SlideShare a Scribd company logo
1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd.
Advanced Threat Prevention Security for Public
and Hybrid Clouds
CHECK POINT VSEC: SECURE YOUR AZURE
WORKLOADS
May 4, 2017
2©2017 Check Point Software Technologies Ltd.
Corey Roberts
Director of Cloud Services
Daymark Solutions
Rachel Yehezkel
Technical Evangelist
Microsoft Azure
Krish Subramanian
Product Marketing Manager
Check Point Software Technologies
TODAY’S SPEAKERS
3©2017 Check Point Software Technologies Ltd.
MICROSOFT AZURE OVERVIEW
4©2017 Check Point Software Technologies Ltd.
Openness and flexibility
Data and intelligence
Trust
Application innovation

Recommended for you

Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...

This document discusses how Check Point vSEC and VMware NSX can be used together to secure software-defined datacenters. The key points are: 1. Check Point vSEC can be automatically deployed on each ESXi host via NSX to provide security visibility and control for east-west traffic inside the datacenter. 2. NSX micro-segmentation capabilities and Check Point security policies allow fine-grained security control between virtual machines segmented into different security groups. 3. The integration provides consistent security for both north-south and east-west traffic inside software-defined datacenters through automation of virtual network and security provisioning.

Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement

Check Point plays a critical role in securing the digital revolution by delivering the most advanced cyber security through prevention and architecture. Their security solutions prevent unknown malware in real time across physical and virtual networks, data centers, cloud, mobile, endpoint and IoT devices. Check Point excels in providing a single, unified architecture that simplifies security operations while keeping organizations one step ahead through prevention-focused solutions.

2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final

In today’s complex and dynamic environment with growing digital business demands, IT often struggles to gain adequate visibility and control, and to ensure compliance with security policies and regulatory guidelines. Effective security policy management that accommodates the dynamic nature of today’s organizations is a key challenge for many IT departments.

algosec security management suitealgosec fireflowalgosec firewall analyzer
5©2017 Check Point Software Technologies Ltd.
38Azure regions
NEWLY ANNOUNCED:
France: France Central and France South
Korea: Korea Central and Korea South
DoD East and Central
Achieve global scale, in local regions
Trust
6©2017 Check Point Software Technologies Ltd.
Platform Services
Infrastructure Services
Web
Apps
Mobile
Apps
API
Apps
Notification
Hubs
Hybrid
Cloud
Backup
StorSimple
Azure Site
Recovery
Import/Export
SQL
Database DocumentDB
Redis
Cache
Azure
Search
Storage
Tables
SQL Data
Warehouse
Azure AD
Health Monitoring
AD Privileged
Identity
Management
Operational
Analytics
Cloud
Services
Batch
RemoteApp
Service
Fabric
Visual Studio
Application
Insights
VS Team Services
Domain Services
HDInsight Machine
Learning Stream Analytics
Data
Factory
Event
Hubs
Data Lake
Analytics Service
IoT Hub
Data
Catalog
Security &
Management
Azure Active
Directory
Multi-Factor
Authentication
Automation
Portal
Key Vault
Store/
Marketplace
VM Image Gallery
& VM Depot
Azure AD
B2C
Scheduler
Xamarin
HockeyApp
Power BI
Embedded
SQL Server
Stretch Database
Mobile
Engagement
Functions
Cognitive Services Bot Framework Cortana
Security Center
Container
Service
VM
Scale Sets
Data Lake Store
BizTalk
Services
Service Bus
Logic
Apps
API
Management
Content
Delivery
Network
Media
Services
Media
Analytics
7©2017 Check Point Software Technologies Ltd.
Apps and Data
SaaS
MICROSOFT PROTECTING YOU
Malware Protection Center Cyber Hunting Teams Security Response Center
DeviceInfrastructure
CERTs
PaaS IaaS
Identity
INTELLIGENT SECURITY GRAPH
Cyber Defense
Operations Center
Digital Crimes Unit
Antivirus NetworkIndustry Partners
8©2017 Check Point Software Technologies Ltd.
AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD
SECURITY
Customers protect
their apps and data in
the cloud
Azure takes care of
protecting the cloud
infrastructure

Recommended for you

Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed

Check Point is the largest global cybersecurity company, with over 100,000 customers in 88 countries. It has over 5,200 employees worldwide and 25 years of experience in cutting-edge cybersecurity technologies. Check Point provides a consolidated security solution with over 60 security services to protect over 50 types of assets across networks, mobile devices, endpoints, cloud, and IoT. Its unified architecture simplifies security management and prevents threats rather than just detecting them after the fact.

Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness

This document summarizes Check Point's performance in NSS Labs security tests over time. It shows that Check Point has consistently achieved high recommended ratings, with a recommended rating in 95% of tests against Palo Alto, 86% against Fortinet, 94% against Cisco, and 93% or higher when compared against all four vendors together. Various graphs and tables demonstrate Check Point's leading coverage of CVEs and applications compared to other vendors.

Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection

This document discusses Check Point's SandBlast technology for detecting zero-day threats. SandBlast provides unprecedented prevention against unknown malware, zero-day, and targeted attacks by detecting exploits at the CPU level before evasion techniques can be used. It also quickly delivers safe reconstructed files to maintain business productivity while inspecting files in real-time. SandBlast can be deployed flexibly on-premise or in the cloud for optimal protection.

