SlideShare a Scribd company logo
©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd.
SANDBLAST THREAT
EMULATION
CUSTOMER SUCCESS 2015
©2015 Check Point Software Technologies Ltd.
SUCCESS CASES
01
©2015 Check Point Software Technologies Ltd. 3
Business Challenges
• Safeguard sensitive company data from new,
unknown attacks
• Centralize management, improving efficiency
and agility
• Protect all sites against a variety of threats
with a more comprehensive security platform
Customer Background
• Major US-based Real Estate Investment Trust
• One of largest owners, managers and developers
of first-class office space in the US
• Approx. 1000 employees
 Virtual sandbox emulation protects against
new or hidden threats in attachments and files
 Service-based protection reduces operational
overhead with affordable monthly price
 ThreatCloud™ enhances real-time security
Solution
“The big advantage we saw with Check Point
Threat Emulation was that it was integrated
into the existing platform. It didn’t require
additional hardware or people to tune it. It was
a full service, cloud-based offering.”
-- Rich Peirce, Director, Infrastructure Services,
Boston Properties
Threat Emulation Cloud Service
Success Story
Download the full success story here:
http://www.checkpoint.com/testimonial/boston-
properties/index.html
©2015 Check Point Software Technologies Ltd. 4
Business Challenges
• As a financial firm with confidential data,
faces high exposure of hacking and phishing
attacks.
• With time-sensitive reporting and deal
closure at any time of day, systems must be
available 24/7.
• Implement multi-layered security approach to
provide most secure IT environment for
employees
Customer Background
• European private equity & venture capital
management firm
• Manages approx. EUR1.8 B in assets with
60 companies in its portfolio
• Based in Belgium with offices in Germany,
France and The Netherlands
 Protects against zero-day and targeted attacks
 10,000 email file attachments are uploaded to
Threat Emulation Cloud Service every month
 ThreatCloud™ enhances real-time security
Solution
“We use Threat Emulation for every incoming and
outgoing email. Email is our lifeline. That means, if
we had a breach, the complete Gimv environment
would come to a technical stand still.”
-- Kristof Poppe, IT Manager, Gimv
Threat Emulation Cloud Service
Success Story
Watch Video Testimonial from Gimv IT Manager Kristof Poppe
https://www.youtube.com/watch?v=hv1P0xVZ61I
©2015 Check Point Software Technologies Ltd. 5
Major Medical Laboratory
Testing Firm
Business Challenges
• Struck with zero day variants of Crypto Locker
• Anti-Bot was blocking post infection but
incidents were very concerning
• Better protection from unknown threats
• Need to leverage existing infrastructure
Threat Emulation Cloud Service
Success Story
Customer Background
• State-of-the-art testing services provider
• Serves healthcare industry 24 hours/day,
365 days/year
 Better performance over FireEye
 Layered approach to Threat Prevention
 Active protection vs Detection Only
 Integrates into existing infrastructure
Solution
“Threat Emulation block times are
phenomenal… typically 2 minutes or less.
We never realized how exposed our users
are to unknown threats.”
-- Network Services Supervisor
©2015 Check Point Software Technologies Ltd.
WHAT CUSTOMERS
ARE SAYING
02
©2015 Check Point Software Technologies Ltd. 7
Our Check Point Threat Emulation solution gives us immediate
visibility and insight into threats.
If an attack takes place, I can trace it down, determine its origin
and view the traffic of all the network elements it tried to reach
before it was discovered.
The discovery work is easy because we have access to all the
logging information we need. We don’t have to guess.
Customer Quote
− Rich Peirce,
Director, Infrastructure Services
Boston Properties
©2015 Check Point Software Technologies Ltd. 8
Our old set of firewalls had reached its limits.
Now with the Threat Emulation we can go one step further in
preventing malicious attachments entering our mail systems.
With this solution we’ve increased the stability and uptime of our
systems, which indirectly increases productivity for our
employees, which are most of the time nomadic knowledge
workers.
Customer Quote
− Kristof Poppe
IT Manager
Gimv
©2015 Check Point Software Technologies Ltd. 9
Check Point’s Threat Emulation blade is a highly focused,
extremely actionable threat prevention tool that reliably detects
and blocks undiscovered attacks on our network.
Not only has Threat Emulation been a tremendous benefit in
further fortifying our multi-layered security solution but also in
streamlining our IT staff’s limited time and attention on critical new
and unknown malware issues.
Customer Quote
− Firewall and DMZ Services Manager
Leading Multinational Pharmaceutical Firm
©2015 Check Point Software Technologies Ltd. 10
Threat Emulation block times are phenomenal… typically two
minutes or less. We never realized how exposed our users are to
unknown threats.
Customer Quote
- Leading US-based Medical Laboratory Testing Firm
©2015 Check Point Software Technologies Ltd.
CUSTOMER VIDEO
03
©2015 Check Point Software Technologies Ltd. 12
Customer Success Video
Gimv, a leading European private equity and venture capital
investment company, leverages Check Point ThreatCloud
Emulation technology to prevent against zero day attacks.
©2015 Check Point Software Technologies Ltd. 13©2015 Check Point Software Technologies Ltd.
THANK YOU

