Document 203492

How To Sell
Check Point Advanced
Comprehensive Security Solutions
Solution Overview
Mobile
Networks
Check Point provides an extensive portfolio of
network security, data security, communications
security, multimedia security, and security
management solutions. With Check Point Open
Performance Architecture, you achieve data center
performance even when applying strict security
policies for applications such as multimedia, VoIP, and
instant messaging. All in a flexible architecture that
keeps your network safe by easily adapting as new
security issues emerge.
Branch
Offices
Check Point
Full Disk
Encryption
Port and Media
Encryption
Threats
`
`
Check Point
VPN-1 UTM Edge
(Wireless)
Threats
Check Point
VPN-1 UTM
Power
SSL Network
Extender
IP
Network
Sensors
IP-PBX
IP
Services
IP-PBX
Check Point
IPS-1
Ch
Check Point
IPS-1
Check Point
SmartDefense
Messaging
IP
Check Point
Management
Servers
Provider -1
IPS-1
SmartCenter
SmartView
User Authority
Endpoint Security
Data Security
Security Management
VPN-1 Integrated Appliance Solution
Check Point
InterSpect
Check Point
Full Disk
Encryption
■■
Check Point
Connectra
Check Point
Endpoint
Security
Regional
Offices
Main
Office
Questions to Ask
What is the Check Point Advantage? Check Point
is a market leader in the worldwide enterprise firewall,
personal firewall, data security and VPN markets. Check
Point’s PURE focus is on IT security with its extensive
portfolio of network security, data security and security
management solutions. Customers include 100% of
Fortune 100 companies.
■■ What is the Business Advantage? Through its
NGX platform, Check Point delivers a unified security
architecture for a broad range of security solutions
to protect business communications and resources for
corporate networks and applications.
Check Point
VPN-1 UTM
y
Total Security
Sensors
Network Security
■■
234836
Check Point
VPN-1 UTM Edge
Server
Things to Know
Threats
Check Point
SecureClient
Mobile
Authentication
Product Range
Do you have firewalls that can protect VoIP/SIP
communications and multimedia traffic?
■■ Do you engage in ecommerce that require a VPN or
SSL?
■■ Is intrusion a concern and how are you dealing with it?
■■ Do you have remote offices that connect across the
internet?
■■ Do you use wireless connections, encryption products?
■■ Are you using any products to protect your desktops,
servers, or mobile devices?
■■ How are your security devices managed?
■■ How do you deal with the reports from these devices?
■■ How do you enforce user & password policies?
■■ Do you use two-factor authentication protection for
remote and local log-on?
■■ How are you enforcing Web and IM use and content?
■■ How are you protecting against viruses and spam?
■■ How do you protect your internal and mobile
corporate information?
Check Point
Mobile
Encryption
Check Point
Endpoint
Security
UPS
Servers
Check Point
Web
Intelligence
Check Point
Web
Intelligence
Application
Web
Data
Messaging
Servers
UPS
Benefits
Performance The Check Point Open Performance Architecture combines with general purpose
processors to provide complete security inspection that is far faster than ASIC-based systems.
■■ VoIP/SIP Communications Security Check Point delivers intelligent VoIP security that keeps the
telephone system safe without the need for reorganizing your whole security policy.
■■ Totally Integrated Endpoint Security Provides a single agent for total endpoint security that
combines the highest-rated firewall, network access control (NAC), program control, antivirus, anti spyware, data security and remote access.
■■ Simplified Security Solutions Blends the simplicity of a UTM appliance with the proven security
technologies that secure the world’s most demanding networks.
■■ Unified Security Management Check Point security management solutions are designed as
an interoperable system based on a core unified security architecture. This enables organizations to
centrally control security policy across multiple layers of the infrastructure.
■■ Complete Data Protection Secures data on all common platforms and meets strict compliance
requirements related to privacy laws and regulations. Also prevents unauthorized copying of sensitive
data.
■■
Target Markets
Enterprise Remote Access From client VPN access to clientless VPN access for business partners
and mobile employees, Check Point delivers the most comprehensive remote access solutions to meet
the needs of today’s distributed business.