9©2017 Check Point Software Technologies Ltd.
 Create Virtual Networks
with Subnets and Private
IP addresses
 Configure access control
rules, which can be
applied across Virtual
Networks to thousands
of machines in seconds
 Can bring your own DNS
and can domain join
your VMs
VIRTUAL NETWORKS & SECURITY GROUPS
Customer 2
INTERNET
Isolated Virtual
Networks
Customer 1
Subnet 1 Deployment X Deployment Y
VLAN-to-VLAN
Cloud Access
Layer
RDP Endpoint
(password access)
Client
Subnet 2 Subnet 3
DNS Server
VPN
Microsoft Azure
Corp 1
10©2017 Check Point Software Technologies Ltd.
USER DEFINED ROUTING AND VIRTUAL APPLIANCES
11©2017 Check Point Software Technologies Ltd.
AZURE MARKETPLACE
12©2017 Check Point Software Technologies Ltd.
Visibility &
Control
Deploy &
Detect
Set Policy &
Monitor
Understand
Current
State
Deploy
Integrated
Solutions
Respond &
recover faster
Find
threats that
might go
unnoticed
Continue
learning
 Gain visibility and control
 Integrated security, monitoring,
policy management
 Built in threat detections and
alerts
 Works with broad ecosystem of
industry leading 3rd party security
solutions including:
AZURE SECURITY CENTER

Recommended for you

Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal

This document discusses network security and compares different generations (Gens) of security products. Gen V security is defined as being effective, efficient, and everywhere. Check Point is presented as providing Gen V security through real-time prevention innovations, an unparalleled sense of urgency in responding to vulnerabilities, proven security with third-party tests, no security shortcuts, and an efficient software-based architecture that allows security everywhere. Check Point is said to have the best security through these factors and fighting FUD with facts.

Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive

This document contains Check Point's responses to claims made in a Cisco competitive comparison. It summarizes Cisco's claims regarding efficacy, security features, operational capabilities, and ICS/SCADA protections, then provides Check Point's facts and details to counter inaccurate aspects of Cisco's statements. Check Point asserts it offers comparable or superior capabilities in these areas compared to Cisco.

SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent

The document discusses Check Point's SandBlast Agent, which provides zero-day protection, detection and containment of infections, and automated forensic analysis and attack remediation for endpoints. SandBlast Agent uses threat emulation to sanitize web downloads and files before delivery. It also detects command and control communications to identify and quarantine infected machines. Additionally, SandBlast Agent performs automatic forensic analysis to understand attacks, answer questions about infections, and generate remediation scripts.

13©2017 Check Point Software Technologies Ltd.
HIPAA /
HITECH Act
Moderate
JAB P-ATO
FIPS 140-2
FERPA
DoD DISA
SRG Level 2
ITAR CJIS
GxP
21 CFR Part 11
IRS 1075Section
508 VPAT
ISO 27001 SOC 1
Type 2
ISO 27018 CSA STAR
Self-Assessment
Singapore
MTCS
UK
G-Cloud
Australia
IRAP/CCSL
FISC
Japan
China
DJCP
New
Zealand
GCIO
China
GB 18030
EU
Model Clauses
ENISA
IAF
Argentina
PDPA
Japan CS
Mark Gold
SP 800-171
China
TRUCS
Spain
ENS
PCI DSS
Level 1
CDSA Shared
Assessments
MPAA
Japan
My
Number
Act
FACT
UK
High
JAB P-ATO
GLBA
DoD DISA
SRG Level 4
MARS-E FFIEC
ISO 27017 SOC 2
Type 2
SOC 3
India
MeitY
Canada
Privacy
Laws
Privacy
Shield
ISO 22301
Germany IT
Grundschutz
workbook
Spain
DPA
CSA STAR
Certification
CSA STAR
Attestation
HITRUST IG Toolkit
UK
Trust
THE MOST TRUSTED AND COMPLIANT CLOUD
GLOBALUSGOVINDUSTRYREGIONAL
14©2017 Check Point Software Technologies Ltd.
UNDERSTANDING CLOUD SECURITY
CHALLENGES
WHY DO WE NEED
ADVANCED SECURITY IN
THE CLOUD?
15©2017 Check Point Software Technologies Ltd.
CLOUD SECURITY REQUIREMENTS
Increasing sophistication of threats & malware
Consistent protections and policy management
Consolidated visibility, logging and reporting
Sacrificing speed and agility for security
Lateral spread of threats
16©2017 Check Point Software Technologies Ltd.
What are your greatest concerns about deploying and managing them?
Loss of control 80%
Data security
Data portability and ownership 73%
Regulatory compliance 62%
Reliability 60%
Source: Morgan Stanley CIO Cloud Survey
SECURITY IS A TOP CONCERN FOR CLOUD
76%

Recommended for you

Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra

Check Point vSEC is a security solution for modern data centers that provides: 1) Automated deployment of security policies to securely scale virtual machines on new host members. 2) Inspection of east-west traffic between virtual machines through NSX chains and Check Point vSEC gateways to prevent lateral threats. 3) Unified management of virtual and perimeter security gateways through Check Point's management system for consistent policy control and threat visibility across environments.

2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware

This document discusses strategies for reducing ransomware risks. It begins with a poll asking organizations about their ransomware experiences. It then discusses malware trends seen by the Cisco Talos threat intelligence team, including the continued prevalence of ransomware variants like Maze and Sodinokibi. The document outlines the basic process of how ransomware works and how it has evolved over time. It recommends high-level solutions like education, network segmentation, and planning to make lateral movement within networks harder for attackers.

ransomwareransomware attacks
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention

The document discusses mobile threats and how Check Point's Mobile Threat Prevention solution addresses them. It notes that mobile threats are increasing in frequency and sophistication. Existing mobile security solutions only focus on certain attack vectors like apps or networks, leaving devices exposed. Check Point's solution takes a holistic approach by correlating device, app, and network activity to detect unknown threats and prevent attacks. It provides real-time risk assessments and adaptive mitigation directly on devices without needing additional mobile management solutions. The solution's cloud-based analysis identifies threats across iOS and Android through techniques like behavioral monitoring, sandboxing, and static code analysis.

