1 / 34

Secure Virtual Networking - The New Security Architecture Trends and Solutions

Secure Virtual Networking - The New Security Architecture Trends and Solutions. Ingrid Hagen Channel Manager Eastern Europe. Check Point Leadership Secure Virtual Network (SVN). Leading in Internet Security 143,000+ Installations 54,000+ VPNs Gateways 50,000+ Customers

alodie
Télécharger la présentation

Secure Virtual Networking - The New Security Architecture Trends and Solutions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Secure Virtual Networking - The New Security ArchitectureTrends and Solutions Ingrid Hagen Channel Manager Eastern Europe

  2. Check Point LeadershipSecure Virtual Network (SVN) • Leading in Internet Security • 143,000+ Installations • 54,000+ VPNs Gateways • 50,000+ Customers • 37 Million+ VPN-1 Clients • Leading in Partnership • 1,000+ Channel Partners • 250+ OPSEC Partners • Leading in Technology • SVN - Check Point 2000 Edition

  3. Make the Internet Secure, Reliable,and Manageable Check Point Mission

  4. SVN VPN Firewalls Check Point: The Power of Consistency & Focus

  5. Internet Backbone Private Network Single Site Distributed Network Virtual Corporation Physical Assets Secure Access Restrict Access Prevent Losses Generate Revenue The New World The New Role of Security

  6. 1999 - 2001Extranets become mission-critical 2001 - 2003Extranets dominate business trade Source: Forrester Research Revenue Source: IDC Market Opportunity $1.5 Trillion E-Commerce Growth $200B 1999 2003

  7. Key Trends • Explosive growth in e-business and e-commerce • Leveraged use of the Internet as a backbone • Sharing and protection of information across the Internet, intranets and extranets

  8. Americas Unit Sales 1998-1999 FireWall-1 vs VPN-1 100% 53% 75% 80% VPN-1 60% UNITS SOLD% FW-1 47% 40% 25% 20% 0 1998 1999 Check Point Market Trends - Regional • Americas

  9. EMEA Unit Sales 1998-1999 FireWall-1 vs VPN-1 100% 31% 49% 80% 69% VPN-1 60% UNITS SOLD% FW-1 51% 40% 20% 0 1998 1999 Check Point Market Trends - Regional • EMEA

  10. Pacific Rim Unit Sales 1998-1999 FireWall-1 vs VPN-1 100% 19% 30% 80% 81% 70% VPN-1 60% UNITS SOLD% FW-1 40% 20% 0 1998 1999 Check Point Market Trends - Regional • Asia Pacific

  11. Internet Extranet Intranet Secure Virtual Network Architecture Networks Systems Applications Users

  12. Systems • Servers • PCs • Networks • LAN/WAN • Customers • Partners • Suppliers CorporateOffice Fixed Line Dial-Up Broadband Wireless • ExtendedWorkforces • MobileEmployees BranchOffice • Applications • Users • Desktops The Need for Security Everywhere Security is a prerequisite for all Internet connectivity • Broadband • Wireless • Phones/PDAs • E-Business • E-Commerce • Multimedia • Mobile • Partners

  13. Customers Partners Suppliers Sales & Marketing 4 Extranet VPNs R & D Remote Offices Finance Site-to-Site VPNs Internal Client 2 Dial-up or broadband access Remote Access VPNs 1 Client/Server VPNs Remote Users Application Server 3 VPN Evolution and Deployment Public Web Server Internet Internet Gateway

  14. SVN Application Environment SVN Phase II • Multi-Platform • Windows • Unix • Appliance • Across Applications • Web • eBusiness • Custom Phase II Networks Systems Security Infrastructure Applications Users Delivering security information to eBusiness applications

  15. Oracle BroadVision Internet TIBCO UserAuthority Web Example User requests secured application Gateway authenticates user, establishes VPN Extranet User Application asks UserAuthority for user information Web Application makes intelligent authorization decision VPN-1 UserAuthority enables secure eBusiness applications

  16. Company-A Company-B Company-C Company-D SVN Enables Secure eBusiness

  17. Customer Requirements • Security and Management 1

  18. VPN-1/FireWall-1 Security

  19. Check Point Meta IP • Enterprise-scale IP Address Management • User-to-Address Mapping (UAM)

  20. Customer Requirements • Security and Management • Performance and Scalability 1 2

  21. VPN SQL Web Managed VPN Quality of Service Unmanaged

  22. Customer Requirements • Security and Management • Performance and Scalability • High Availability 1 2 3

  23. Transparent High Availability Secondary VPN-1 Gateway Corporate Intranet VPN Synchronization Primary VPN-1 Gateway Internet Branch Office

  24. Customer Requirements • Security and Management • Performance and Scalability • High Availability • Interoperability 1 2 3 4

  25. Baltimore Entrust Microsoft Corporate Intranet Verisign Netscape Supplier Network Verisign Microsoft Internet Entrust Mobile User Baltimore Netscape Remote Office Mobile User Customer Network Open PKI Support for Customer Choice • Unparalleled PKI support • Concurrent support for CAs from multiple vendors • Essential for heterogeneous extranets Open PKI Support

  26. Customer Requirements • Security and Management • Performance and Scalability • High Availability • Interoperability • Comprehensiveness 1 2 3 4 5

  27. Protect intranet communications Secure VPN access with broadband technologies (cable modems and DSL) Client/Server VPNs VPN-1SecureClient Internal Client Internet Application Servers VPN-1SecureServer VPN-1SecureClient

  28. Secure Virtual Network Architecture Meta IP IP Address Management Corporate Network VPN-1 Certificate Manager PKI Solution Partner Site FireWall-1 IPSec-compliant Gateway VPN-1 SecuRemote LDAP Directory VPN-1/FireWall-1 Gateway with High Availability Dial-up FloodGate-1 Bandwidth Management Remote Users VPN-1 SecureClient Check Point RealSecure Intrusion Detection VPN-1/FireWall-1 SecureServer VPN-1 Accelerator Card Meta IP DNS ConnectControl Server Load Balancing Broadband Extranet Application Server Router Remote Office • Enterprise Management Console • Policy-based Management • Reporting • Account Management • Open Security Extension Web Server Pool VPN-1 Appliance

  29. OPSEC: Open Platform for Secure Enterprise Connectivity • More than 250 leading industry vendors support the OPSEC framework • OPSEC products are integrated and managed by a single, enterprise wide policy • “OPSEC Certified” assures interoperability “I see the OPSEC Alliance as basically a rallying point for the [network security] industry … ” - Yankee Group

  30. Content Security (CVP, UFP) Authentication (RADIUS,…) Programmatic Policy Access (OMI) User Management (LDAP) Event Logging (LEA, ELA) Intrusion Detection (SAMP) High Availability Directories (LDAP, NDS) PKI Others... The OPSEC Framework Check Point Policy-Based Management P a s s p o r t P a r t n e r s Framework Partners Check Point Product Solutions Network Security Traffic Control IP Address Management Infrastructure Partners CCMSP Partners Networking Appliances Server Software

  31. It`s up to you...

  32. How is the Customers Demand Realized? • #1 Security Solutions • Focused, market and technology leadership • SVN Architecture • #1 Security Channel - Two Tier Channel • Value added Distributor • Partner • Premier, Authorized, Reseller without status • Experience • Educated in Sales and Technical Issues • Solutionprovider

  33. How is the Customers Demand Realized? • OPSEC FrameworkOpen Plattform for Security • The Internet security “operating system” • 250+ products & solutions

  34. The Internet The Internet Secures Your Future We Secure the Internet

More Related