SlideShare a Scribd company logo
CHECK POINT CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
2©2018 Check Point Software Technologies Ltd.
*Gartner, 2016
OVER 70% OF ENTERPRISES
ADOPTED CLOUD
APPLICATIONS*
ARE WE SECURE?
3©2017 Check Point Software Technologies Ltd.
SaaS Applications are Hacked
4©2018 Check Point Software Technologies Ltd.
THE CASE OF
KAYE FINANCIALS
$2M Stolen
Kaye moved its
email to the
cloud
Kaye’s customers received
email invoices with fake
bank accounts
Emails were sent by hackers
who took over Kaye’s
accountant email account
Reported on July 2017 to Check Point IRT
©2018 Check Point Software Technologies Ltd. 5
Unauthorized access to an individual
or organization’s SaaS account for
malicious purposes.
Making headlines:
ACCOUNT TAKEOVER
Account takeover becomes common in the cloud:
- Cloud services are externally exposed
- Default SaaS security does not protect against them
6©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd.
Account Takeover
54%
Malware Delivery
35%
Mindless Data
Sharing
11%
Biggest Threat to SaaS Applications:
Account Takeover
Check Point Incident Response Data
Customers=250, Cloud breaches=55%, Check Point Q1-3-2017
7©2018 Check Point Software Technologies Ltd.
A C C OU N T TAKEOVER
MALWARE DELIVERY
ZER O - D AY TH R EATS
IS YOUR FOCUS IN THE RIGHT PLACE?
EXTEN SIVE TH R EAT PR EVEN TION , B LOC K IN G OF A C C OU N T TA K EOVER S
SAAS SECURITY - WHAT’S NEEDED?
8©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 8©2018 Check Point Software Technologies Ltd.
INTRODUCING
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
©2018 Check Point Software Technologies Ltd. 9
CLOUD SERVICE HELPS YOU
ELIMINATE REAL SAAS THREATS
10©2018 Check Point Software Technologies Ltd.
Authentication
CHECK POINT SECURITY STACK
Data Leak
Prevention
Reveal
Shadow IT
Zero-day Threats
Protection
Simplified
Management
Identity
Protection
Award-winning technologies
HOW IT WORKS:
Azure AD
11©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 11©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
ZERO-DAY
THREATS
PROTECTION
DATA
LEAKAGE
PREVENTION
SIMPLIFIED
MANAGEMENT
SHADOW IT
DISCOVERY
COMPREHENSIVE
THREAT
INTELLIGENCE
IDENTITY
PROTECTION
Prevent account
takeovers
12©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
THREAT PROTECTION
ZERO-DAY THREAT PROTECTION
• Prevent malware and zero-day threats from getting to SaaS users
• Block phishing emails for Office365 and Gmail
• Protect file sharing, messaging, and more
©2018 Check Point Software Technologies Ltd.
13©2018 Check Point Software Technologies Ltd.
ADVANCED THREAT PREVENTION
5TH GENERATION OF CYBER SECURITY
Threat Emulation
Blocks zero-day attacks
The only evasion resistant CPU-Level sandbox
Anti-Phishing for Email
Advanced protection of user emails
SANDBLAST SCORED 100% BREACH PREVENTION
Breach Prevention System Test 11/2017
Threat Extraction
Delivers safe files
Proactive prevention through file sanitation
14©2018 Check Point Software Technologies Ltd.
API: New File
Detected
Quarantine
file
THREAT PREVENTION
FOR SAAS APPS
HOW IT WORKS: Hacker
Shares / emails
malicious content
Scan
File
Found
malware
Threat Prevention
15©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
IDENTITY PROTECTION
IDENTITY PROTECTION
©2018 Check Point Software Technologies Ltd.
• ID-Guard technology identifies imposturous access
• Blocks unauthorized users and devices, on mobile and PCs
16©2018 Check Point Software Technologies Ltd.