17©2017 Check Point Software Technologies Ltd.
CHALLENGE:
The Cloud is Already Secure, Why Do I Need Additional Security?
Perception:
• Security handled by cloud provider
• Segmentation or isolation = security
Cloud provider secures the cloud infrastructure , not
customer data or apps = SHARED RESPONSIBILITY
Data isolation does not protect against malware or
other threats
18©2017 Check Point Software Technologies Ltd.
AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD
SECURITY
Customers protect
their apps and data in
the cloud
Azure takes care of
protecting the cloud
infrastructure
19©2017 Check Point Software Technologies Ltd.
SOLUTION:
Advanced Security Protects Customer Assets in the Cloud
Advanced security methods in Public Clouds:
• Prevent threats within Public Clouds
• Comprehensive protections to prevent breaches and data loss
• Security Groups with Advanced Threat Prevention:
• Fine-tuned policies and layered protections (Firewall, IPS,
Anti-Virus, AntiBot, and more)
• Segmentation achieved between VNETS using network
firewall and segments and UDR
20©2017 Check Point Software Technologies Ltd.
CHALLENGE:
Network Security Solutions Don’t Fit in Public Cloud Architectures
Perception:
• Environment is too dynamic
• Rapid adding/removing of VMs, subnets etc.
• Network security solutions single point of failure /
don’t support HA configuration / cannot scale
automatically
• Cloud networks are too opaque with no visibility
or control on network traffic

Recommended for you

Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW

This document discusses next generation firewalls (NGFWs) and factors to consider when choosing one. It provides an overview of NGFW capabilities according to Gartner, and compares NGFWs to UTMs. The document then focuses on Check Point's NGFW approach, highlighting its multi-layered security architecture using software blades, management tools, and performance testing methodology. Buyers are advised to carefully evaluate a vendor's security, management, and ability to perform well without shortcuts.

check point muk security
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN

The document outlines requirements for a next generation firewall and advanced threat prevention solution. It includes over 50 requirements across various categories such as firewall, intrusion prevention, user identity acquisition, application control, URL filtering, anti-bot, anti-virus, SSL inspection, and threat emulation. Vendors are asked to specify whether their solution fully complies, partially complies, or does not comply with each requirement and provide explanations and evidence to support their responses.

ngfw rfp template - test planngfw rfp templatefirewall
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008

Panda Security provides unified malware protection technologies through products like TruPrevent host-based intrusion prevention system and Collective Intelligence. TruPrevent uses behavioral analysis and deep packet inspection to detect and block unknown threats while Collective Intelligence automates malware analysis through a global network of sensors to consistently deliver fast responses. Panda also offers security appliances and services like MalwareRadar, TrustLayer Mail, and solutions for mobile operators and enterprises to provide comprehensive protection.

21©2017 Check Point Software Technologies Ltd.
• Operate in HA mode in cloud
• Within VNET(HA-cluster)
• Across availability-set
• Security policies updated automatically
• Auto-discovery of cloud assets (new VM’s ,
subnets, etc) reflected in automated policy
updates
• Deployed in VMs within VNETs
• Single or multiple NICs
• Private or Public IPs
• UDR’s
• Auto-scales to meet elastic demand
• Integrates with built-in Azure Load Balancer
• Triggered based on threshold from App
insights metrics
SOLUTION:
Network Security FITS in Public Cloud
22©2017 Check Point Software Technologies Ltd.
PROTECTING DATA & APPS IN AZURE
INTRODUCING CHECK POINT VSEC
23©2017 Check Point Software Technologies Ltd.
CHECK POINT VSEC FOR MICROSOFT AZURE
Advanced Threat Prevention Security for Hybrid Clouds
vSEC GATEWAY
• Comprehensive protections
including: Firewall, IPS,
AntiBot, AntiVirus, VPN, DLP
and SandBlast Zero-Day
Protections
• Secure traffic between
applications in the hybrid
cloud
vSEC CONTROLLER
• Automated security with
unified management
• Context-aware policies and logs
leveraging Azure defined
objects
• Consolidated logging and
reporting across private, public
and hybrid clouds
24©2017 Check Point Software Technologies Ltd.
QUICKLY ENABLE VSEC ADVANCED SECURITY IN AZURE
MARKETPLACE
Enable a Check Point vSEC
Gateway in the Azure Cloud1. Selected Desired Protection
Levels2.
Flexible Delivery Models: PAYG or BYOL

Recommended for you

Ecosystem
EcosystemEcosystem
Ecosystem

Check Point provides its customers with security across a wide range of technologies through partnerships with over 160 technology providers. With the largest security ecosystem in the industry, Check Point is able to deliver the best security everywhere through solutions that include enforcement, management, threat intelligence, cloud infrastructure, mobile security, and communications security. Check Point partners help customers protect their organizations across networks, endpoints, cloud, and more.

ecosystemcheck point palo alto networks fortinet cisco
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021

"Cloud Security Best Practices" meetup, is about Secrets Management in the Cloud, Secure Cloud Architecture, Events Tracking in Microservices and How to Manage Secrets in K8S.

"cloud security best practices" meetupis about secrets management in the cloudsecure cloud architecture
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...

Does moving core business applications to AWS make sense for your organization? This session covers key business and IT considerations gathered from industry experts and real-world enterprise customers who have chosen to move their mission critical ERP applications to the AWS cloud, resulting in lower costs and better service. This session covers the following: - Insights from industry experts and analysts, who explain how the cloud affects costs from three angles: launch, operations, and long-term infrastructure expense - Review of how time-to-value and cloud launch processes differ from on-premises infrastructure - How AWS offers increased security and reliability over what some enterprises can afford on their own Sponsored by Infor

cloud computingmigrationinfor global solutions
25©2017 Check Point Software Technologies Ltd.
SECURITY AS DYNAMIC AS THE CLOUD
• Full Support for Auto-scaling, Load
Balancing , Application Insights, multiple
Regions, and Cloud object discovery
• Rapid and Easy Deployment with Single
Click deployment from Azure
Marketplace
• Automated with ARM Templates and
Azure Security Center, Free Trial and Test
Drive
26©2017 Check Point Software Technologies Ltd.
Reference Architecture
• Auto-discovery of Azure defined
objects
• Leverages Azure objects like VPC’s,
Subnets and Instances in security
policies and logs
• Policies updated in real-time
• Improved visibility and forensics
AZURE CLOUD OBJECT DISCOVERY WITH VSEC
27©2017 Check Point Software Technologies Ltd.
TYPICAL DEPLOYMENT SCENARIOS
Public cloud only – Cloud Native with remote access
• Migration of on-premise data and apps to public cloud
Hybrid Cloud – securely connect on-premise with
cloud with site-to-site VPN
• Distributed Architecture ( Web tier in public cloud and
App and DB tiers on-premise )
• DR architecture with secure backup to public cloud
• Legacy applications isolated in the public cloud
• Branch services delivered from the cloud
• Phased migration , cloud bursting, optimal resource
utilization
28©2017 Check Point Software Technologies Ltd.
Reference Architecture
• Check Point vSEC protects assets in
Azure vNET
• Complete Reference Architecture
• Deployment Scenarios and Demo –
YouTube video
• Clustering for HA
• ExpressRoute for Hybrid Cloud
• Autoscaling and vNET peering
CHECK POINT VSEC FOR AZURE HYBRID CLOUDS