■■ VoIP Deployments Check Point security solutions are designed to ensure VoIP can be deployed
efficiently and securely. By providing pure security solutions, Check Point is better able to support
multi-vendor environments with support for not just the widest variety of VoIP protocols but VoIP
vendors.
■■ Retail and Ecommerce Check Point solutions are comprehensive and integrated, serving as a solid
base for PCI compliance while also supporting requirements common to other security regulations.
■■ Healthcare Check Point helps healthcare providers to monitor its avalanche of data logs, to conform
to regulatory mandates, and to secure and protect its vital patient information with the highest level
of data security through strong full-disk encryption and robust access control.
■■ Education Provides educational institutions with a scalable security architecture that can provide
comprehensive security to protect against Internet attacks, as well as centralized management to
ease the burden of defining and distributing different elements of the security policy to remote
students and campus sites.
■■
securitypoint.westcon.com
How To Sell
Check Point Advanced
Comprehensive Security Solutions
Product Overview
Network Security
Firewall/VPN Provides organizations with the world’s most proven
solution, used by 100% of the Fortune 100. Enables organizations to
protect the entire network infrastructure and information with a unified
security architecture that simplifies management and ensures consistent,
up-to-date security everywhere.
■■ UTM (Unified Threat Management)
❏❏ VPN-1 Power VSX Virtualized security gateway that allows managed
service providers and enterprises with virtualized networks to create
up to 250 virtual security systems-including firewall, VPN, and intrusion
prevention-on a single hardware platform.
❏❏ VPN-1 MASS (Multi-Access Security Solution) Delivers the
foundation of secure fixed/mobile convergence (FMC) for carriers.
Supports both 3G Wireless Interworking (3G I-WLAN) and Unlicensed
Mobile Access (UMA, also known as Generic Access Network) as well as
traditional remote access VPNs. Scales to provide remote access for up to
100,000 secure voice channels, and massive amounts of data connections.
❏❏ FireWall-1 GX Delivers Check Point’s market-leading security to GPRS—
(2.5G) and UMTS— (3G) enabled wireless networks. With FireWall-1 GX,
wireless network operators can offer seamless roaming to their data
customers without exposing their network to potential security threats.
❏❏ VPN-1 Power These security gateways provide an active defense that
enables you to secure your most demanding sites – such as core
networks or data centers. Adapts as new applications are introduced and
new threats appear.
❏❏ VPN-1 UTM Consolidates proven security functions including firewall,
intrusion prevention, antivirus, antispyware, Web application firewall, and
both IPSec and SSL VPN, within a single integrated solution.
❏❏ VPN-1 UTM Power These security gateways combine the accelerated
security found in the VPN-1 Power product line with the simplicity of
the next generation UTM features found in VPN-1 UTM. The result is a
comprehensive solution with firewall, VPN, intrusion prevention, anti virus, Web filtering.
❏❏ VPN-1® Power™ Multi-core Provides integrated application security
at multi-gigabit speeds. Providing the same integrated firewall, VPN, and
intrusion prevention found in VPN-1 Power, VPN-1 Power Multi-core
builds on the latest multi-core technologies available in servers and
appliances to accelerate SmartDefense™ intrusion prevention.
❏❏ Web Intelligence Provides complete protection for the entire Web
environment. Supported by VPN-1 UTM, VPN-1 Power, UTM-1, and
Connectra, it provides a multi-layer defense for the network, operating
systems, Web servers, and backend systems it protects.
■■ Remote Access From client VPN access to clientless VPN access, Check
Point delivers the most comprehensive Remote Access Solutions to connect
a diverse mix of remote users with the strongest safeguards and unified
management to maximize security effectiveness.
❏❏ Connectra Complete Web Security Gateway that provides SSL VPN
access and comprehensive endpoint and integrated intrusion prevention
security in a single, unified remote access solution.
❏❏ SSL Network Extender Browser plug-in that provides SSL VPN-based
clientless remote access, while delivering full network connectivity for any
IP-based application.