Attempts to
access with
stolen
credentials
Hacker
Intelligence
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY PROTECTION
Agentless Mode
Identity
Provider
 Policy rules for: device type, OS, IP, location
 Centralized multi-factor authentication
 Machine learning engines validate user
logins and identify bad scenarios:
• Unusual SaaS app activities
• Different locations
• Different devices
 Status check-ups for: rules, permissions,
privileges, etc.
©2018 Check Point Software Technologies Ltd. 17
PREVENTING ACCOUNT TAKEOVER
3. Allow access
WITHOUT disturbing user workflow
1. Pair user to device
USERS: Continue to use username and password
HACKERS: Can’t break in with stolen credentials
2. Verify that user and
device are paired
Authentication interception
19©2018 Check Point Software Technologies Ltd.
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY PROTECTION
Accesses
app
Attempts
to access
with
Stolen
credentials
Hacker
Identifies DeviceEmployee
Identity
Provider
Identity
Provider
Identifies Device
Illegitimate Login
 Only agent-registered devices allowed
to access your SaaS app
 Frictionless UX without 2FA:
• CloudGuard SaaS prevents
phishing attacks and malware
that can bypass traditional 2FA
• If found, SaaS access is blocked
• Hassle free to users
 Visibility into detected threats for
admins and users
20©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
THREAT INTELLIGENCE
©2018 Check Point Software Technologies Ltd.
COMPREHENSIVE THREAT INTELLIGENCE
•Comprehensive security coverage across the enterprise
•Shared threat intelligence across network, cloud, and mobile devices
Translates threat intelligence data into
actionable security protections
Security updates in Real Time
Daily inputs from traffic across 150K
security gateways world wide
23©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SIMPLIFIED MANAGEMENT
SIMPLIFIED MANAGEMENT
•Deploy within minutes, scan instantly for previous threats
•Centralize configuration and monitoring through intuitive web console
©2018 Check Point Software Technologies Ltd.
24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 24©2018 Check Point Software Technologies Ltd.
DEPLOY WITHIN MINUTES
25©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
DATA LEAKAGE PREVENTION
•Block sharing of sensitive data and files
•Over 800 data types identified
CLOUDGUARD SAAS
DATA LEAKAGE PREVENTION
©2018 Check Point Software Technologies Ltd.
Shared
documents
Email Chat
26©2018 Check Point Software Technologies Ltd.
API: New File
Detected
Quarantine
file
DATA LEAKAGE
PREVENTION FOR
SAAS APPS
HOW IT WORKS: Shares sensitive content
Scan
File
Found a
sensitive
financial report
Employee
Data Leak
Prevention
27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SHADOW IT DISCOVERY
©2018 Check Point Software Technologies Ltd.
SHADOW IT DISCOVERY
•Easy discovery of shadow SaaS apps
•Granular, comprehensive shadow IT discovery with Check Point security gateways
28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 28©2018 Check Point Software Technologies Ltd.
COMPLEMENTING, GRANULAR SHADOW IT CONTROL
WITH CHCK POINT SECURITY GATEWAYS
Over 7859 applications and
in-app activities
Highly granular policy with content, user-
awareness and engagement policies
29©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd.
EXECUTIVE REPORTING
WITH CHECK POINT SMARTEVENT
30©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd.
CLOUDGUARD SAAS
SUPERIOR THREAT PREVENTION
FOR SAAS APPLICATIONS
ZERO-DAY
THREATS
PROTECTION
DATA
LEAKAGE
PREVENTION
SIMPLIFIED
MANAGEMENT
SHADOW IT
DISCOVERY
COMPREHENSIVE
THREAT
INTELLIGENCE
IDENTITY
PROTECTION
Prevent account
takeovers
35©2018 Check Point Software Technologies Ltd.
SAAS ATTACKS
CAN BE PREVENTED
PREVENTS ACCOUNT
TAKEOVER
BLOCKS ZERO-DAY
ADVANCED THREATS
END-TO-END
SAAS SECURITY COVERAGE
36©2018 Check Point Software Technologies Ltd.