Recommended for you

2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security

This document discusses the new era of digital security in light of emerging technologies like cloud computing, software-defined infrastructure, and the increased use of applications and devices outside of IT's control. It argues that traditional network-based defenses are no longer enough and that security must evolve to be continuous and integrated throughout the IT lifecycle. It presents containers and container platforms like Kubernetes as an approach that can help achieve both agility and improved security by allowing for easy and secure application deployment across hybrid environments.

openshiftsecuritydevopssec
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017

In this session, you learn pragmatic steps to integrate security controls into DevOps processes in your AWS environment at scale. Cyber security expert and founder of Alert Logic Misha Govshteyn shares insights from high performing teams who are embracing the reality that an agile security program can enable faster and more secure workload deployments. Joining Misha is Joey Peloquin, Director of Cloud Security Operations at Citrix, who discusses Citrix’s DevOps experiences and how they manage their cyber security posture within the AWS Cloud. Session sponsored by Alert Logic

reinvent2017awsreinvent2017amazon
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads

Hosting workloads on AWS provides organizations with agility, speed, efficiency, and reduced costs. Check Point vSEC further enhances this experience by delivering advanced, multi-layered threat prevention security for your AWS workloads, protecting assets and enabling secure connectivity from enterprise networks to your AWS resources. Register for our upcoming webinar to learn how Check Point vSEC on AWS provided customers with an advanced threat prevention solution to enable secure application delivery. Learn how to migrate your applications and workloads to AWS with vSEC’s comprehensive security solution tailored to help protect your cloud environment. Join us to learn: • How Check Point vSEC enabled customers to confidently migrate from an on-premises infrastructure to AWS • How to prevent network attacks and data breaches when hosting workloads in a cloud-based environment • How Courtagen Life Sciences secured their cloud environment to maintain compliance, reduce IT expenses and leverage the full capabilities of the AWS Cloud Who should attend: IT Admins, Security Admins, Cloud Admins, Business Decision Makers, Compliance & governance officers, Line of Business leaders, DevOps engineers & architects

aws cloudaws
29©2017 Check Point Software Technologies Ltd.
Customer Case Study
30©2017 Check Point Software Technologies Ltd.
• Founded in 2001, Daymark is a 50 employee datacenter technology consulting firm
• Certified Microsoft Gold and Check Point Star partner as well as a long time Check
Point and Azure customer
• Daymark Solutions helps customers by architecting and implementing complex
data center infrastructure, cloud and hybrid solutions, and managed services
• Enable customers to securely utilize cloud platforms with confidence
• Assisted customers impacted by security breaches and malware attacks
WHO ARE WE
31©2017 Check Point Software Technologies Ltd.
BUSINESS AND TECHNICAL CHALLENGES
Business Challenges
• Securely migrate critical services to Azure Cloud to speed up
service delivery and reduce data center footprint
• Enable a mobile workforce without compromising security
• Simplify disaster recovery/ business continuity
• Help customers securely migrate workloads to Azure cloud
Technical Challenges
• Lack of visibility into threats and traffic using Azure networking
• Protect cloud data and workloads against cyber threats,
malware and ransomware
• Single pane of Glass, common security policies, centralized logs
32©2017 Check Point Software Technologies Ltd.
WHY CHECK POINT?
Seamless
integration and
management of Azure
Scalability &
Flexibility
to support additional
users
Industry Leader
in Security

Recommended for you

(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises

"CSC engineers will demonstrate enterprise policy, governance, and security products to deploy and manage enterprise and industry applications AWS.  We will demonstrate automated provisioning and management of big data platforms and industry specific enterprise applications with automatically provisioned secure network connectivity from the datacenter to AWS over layer 2 routed AT&T NetBond (provides AWS DirectConnect access) connection.  We will demonstrate how applications blueprinted on CSC's Agility Platform can be re-hosted on AWS in minutes or re-instantiated across multiple AWS regions.  CSC Cybersecurity will also demonstrate how CSC can provide agile & consumption based endpoint security for workloads in any cloud or virtual infrastructure, providing enterprise management and 24x7 monitoring of workload compliance, vulnerabilities, and potential threats. Session sponsored by CSC."

sec321cloud computingamazon web services
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session

Enterprise DevOps is different then DevOps in startups and smaller companies. This session how AWS/CSC address this. How AWS IaaS level automation via CloudFormation, UserData, Console, APIS and some PaaS OpsWorks/Beanstalk is complimented by CSC Agility Platform. CSC Agility adds application compliance and security to the AWS infrastructure compliance and security. CSC Agility allows for the creation of architecture blueprints for predefined application offerings.

devopsoperationsamazon
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases

Want to know how others enterprise customers are using cloud? This deck lists some real life examples of how enterprise customers are using public and private.

33©2017 Check Point Software Technologies Ltd.
THE SOLUTION – CHECK POINT AND AZURE
Capabilities and Technical Benefits
• Robust and Advanced Security
• Secure Remote Access for branch offices
• High availability with redundancy
• Automation and orchestration
• In depth Forensics and reporting
34©2017 Check Point Software Technologies Ltd.
“ Leveraging Check Point vSEC both on premise and
in Microsoft Azure gave us a 100 percent increase in
visibility into the threats that were impacting our
environment. Check Point was able not only to
prevent threats, but also detect and alert us every
time they occurred.”
THE SOLUTION – CHECK POINT VSEC AND AZURE
Corey Roberts,
Director of Technology, Daymark Solutions
35©2017 Check Point Software Technologies Ltd.
DEPLOYMENT ARCHITECTURE AND IMPLEMENTATION
• Check Point vSEC for Azure for advanced security,
perimeter protection, remote access and hybrid
connectivity
• Check Point 5200 Appliances deployed on-premises
• Check Point Smart-1 Security Management
Appliance for security management across the
hybrid cloud and deployed on-premises
• Azure ExpressRoute, Azure LB, High Availability
Regions, Azure vNET, Azure Compute, Built-in
security controls
36©2017 Check Point Software Technologies Ltd.
NETWORK SECURITY DEPLOYED IN AZURE VNET–
HYBRID CLOUD
Customer Data
CenterAvailability Region 1
Availability Region 2
Load
Balancing
Internet and
SaaS apps
Branches /
Mobile Users
Smart
management
Check Point
46xx
Check Point
42xx
Private
Subnet
Public
Subnet
Private
Subnet
Public
Subnet
Enterprise
servers
Azure

