endpoint and integrated intrusion prevention security in a single, unified remote access solution. ❏❏ SSL Network Extender Browser plug-in that provides SSL VPN-based clientless remote access, while delivering full network connectivity for any IP-based application. ❏❏ SecureClient Mobile Secure, uninterrupted remote access for Windows mobile devices ■■ Intrusion Detection and Prevention Provides precise, real-time attack mitigation, granular forensic analysis and flexible deployment options. Delivered as both a dedicated IPS appliance and intrusion prevention that is integrated into Check Point security gateways. ❏❏ IPS-1 Delivers mission critical protection with unmatched management, granular forensic analysis and flexibility ❏❏ InterSpect Internal security gateway that combines intrusion prevention features with network access control ■■ Endpoint Security Unique product in that it includes both data security for preventing data loss and theft and a VPN client for secure remote access communications. Single management console. Unified with the Check Point unified security architecture, enabling monitoring, analysis, and reporting of endpoint security logs and events from SmartCenter™, Provider-1®, and Eventia® management systems. Check Point Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control (NAC), program control, antivirus, anti-spyware, data security, and remote access. Data Security Based on market-leading Pointsec technologies, provides comprehensive data protection for laptops, PCs, removable media and mobile devices. ■■ Mobile Encryption Completely secures enterprise data stored on smartphones and PDAs running Symbian, Pocket PC, Windows Mobile Smartphone and Palm operating systems. Device and memory card data are encrypted automatically without user intervention. ■■ Full Disk Encryption Proven in enterprises and government agencies around the world. Delivers unparalleled data security for laptop and desktop PCs. A winning combination of robust data encryption, access control and centralized fully–enforceable installation and management. ■■ Media Encryption & Port Management Prevents unauthorized copying of sensitive data by combining port and device management, content filtering and centralized auditing with robust media encryption. Plugs potential leak points and logs data movement to and from any plug and play devices. Security Management Designed as an interoperable system based on a core unified security architecture, enables organizations to centrally control security policy across multiple layers of the infrastructure. ■■ SmartCenter Based on Check Point’s unified security architecture. Enables organizations to perform all aspects of security management via a single, unified console. ■■ Provider-1 The only security management solution that addresses the unique requirements of large multi-policy environments. For service providers, it consolidates and centralizes the management of security policies for thousands of customers. For enterprise network operations centers, it simplifies a complex security policy by segmenting it into manageable sub-policies for geographic, functional, or other groupings. ■■ Eventia Suite Security information and event management (SIEM) solution for enterprises looking to efficiently manage large volumes of data from disparate sources. Automates and centralizes security log data analysis and reporting. ■■ Security Management Portal (SMP) Central management and service provisioning platform ideal for Managed Security Service Providers (MSSP) targeting SMBs and vertical markets. Support the management of up to tens of thousands of Check Point Safe@Office gateways. Can easily be integrated with existing billing, CRM and other back-office systems.. ■■ SMP On-Demand Fully-hosted central management and service provisioning platform ideal for Managed Security Service Providers (MSSP) targeting SMBs and vertical markets. Delivered as a “Software-as-a-Service” (SaaS), supports the management of up to thousands of Check Point Safe@ Office gateways. Like SMP, it can easily be integrated with existing back office systems to support existing business processes. ■■ User Authority Improves application security and simplifies administration by providing a unified, secure communication layer for authenticating users to eBusiness applications. VPN-1 Integrated Appliance Solution Check Point VPN-1 Integrated Appliance Solution is for organizations that need to combine the proven security of Check Point Software on high performance platform with a single point of contact for fulfillment and support. It enables organizations to quickly deploy VPN-1® Power™, VPN-1 UTM™, VPN-1 Power VSX™, or Check Point management infrastructure products on a reliable, performance-oriented platform backed by Check Point security and support. Solutions include 3 years software subscription and 3 years HW Warranty. Doc.Ref:Mar08v1 securitypoint.westcon.com