THANK YOU

More Related Content

2018 06 Presentation Cloudguard SaaS de Checkpoint

  • 1. CHECK POINT CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS
  • 2. 2©2018 Check Point Software Technologies Ltd. *Gartner, 2016 OVER 70% OF ENTERPRISES ADOPTED CLOUD APPLICATIONS* ARE WE SECURE?
  • 3. 3©2017 Check Point Software Technologies Ltd. SaaS Applications are Hacked
  • 4. 4©2018 Check Point Software Technologies Ltd. THE CASE OF KAYE FINANCIALS $2M Stolen Kaye moved its email to the cloud Kaye’s customers received email invoices with fake bank accounts Emails were sent by hackers who took over Kaye’s accountant email account Reported on July 2017 to Check Point IRT
  • 5. ©2018 Check Point Software Technologies Ltd. 5 Unauthorized access to an individual or organization’s SaaS account for malicious purposes. Making headlines: ACCOUNT TAKEOVER Account takeover becomes common in the cloud: - Cloud services are externally exposed - Default SaaS security does not protect against them
  • 6. 6©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 6©2018 Check Point Software Technologies Ltd. Account Takeover 54% Malware Delivery 35% Mindless Data Sharing 11% Biggest Threat to SaaS Applications: Account Takeover Check Point Incident Response Data Customers=250, Cloud breaches=55%, Check Point Q1-3-2017
  • 7. 7©2018 Check Point Software Technologies Ltd. A C C OU N T TAKEOVER MALWARE DELIVERY ZER O - D AY TH R EATS IS YOUR FOCUS IN THE RIGHT PLACE? EXTEN SIVE TH R EAT PR EVEN TION , B LOC K IN G OF A C C OU N T TA K EOVER S SAAS SECURITY - WHAT’S NEEDED?
  • 8. 8©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 8©2018 Check Point Software Technologies Ltd. INTRODUCING CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS
  • 9. ©2018 Check Point Software Technologies Ltd. 9 CLOUD SERVICE HELPS YOU ELIMINATE REAL SAAS THREATS
  • 10. 10©2018 Check Point Software Technologies Ltd. Authentication CHECK POINT SECURITY STACK Data Leak Prevention Reveal Shadow IT Zero-day Threats Protection Simplified Management Identity Protection Award-winning technologies HOW IT WORKS: Azure AD
  • 11. 11©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 11©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS ZERO-DAY THREATS PROTECTION DATA LEAKAGE PREVENTION SIMPLIFIED MANAGEMENT SHADOW IT DISCOVERY COMPREHENSIVE THREAT INTELLIGENCE IDENTITY PROTECTION Prevent account takeovers
  • 12. 12©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS THREAT PROTECTION ZERO-DAY THREAT PROTECTION • Prevent malware and zero-day threats from getting to SaaS users • Block phishing emails for Office365 and Gmail • Protect file sharing, messaging, and more ©2018 Check Point Software Technologies Ltd.
  • 13. 13©2018 Check Point Software Technologies Ltd. ADVANCED THREAT PREVENTION 5TH GENERATION OF CYBER SECURITY Threat Emulation Blocks zero-day attacks The only evasion resistant CPU-Level sandbox Anti-Phishing for Email Advanced protection of user emails SANDBLAST SCORED 100% BREACH PREVENTION Breach Prevention System Test 11/2017 Threat Extraction Delivers safe files Proactive prevention through file sanitation
  • 14. 14©2018 Check Point Software Technologies Ltd. API: New File Detected Quarantine file THREAT PREVENTION FOR SAAS APPS HOW IT WORKS: Hacker Shares / emails malicious content Scan File Found malware Threat Prevention
  • 15. 15©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS IDENTITY PROTECTION IDENTITY PROTECTION ©2018 Check Point Software Technologies Ltd. • ID-Guard technology identifies imposturous access • Blocks unauthorized users and devices, on mobile and PCs
  • 16. 16©2018 Check Point Software Technologies Ltd. Attempts to access with stolen credentials Hacker Intelligence PREVENT ACCOUNT TAKEOVER WITH CLOUDGUARD SAAS IDENTITY PROTECTION Agentless Mode Identity Provider  Policy rules for: device type, OS, IP, location  Centralized multi-factor authentication  Machine learning engines validate user logins and identify bad scenarios: • Unusual SaaS app activities • Different locations • Different devices  Status check-ups for: rules, permissions, privileges, etc.