Recommended for you

AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls

Monitoring and making sense of infrastructure data can be an arduous process. Managing a volume of API calls from more than one million active users every minute presents an even more complex and demanding challenge. Using Amazon Web Services (AWS) and Datadog, Grindr overcame a series of infrastructure challenges by both implementing and managing highly scalable, high availability, and top performing infrastructure, as well as aggregating, analyzing, and acting on key infrastructure data KPIs.

aws clouddatadogaws
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee

Deployment of security countermeasures and –processes across public-, private- or hybrid cloud IT implementations. How to deploy and manage security in dynamic environments - even in highly regulated environments. Lastly, how security can support rather than interfere with IT management processes.

2014trend microdatacenter 2014
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...

Richard will look at the reasoning behind the current move towards Cloud-based resource usage and identify the many areas of risk that must be considered when a migration project is being planned. He will look closely at emerging threats and explain how these can be confronted using the appropriate Cloud security strategy and solutions. He will also look at the various different models of Cloud and define methodologies to assist any organisation to be compliant with current and future legislation that governs data usage and protection.

37©2017 Check Point Software Technologies Ltd.
SOLUTION RESULTS
• Rapid and easy deployment, provisioning, automation
and orchestration
• Unified management across multiple cloud
environments
• Consolidated view of on-premise and cloud security from
a single pane of glass
• Advanced and scalable security for cloud apps to support
speed and agility
38©2017 Check Point Software Technologies Ltd.
39©2017 Check Point Software Technologies Ltd.
MORE INFORMATION - RESOURCES
• Check Point vSEC for Azure product page and collateral – Joint Solution Brief
• Check Point vSEC for Azure landing page with webinar recording and White Paper
• Cloud Security Shared Responsibility Whitepaper
• vSEC on Azure MarketPlace
• Check Point Reference Architectures /ARM templates for vSEC
• Customer References – case study and video
• Free Trial promotion – Azure credits
• vSEC for Azure Test Drive and User Guide
40©2017 Check Point Software Technologies Ltd.
SUMMARY: WHY CHECK POINT VSEC FOR AZURE CLOUD?
Unified management for public cloud and hybrid cloud environments
Adaptive security with auto-scaling and auto-provisioning
Flexible deployment and extend security to Azure
Advanced threat prevention for Azure applications

Recommended for you

Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)

This is a presentation given at DogFoodCon 2018 on running regulated financial workloads in the cloud. There were over 100 people in attendance and all were amazed at the skill of the presenter and the power of Azure, also Albert Einstein showed up for a cameo.

azurecloudpaas
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud

Join CloudPassage CEO, Carson Sweet and Sumo Logic Founding VP of Product & Strategy, Bruno Kurtic, for a webinar on “45 minutes to PCI Compliance in the Cloud”. What You Will Learn: -Understand the typical challenges faced by enterprises for achieving PCI on cloud infrastructure -Learn how purpose-built SaaS-based cloud security solutions can save you tens of thousands in audit costs by speeding your time to compliance -Get a quick demo of the CloudPassage Halo and Sumo Logic solutions that provide the telemetry and query/reporting engines respectively for cloud PCI

cloud securitysumo logiccloudpassage
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform

An introduction to how Cisco ACI makes for a superior solution with Microsoft Cloud Platform. Presentation at Microsoft Ignite - May 2015

sdnmicrosoft cloud platformcisco aci
41©2017 Check Point Software Technologies Ltd.
• Krish Subramanian – Product Marketing Manager, Check Point - ksubrama@checkpoint.com
• Rachel Yehezkel - Technical Evangelist, Microsoft Azure -rachelye@microsoft.com
• Corey Roberts - Director of Cloud Services - croberts@daymarksi.com
Q
A
42©2017 Check Point Software Technologies Ltd.
THANK YOU

More Related Content

What's hot

2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
e-Xpert Solutions SA
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
e-Xpert Solutions SA
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
Nattira Panbun
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
MarketingArrowECS_CZ
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
Moti Sagey מוטי שגיא
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
AlgoSec
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
Moti Sagey מוטי שגיא
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
MarketingArrowECS_CZ
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey מוטי שגיא
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
Moti Sagey מוטי שגיא
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
MarketingArrowECS_CZ
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
MarketingArrowECS_CZ
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
AlgoSec
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
MarketingArrowECS_CZ
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
Group of company MUK
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
Moti Sagey מוטי שגיא
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
tswong
 
Ecosystem
EcosystemEcosystem
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
lior mazor
 

What's hot (20)

2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Check point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentationCheck point sandblast threat-emulation-customer-success-presentation
Check point sandblast threat-emulation-customer-success-presentation
 
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
Check Point mission statement
Check Point mission statementCheck Point mission statement
Check Point mission statement
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Check Point vs competition security effectiveness
Check Point vs competition security effectiveness Check Point vs competition security effectiveness
Check Point vs competition security effectiveness
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal Moti Sagey CPX keynote _Are All security products created equal
Moti Sagey CPX keynote _Are All security products created equal
 
Check point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitiveCheck point response to Cisco NGFW competitive
Check point response to Cisco NGFW competitive
 
SandBlast Agent
SandBlast AgentSandBlast Agent
SandBlast Agent
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware2021 01-13 reducing risk-of_ransomware
2021 01-13 reducing risk-of_ransomware
 
Check Point Mobile Threat Prevention
Check Point Mobile Threat PreventionCheck Point Mobile Threat Prevention
Check Point Mobile Threat Prevention
 
Check Point NGFW
Check Point NGFWCheck Point NGFW
Check Point NGFW
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Panda Security2008
Panda Security2008Panda Security2008
Panda Security2008
 
Ecosystem
EcosystemEcosystem
Ecosystem
 
Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021Application security meetup - cloud security best practices 24062021
Application security meetup - cloud security best practices 24062021
 