More Related Content

Check point sandblast threat-emulation-customer-success-presentation

  • 1. ©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. SANDBLAST THREAT EMULATION CUSTOMER SUCCESS 2015
  • 2. ©2015 Check Point Software Technologies Ltd. SUCCESS CASES 01
  • 3. ©2015 Check Point Software Technologies Ltd. 3 Business Challenges • Safeguard sensitive company data from new, unknown attacks • Centralize management, improving efficiency and agility • Protect all sites against a variety of threats with a more comprehensive security platform Customer Background • Major US-based Real Estate Investment Trust • One of largest owners, managers and developers of first-class office space in the US • Approx. 1000 employees  Virtual sandbox emulation protects against new or hidden threats in attachments and files  Service-based protection reduces operational overhead with affordable monthly price  ThreatCloud™ enhances real-time security Solution “The big advantage we saw with Check Point Threat Emulation was that it was integrated into the existing platform. It didn’t require additional hardware or people to tune it. It was a full service, cloud-based offering.” -- Rich Peirce, Director, Infrastructure Services, Boston Properties Threat Emulation Cloud Service Success Story Download the full success story here: http://www.checkpoint.com/testimonial/boston- properties/index.html
  • 4. ©2015 Check Point Software Technologies Ltd. 4 Business Challenges • As a financial firm with confidential data, faces high exposure of hacking and phishing attacks. • With time-sensitive reporting and deal closure at any time of day, systems must be available 24/7. • Implement multi-layered security approach to provide most secure IT environment for employees Customer Background • European private equity & venture capital management firm • Manages approx. EUR1.8 B in assets with 60 companies in its portfolio • Based in Belgium with offices in Germany, France and The Netherlands  Protects against zero-day and targeted attacks  10,000 email file attachments are uploaded to Threat Emulation Cloud Service every month  ThreatCloud™ enhances real-time security Solution “We use Threat Emulation for every incoming and outgoing email. Email is our lifeline. That means, if we had a breach, the complete Gimv environment would come to a technical stand still.” -- Kristof Poppe, IT Manager, Gimv Threat Emulation Cloud Service Success Story Watch Video Testimonial from Gimv IT Manager Kristof Poppe https://www.youtube.com/watch?v=hv1P0xVZ61I
  • 5. ©2015 Check Point Software Technologies Ltd. 5 Major Medical Laboratory Testing Firm Business Challenges • Struck with zero day variants of Crypto Locker • Anti-Bot was blocking post infection but incidents were very concerning • Better protection from unknown threats • Need to leverage existing infrastructure Threat Emulation Cloud Service Success Story Customer Background • State-of-the-art testing services provider • Serves healthcare industry 24 hours/day, 365 days/year  Better performance over FireEye  Layered approach to Threat Prevention  Active protection vs Detection Only  Integrates into existing infrastructure Solution “Threat Emulation block times are phenomenal… typically 2 minutes or less. We never realized how exposed our users are to unknown threats.” -- Network Services Supervisor
  • 6. ©2015 Check Point Software Technologies Ltd. WHAT CUSTOMERS ARE SAYING 02
  • 7. ©2015 Check Point Software Technologies Ltd. 7 Our Check Point Threat Emulation solution gives us immediate visibility and insight into threats. If an attack takes place, I can trace it down, determine its origin and view the traffic of all the network elements it tried to reach before it was discovered. The discovery work is easy because we have access to all the logging information we need. We don’t have to guess. Customer Quote − Rich Peirce, Director, Infrastructure Services Boston Properties
  • 8. ©2015 Check Point Software Technologies Ltd. 8 Our old set of firewalls had reached its limits. Now with the Threat Emulation we can go one step further in preventing malicious attachments entering our mail systems. With this solution we’ve increased the stability and uptime of our systems, which indirectly increases productivity for our employees, which are most of the time nomadic knowledge workers. Customer Quote − Kristof Poppe IT Manager Gimv
  • 9. ©2015 Check Point Software Technologies Ltd. 9 Check Point’s Threat Emulation blade is a highly focused, extremely actionable threat prevention tool that reliably detects and blocks undiscovered attacks on our network. Not only has Threat Emulation been a tremendous benefit in further fortifying our multi-layered security solution but also in streamlining our IT staff’s limited time and attention on critical new and unknown malware issues. Customer Quote − Firewall and DMZ Services Manager Leading Multinational Pharmaceutical Firm
  • 10. ©2015 Check Point Software Technologies Ltd. 10 Threat Emulation block times are phenomenal… typically two minutes or less. We never realized how exposed our users are to unknown threats. Customer Quote - Leading US-based Medical Laboratory Testing Firm
  • 11. ©2015 Check Point Software Technologies Ltd. CUSTOMER VIDEO 03
  • 12. ©2015 Check Point Software Technologies Ltd. 12 Customer Success Video Gimv, a leading European private equity and venture capital investment company, leverages Check Point ThreatCloud Emulation technology to prevent against zero day attacks.
  • 13. ©2015 Check Point Software Technologies Ltd. 13©2015 Check Point Software Technologies Ltd. THANK YOU

Editor's Notes

  1. Instructions: Add your quotation to this slide, then adjust the location of the gray quotation marks at the beginning and end of the sentence.
  2. Instructions: Add your quotation to this slide, then adjust the location of the gray quotation marks at the beginning and end of the sentence.
  3. Instructions: Add your quotation to this slide, then adjust the location of the gray quotation marks at the beginning and end of the sentence.
  4. Instructions: Add your quotation to this slide, then adjust the location of the gray quotation marks at the beginning and end of the sentence.
  5. Instructions: Add your quotation to this slide, then adjust the location of the gray quotation marks at the beginning and end of the sentence.