  • 17. ©2018 Check Point Software Technologies Ltd. 17 PREVENTING ACCOUNT TAKEOVER 3. Allow access WITHOUT disturbing user workflow 1. Pair user to device USERS: Continue to use username and password HACKERS: Can’t break in with stolen credentials 2. Verify that user and device are paired Authentication interception
  • 18. 19©2018 Check Point Software Technologies Ltd. PREVENT ACCOUNT TAKEOVER WITH CLOUDGUARD SAAS IDENTITY PROTECTION Accesses app Attempts to access with Stolen credentials Hacker Identifies DeviceEmployee Identity Provider Identity Provider Identifies Device Illegitimate Login  Only agent-registered devices allowed to access your SaaS app  Frictionless UX without 2FA: • CloudGuard SaaS prevents phishing attacks and malware that can bypass traditional 2FA • If found, SaaS access is blocked • Hassle free to users  Visibility into detected threats for admins and users
  • 19. 20©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS THREAT INTELLIGENCE ©2018 Check Point Software Technologies Ltd. COMPREHENSIVE THREAT INTELLIGENCE •Comprehensive security coverage across the enterprise •Shared threat intelligence across network, cloud, and mobile devices
  • 20. Translates threat intelligence data into actionable security protections Security updates in Real Time Daily inputs from traffic across 150K security gateways world wide
  • 21. 23©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SIMPLIFIED MANAGEMENT SIMPLIFIED MANAGEMENT •Deploy within minutes, scan instantly for previous threats •Centralize configuration and monitoring through intuitive web console ©2018 Check Point Software Technologies Ltd.
  • 22. 24©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 24©2018 Check Point Software Technologies Ltd. DEPLOY WITHIN MINUTES
  • 23. 25©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. DATA LEAKAGE PREVENTION •Block sharing of sensitive data and files •Over 800 data types identified CLOUDGUARD SAAS DATA LEAKAGE PREVENTION ©2018 Check Point Software Technologies Ltd. Shared documents Email Chat
  • 24. 26©2018 Check Point Software Technologies Ltd. API: New File Detected Quarantine file DATA LEAKAGE PREVENTION FOR SAAS APPS HOW IT WORKS: Shares sensitive content Scan File Found a sensitive financial report Employee Data Leak Prevention
  • 25. 27©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SHADOW IT DISCOVERY ©2018 Check Point Software Technologies Ltd. SHADOW IT DISCOVERY •Easy discovery of shadow SaaS apps •Granular, comprehensive shadow IT discovery with Check Point security gateways
  • 26. 28©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 28©2018 Check Point Software Technologies Ltd. COMPLEMENTING, GRANULAR SHADOW IT CONTROL WITH CHCK POINT SECURITY GATEWAYS Over 7859 applications and in-app activities Highly granular policy with content, user- awareness and engagement policies
  • 27. 29©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 29©2018 Check Point Software Technologies Ltd. EXECUTIVE REPORTING WITH CHECK POINT SMARTEVENT
  • 28. 30©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd. CLOUDGUARD SAAS SUPERIOR THREAT PREVENTION FOR SAAS APPLICATIONS ZERO-DAY THREATS PROTECTION DATA LEAKAGE PREVENTION SIMPLIFIED MANAGEMENT SHADOW IT DISCOVERY COMPREHENSIVE THREAT INTELLIGENCE IDENTITY PROTECTION Prevent account takeovers
  • 29. 35©2018 Check Point Software Technologies Ltd. SAAS ATTACKS CAN BE PREVENTED PREVENTS ACCOUNT TAKEOVER BLOCKS ZERO-DAY ADVANCED THREATS END-TO-END SAAS SECURITY COVERAGE
  • 30. 36©2018 Check Point Software Technologies Ltd. THANK YOU