Similar to Check Point vSEC for Microsoft Azure Webinar

(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
Amazon Web Services
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
Shawn Wells
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Amazon Web Services
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
Amazon Web Services
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
Amazon Web Services
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
Tom Laszewski
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases
Jason Singh
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
Amazon Web Services
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Digital Transformation EXPO Event Series
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Jeremy Gray
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
CloudPassage
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
Shashi Kiran
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
RapidScale
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
Alert Logic
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
ErikHof4
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
Alert Logic
 
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Cisco Canada
 

Similar to Check Point vSEC for Microsoft Azure Webinar (20)

(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
 
Check Point Software Technologies: Secure Your AWS Workloads
 Check Point Software Technologies: Secure Your AWS Workloads Check Point Software Technologies: Secure Your AWS Workloads
Check Point Software Technologies: Secure Your AWS Workloads
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
Deploying Cloud Use Cases
Deploying Cloud Use CasesDeploying Cloud Use Cases
Deploying Cloud Use Cases
 
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API CallsAWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
AWS Partner: Grindr: Aggregate, Analyze, and Act on 900M Daily API Calls
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
Head in the Clouds? Let’s get serious about how to benefit from Cloud platfor...
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Cisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud PlatformCisco ACI for the Microsoft Cloud Platform
Cisco ACI for the Microsoft Cloud Platform
 
RapidScale Company Presentation
RapidScale Company PresentationRapidScale Company Presentation
RapidScale Company Presentation
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Presentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion seguraPresentacion de solucion cloud de navegacion segura
Presentacion de solucion cloud de navegacion segura
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
Driving Innovation: A Path to Digitization, Speed and Visibility in an Applic...
 

Recently uploaded

WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Bert Blevins
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
Matthew Sinclair
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
shanthidl1
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
Eric D. Schabell
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
Enterprise Wired
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
Matthew Sinclair
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
Adam Dunkels
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
UiPathCommunity
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Erasmo Purificato
 

Recently uploaded (20)

WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly DetectionAdvanced Techniques for Cyber Security Analysis and Anomaly Detection
Advanced Techniques for Cyber Security Analysis and Anomaly Detection
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
20240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 202420240702 QFM021 Machine Intelligence Reading List June 2024
20240702 QFM021 Machine Intelligence Reading List June 2024
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Cookies program to display the information though cookie creation
Cookies program to display the information though cookie creationCookies program to display the information though cookie creation
Cookies program to display the information though cookie creation
 
Observability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetryObservability For You and Me with OpenTelemetry
Observability For You and Me with OpenTelemetry
 
7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf7 Most Powerful Solar Storms in the History of Earth.pdf
7 Most Powerful Solar Storms in the History of Earth.pdf
 
20240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 202420240704 QFM023 Engineering Leadership Reading List June 2024
20240704 QFM023 Engineering Leadership Reading List June 2024
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Pigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdfPigging Solutions Sustainability brochure.pdf
Pigging Solutions Sustainability brochure.pdf
 
How to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptxHow to Build a Profitable IoT Product.pptx
How to Build a Profitable IoT Product.pptx
 
UiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs ConferenceUiPath Community Day Kraków: Devs4Devs Conference
UiPath Community Day Kraków: Devs4Devs Conference
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
Paradigm Shifts in User Modeling: A Journey from Historical Foundations to Em...
 