❏❏ SecureClient Mobile Secure, uninterrupted remote access for Windows
mobile devices
■■ Intrusion Detection and Prevention Provides precise, real-time attack
mitigation, granular forensic analysis and flexible deployment options.
Delivered as both a dedicated IPS appliance and intrusion prevention that is
integrated into Check Point security gateways.
❏❏ IPS-1 Delivers mission critical protection with unmatched management,
granular forensic analysis and flexibility
❏❏ InterSpect Internal security gateway that combines intrusion prevention
features with network access control
■■
Endpoint Security
Unique product in that it includes both data security for preventing data
loss and theft and a VPN client for secure remote access communications.
Single management console. Unified with the Check Point unified security
architecture, enabling monitoring, analysis, and reporting of endpoint security
logs and events from SmartCenter™, Provider-1®, and Eventia® management
systems. Check Point Endpoint Security is the first single agent for total
endpoint security that combines the highest-rated firewall, network access
control (NAC), program control, antivirus, anti-spyware, data security, and
remote access.
Data Security
Based on market-leading Pointsec technologies, provides comprehensive data
protection for laptops, PCs, removable media and mobile devices.
■■ Mobile Encryption Completely secures enterprise data stored on
smartphones and PDAs running Symbian, Pocket PC, Windows Mobile
Smartphone and Palm operating systems. Device and memory card data are
encrypted automatically without user intervention.
■■ Full Disk Encryption Proven in enterprises and government agencies
around the world. Delivers unparalleled data security for laptop and desktop
PCs. A winning combination of robust data encryption, access control and
centralized fully–enforceable installation and management.
■■ Media Encryption & Port Management Prevents unauthorized copying
of sensitive data by combining port and device management, content filtering
and centralized auditing with robust media encryption. Plugs potential leak
points and logs data movement to and from any plug and play devices.
Security Management
Designed as an interoperable system based on a core unified security
architecture, enables organizations to centrally control security policy across
multiple layers of the infrastructure.
■■ SmartCenter Based on Check Point’s unified security architecture. Enables
organizations to perform all aspects of security management via a single,
unified console.
■■ Provider-1 The only security management solution that addresses
the unique requirements of large multi-policy environments. For service
providers, it consolidates and centralizes the management of security
policies for thousands of customers. For enterprise network operations
centers, it simplifies a complex security policy by segmenting it into
manageable sub-policies for geographic, functional, or other groupings.
■■ Eventia Suite Security information and event management (SIEM) solution
for enterprises looking to efficiently manage large volumes of data from
disparate sources. Automates and centralizes security log data analysis and
reporting.
■■ Security Management Portal (SMP) Central management and service
provisioning platform ideal for Managed Security Service Providers (MSSP)
targeting SMBs and vertical markets. Support the management of up
to tens of thousands of Check Point Safe@Office gateways. Can easily be
integrated with existing billing, CRM and other back-office systems..
■■ SMP On-Demand Fully-hosted central management and service
provisioning platform ideal for Managed Security Service Providers (MSSP)
targeting SMBs and vertical markets. Delivered as a “Software-as-a-Service”
(SaaS), supports the management of up to thousands of Check Point Safe@
Office gateways. Like SMP, it can easily be integrated with existing back office systems to support existing business processes.
■■ User Authority Improves application security and simplifies administration
by providing a unified, secure communication layer for authenticating users
to eBusiness applications.
VPN-1 Integrated Appliance Solution
Check Point VPN-1 Integrated Appliance Solution is for organizations that
need to combine the proven security of Check Point Software on high
performance platform with a single point of contact for fulfillment and
support. It enables organizations to quickly deploy VPN-1® Power™, VPN-1
UTM™, VPN-1 Power VSX™, or Check Point management infrastructure
products on a reliable, performance-oriented platform backed by Check Point
security and support. Solutions include 3 years software subscription and 3
years HW Warranty.
Doc.Ref:Mar08v1
securitypoint.westcon.com