Check Point vSEC for Microsoft Azure Webinar

  • 1. 1©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd. Advanced Threat Prevention Security for Public and Hybrid Clouds CHECK POINT VSEC: SECURE YOUR AZURE WORKLOADS May 4, 2017
  • 2. 2©2017 Check Point Software Technologies Ltd. Corey Roberts Director of Cloud Services Daymark Solutions Rachel Yehezkel Technical Evangelist Microsoft Azure Krish Subramanian Product Marketing Manager Check Point Software Technologies TODAY’S SPEAKERS
  • 3. 3©2017 Check Point Software Technologies Ltd. MICROSOFT AZURE OVERVIEW
  • 4. 4©2017 Check Point Software Technologies Ltd. Openness and flexibility Data and intelligence Trust Application innovation
  • 5. 5©2017 Check Point Software Technologies Ltd. 38Azure regions NEWLY ANNOUNCED: France: France Central and France South Korea: Korea Central and Korea South DoD East and Central Achieve global scale, in local regions Trust
  • 6. 6©2017 Check Point Software Technologies Ltd. Platform Services Infrastructure Services Web Apps Mobile Apps API Apps Notification Hubs Hybrid Cloud Backup StorSimple Azure Site Recovery Import/Export SQL Database DocumentDB Redis Cache Azure Search Storage Tables SQL Data Warehouse Azure AD Health Monitoring AD Privileged Identity Management Operational Analytics Cloud Services Batch RemoteApp Service Fabric Visual Studio Application Insights VS Team Services Domain Services HDInsight Machine Learning Stream Analytics Data Factory Event Hubs Data Lake Analytics Service IoT Hub Data Catalog Security & Management Azure Active Directory Multi-Factor Authentication Automation Portal Key Vault Store/ Marketplace VM Image Gallery & VM Depot Azure AD B2C Scheduler Xamarin HockeyApp Power BI Embedded SQL Server Stretch Database Mobile Engagement Functions Cognitive Services Bot Framework Cortana Security Center Container Service VM Scale Sets Data Lake Store BizTalk Services Service Bus Logic Apps API Management Content Delivery Network Media Services Media Analytics
  • 7. 7©2017 Check Point Software Technologies Ltd. Apps and Data SaaS MICROSOFT PROTECTING YOU Malware Protection Center Cyber Hunting Teams Security Response Center DeviceInfrastructure CERTs PaaS IaaS Identity INTELLIGENT SECURITY GRAPH Cyber Defense Operations Center Digital Crimes Unit Antivirus NetworkIndustry Partners
  • 8. 8©2017 Check Point Software Technologies Ltd. AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD SECURITY Customers protect their apps and data in the cloud Azure takes care of protecting the cloud infrastructure
  • 9. 9©2017 Check Point Software Technologies Ltd.  Create Virtual Networks with Subnets and Private IP addresses  Configure access control rules, which can be applied across Virtual Networks to thousands of machines in seconds  Can bring your own DNS and can domain join your VMs VIRTUAL NETWORKS & SECURITY GROUPS Customer 2 INTERNET Isolated Virtual Networks Customer 1 Subnet 1 Deployment X Deployment Y VLAN-to-VLAN Cloud Access Layer RDP Endpoint (password access) Client Subnet 2 Subnet 3 DNS Server VPN Microsoft Azure Corp 1
  • 10. 10©2017 Check Point Software Technologies Ltd. USER DEFINED ROUTING AND VIRTUAL APPLIANCES
  • 11. 11©2017 Check Point Software Technologies Ltd. AZURE MARKETPLACE
  • 12. 12©2017 Check Point Software Technologies Ltd. Visibility & Control Deploy & Detect Set Policy & Monitor Understand Current State Deploy Integrated Solutions Respond & recover faster Find threats that might go unnoticed Continue learning  Gain visibility and control  Integrated security, monitoring, policy management  Built in threat detections and alerts  Works with broad ecosystem of industry leading 3rd party security solutions including: AZURE SECURITY CENTER
  • 13. 13©2017 Check Point Software Technologies Ltd. HIPAA / HITECH Act Moderate JAB P-ATO FIPS 140-2 FERPA DoD DISA SRG Level 2 ITAR CJIS GxP 21 CFR Part 11 IRS 1075Section 508 VPAT ISO 27001 SOC 1 Type 2 ISO 27018 CSA STAR Self-Assessment Singapore MTCS UK G-Cloud Australia IRAP/CCSL FISC Japan China DJCP New Zealand GCIO China GB 18030 EU Model Clauses ENISA IAF Argentina PDPA Japan CS Mark Gold SP 800-171 China TRUCS Spain ENS PCI DSS Level 1 CDSA Shared Assessments MPAA Japan My Number Act FACT UK High JAB P-ATO GLBA DoD DISA SRG Level 4 MARS-E FFIEC ISO 27017 SOC 2 Type 2 SOC 3 India MeitY Canada Privacy Laws Privacy Shield ISO 22301 Germany IT Grundschutz workbook Spain DPA CSA STAR Certification CSA STAR Attestation HITRUST IG Toolkit UK Trust THE MOST TRUSTED AND COMPLIANT CLOUD GLOBALUSGOVINDUSTRYREGIONAL
  • 14. 14©2017 Check Point Software Technologies Ltd. UNDERSTANDING CLOUD SECURITY CHALLENGES WHY DO WE NEED ADVANCED SECURITY IN THE CLOUD?
  • 15. 15©2017 Check Point Software Technologies Ltd. CLOUD SECURITY REQUIREMENTS Increasing sophistication of threats & malware Consistent protections and policy management Consolidated visibility, logging and reporting Sacrificing speed and agility for security Lateral spread of threats
  • 16. 16©2017 Check Point Software Technologies Ltd. What are your greatest concerns about deploying and managing them? Loss of control 80% Data security Data portability and ownership 73% Regulatory compliance 62% Reliability 60% Source: Morgan Stanley CIO Cloud Survey SECURITY IS A TOP CONCERN FOR CLOUD 76%
  • 17. 17©2017 Check Point Software Technologies Ltd. CHALLENGE: The Cloud is Already Secure, Why Do I Need Additional Security? Perception: • Security handled by cloud provider • Segmentation or isolation = security Cloud provider secures the cloud infrastructure , not customer data or apps = SHARED RESPONSIBILITY Data isolation does not protect against malware or other threats
  • 18. 18©2017 Check Point Software Technologies Ltd. AZURE AND YOU SHARE RESPONSIBILITY FOR CLOUD SECURITY Customers protect their apps and data in the cloud Azure takes care of protecting the cloud infrastructure
  • 19. 19©2017 Check Point Software Technologies Ltd. SOLUTION: Advanced Security Protects Customer Assets in the Cloud Advanced security methods in Public Clouds: • Prevent threats within Public Clouds • Comprehensive protections to prevent breaches and data loss • Security Groups with Advanced Threat Prevention: • Fine-tuned policies and layered protections (Firewall, IPS, Anti-Virus, AntiBot, and more) • Segmentation achieved between VNETS using network firewall and segments and UDR
  • 20. 20©2017 Check Point Software Technologies Ltd. CHALLENGE: Network Security Solutions Don’t Fit in Public Cloud Architectures Perception: • Environment is too dynamic • Rapid adding/removing of VMs, subnets etc. • Network security solutions single point of failure / don’t support HA configuration / cannot scale automatically • Cloud networks are too opaque with no visibility or control on network traffic
  • 21. 21©2017 Check Point Software Technologies Ltd. • Operate in HA mode in cloud • Within VNET(HA-cluster) • Across availability-set • Security policies updated automatically • Auto-discovery of cloud assets (new VM’s , subnets, etc) reflected in automated policy updates • Deployed in VMs within VNETs • Single or multiple NICs • Private or Public IPs • UDR’s • Auto-scales to meet elastic demand • Integrates with built-in Azure Load Balancer • Triggered based on threshold from App insights metrics SOLUTION: Network Security FITS in Public Cloud
  • 22. 22©2017 Check Point Software Technologies Ltd. PROTECTING DATA & APPS IN AZURE INTRODUCING CHECK POINT VSEC
  • 23. 23©2017 Check Point Software Technologies Ltd. CHECK POINT VSEC FOR MICROSOFT AZURE Advanced Threat Prevention Security for Hybrid Clouds vSEC GATEWAY • Comprehensive protections including: Firewall, IPS, AntiBot, AntiVirus, VPN, DLP and SandBlast Zero-Day Protections • Secure traffic between applications in the hybrid cloud vSEC CONTROLLER • Automated security with unified management • Context-aware policies and logs leveraging Azure defined objects • Consolidated logging and reporting across private, public and hybrid clouds
  • 24. 24©2017 Check Point Software Technologies Ltd. QUICKLY ENABLE VSEC ADVANCED SECURITY IN AZURE MARKETPLACE Enable a Check Point vSEC Gateway in the Azure Cloud1. Selected Desired Protection Levels2. Flexible Delivery Models: PAYG or BYOL
  • 25. 25©2017 Check Point Software Technologies Ltd. SECURITY AS DYNAMIC AS THE CLOUD • Full Support for Auto-scaling, Load Balancing , Application Insights, multiple Regions, and Cloud object discovery • Rapid and Easy Deployment with Single Click deployment from Azure Marketplace • Automated with ARM Templates and Azure Security Center, Free Trial and Test Drive
  • 26. 26©2017 Check Point Software Technologies Ltd. Reference Architecture • Auto-discovery of Azure defined objects • Leverages Azure objects like VPC’s, Subnets and Instances in security policies and logs • Policies updated in real-time • Improved visibility and forensics AZURE CLOUD OBJECT DISCOVERY WITH VSEC
  • 27. 27©2017 Check Point Software Technologies Ltd. TYPICAL DEPLOYMENT SCENARIOS Public cloud only – Cloud Native with remote access • Migration of on-premise data and apps to public cloud Hybrid Cloud – securely connect on-premise with cloud with site-to-site VPN • Distributed Architecture ( Web tier in public cloud and App and DB tiers on-premise ) • DR architecture with secure backup to public cloud • Legacy applications isolated in the public cloud • Branch services delivered from the cloud • Phased migration , cloud bursting, optimal resource utilization
  • 28. 28©2017 Check Point Software Technologies Ltd. Reference Architecture • Check Point vSEC protects assets in Azure vNET • Complete Reference Architecture • Deployment Scenarios and Demo – YouTube video • Clustering for HA • ExpressRoute for Hybrid Cloud • Autoscaling and vNET peering CHECK POINT VSEC FOR AZURE HYBRID CLOUDS
  • 29. 29©2017 Check Point Software Technologies Ltd. Customer Case Study
  • 30. 30©2017 Check Point Software Technologies Ltd. • Founded in 2001, Daymark is a 50 employee datacenter technology consulting firm • Certified Microsoft Gold and Check Point Star partner as well as a long time Check Point and Azure customer • Daymark Solutions helps customers by architecting and implementing complex data center infrastructure, cloud and hybrid solutions, and managed services • Enable customers to securely utilize cloud platforms with confidence • Assisted customers impacted by security breaches and malware attacks WHO ARE WE
  • 31. 31©2017 Check Point Software Technologies Ltd. BUSINESS AND TECHNICAL CHALLENGES Business Challenges • Securely migrate critical services to Azure Cloud to speed up service delivery and reduce data center footprint • Enable a mobile workforce without compromising security • Simplify disaster recovery/ business continuity • Help customers securely migrate workloads to Azure cloud Technical Challenges • Lack of visibility into threats and traffic using Azure networking • Protect cloud data and workloads against cyber threats, malware and ransomware • Single pane of Glass, common security policies, centralized logs
  • 32. 32©2017 Check Point Software Technologies Ltd. WHY CHECK POINT? Seamless integration and management of Azure Scalability & Flexibility to support additional users Industry Leader in Security
  • 33. 33©2017 Check Point Software Technologies Ltd. THE SOLUTION – CHECK POINT AND AZURE Capabilities and Technical Benefits • Robust and Advanced Security • Secure Remote Access for branch offices • High availability with redundancy • Automation and orchestration • In depth Forensics and reporting
  • 34. 34©2017 Check Point Software Technologies Ltd. “ Leveraging Check Point vSEC both on premise and in Microsoft Azure gave us a 100 percent increase in visibility into the threats that were impacting our environment. Check Point was able not only to prevent threats, but also detect and alert us every time they occurred.” THE SOLUTION – CHECK POINT VSEC AND AZURE Corey Roberts, Director of Technology, Daymark Solutions
  • 35. 35©2017 Check Point Software Technologies Ltd. DEPLOYMENT ARCHITECTURE AND IMPLEMENTATION • Check Point vSEC for Azure for advanced security, perimeter protection, remote access and hybrid connectivity • Check Point 5200 Appliances deployed on-premises • Check Point Smart-1 Security Management Appliance for security management across the hybrid cloud and deployed on-premises • Azure ExpressRoute, Azure LB, High Availability Regions, Azure vNET, Azure Compute, Built-in security controls
  • 36. 36©2017 Check Point Software Technologies Ltd. NETWORK SECURITY DEPLOYED IN AZURE VNET– HYBRID CLOUD Customer Data CenterAvailability Region 1 Availability Region 2 Load Balancing Internet and SaaS apps Branches / Mobile Users Smart management Check Point 46xx Check Point 42xx Private Subnet Public Subnet Private Subnet Public Subnet Enterprise servers Azure
  • 37. 37©2017 Check Point Software Technologies Ltd. SOLUTION RESULTS • Rapid and easy deployment, provisioning, automation and orchestration • Unified management across multiple cloud environments • Consolidated view of on-premise and cloud security from a single pane of glass • Advanced and scalable security for cloud apps to support speed and agility
  • 38. 38©2017 Check Point Software Technologies Ltd.
  • 39. 39©2017 Check Point Software Technologies Ltd. MORE INFORMATION - RESOURCES • Check Point vSEC for Azure product page and collateral – Joint Solution Brief • Check Point vSEC for Azure landing page with webinar recording and White Paper • Cloud Security Shared Responsibility Whitepaper • vSEC on Azure MarketPlace • Check Point Reference Architectures /ARM templates for vSEC • Customer References – case study and video • Free Trial promotion – Azure credits • vSEC for Azure Test Drive and User Guide
  • 40. 40©2017 Check Point Software Technologies Ltd. SUMMARY: WHY CHECK POINT VSEC FOR AZURE CLOUD? Unified management for public cloud and hybrid cloud environments Adaptive security with auto-scaling and auto-provisioning Flexible deployment and extend security to Azure Advanced threat prevention for Azure applications
  • 41. 41©2017 Check Point Software Technologies Ltd. • Krish Subramanian – Product Marketing Manager, Check Point - ksubrama@checkpoint.com • Rachel Yehezkel - Technical Evangelist, Microsoft Azure -rachelye@microsoft.com • Corey Roberts - Director of Cloud Services - croberts@daymarksi.com Q A
  • 42. 42©2017 Check Point Software Technologies Ltd. THANK YOU