CHECK POINT Mobile Security Revolutionized [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 1 Rapidly Expanding Mobile Threats M O B I L E T H R E A T S are ESCALATING in frequency and sophistication E V E R Y Y E A R 11.6 million mobile devices infected2 2007 First iPhone 2008 First Android 2010 First mobile virus1 2005 • 2004 • 2012 • SMS Trojans CABIR worm, Infecting Symbian OS via Bluetooth connection 1st malware for Android and iOS 1Source: 2Source: [Restricted] ONLY for designated groups and individuals 2014 • Spyware • Ransomware • Root exploits • Banking malware Symantec, “A Brief History of Mobile Malware” February 2014 Kindsight Security Labs Malware Report 2013 ©2014 Check Point Software Technologies Ltd. 2 Has your mobile device been used … To access Dropbox? By your kids? Facebook? Over 30% of parents let their kids use their corporate devices1 71% of adults over 18 have a Facebook account2 12013 Norton Report, Oct 2013, by Symantec 22013 Pew Research Center Internet Project Tracking Survey 3Nasuni [Restricted] ONLY for designated groups and individuals 1 in 5 employees use consumer cloud storage for work documents3 Survey of 1300 business users as reported by GigaOm ©2014 Check Point Software Technologies Ltd. 3 Infection or Loss … Easy as 1, 2, 3 SURF THE INTERNET FORGET DEVICE [Restricted] ONLY for designated groups and individuals UPLOAD FILES TO THE CLOUD ©2014 Check Point Software Technologies Ltd. 4 So maybe you only did one of these Now By the number of Employees = C O N S E R V A T I V E number of potential B R E A C H E S on your network [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 5 Expanding Network for the CIO Protecting Across ALL Networks Protect Documents Everywhere Protect Devices on Other Networks Protect Own Network [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 6 Today’s Solutions Leave Security Gaps • Device management focused • No protection for data once it leaves the device • No capability to secure devices from threats • Complex management requiring multiple consoles How do you protect devices from T H R E A T S ? How do you protect D A T A wherever it goes? [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 7 Are You S E C U R E In Today’s M O B I L E Environment? [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 8 Introducing…. • Establishes a secure business environment on mobile devices • Secures your documents everywhere they go • Protects devices from threats everywhere SEAMLESS security for everywhere you go [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 9 A Secure Business Environment SECURELY log-in EASILY ACCESS business applications PLACE ONLY business ***** information under IT’s control Protect business data E V E R Y W H E R E [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 10 Secure documents at your organization My-Company NO passwords SEAMLESS access for authorized users GRANULAR document permissions Secure documents E V E R Y W H E R E they go [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 11 Secure mobile devices On Premise Gateways On Premise Off Premise Check Point Capsule Scans all traffic in the cloud Protect A L L devices from viruses, threats and data leakage [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 12 Single Security Management for On Premise and Cloud On Premise Security Gateways Check Point Capsule [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 13 Integrated IT Experience and Management Know WHERE documents are sent Know WHO is accessing files [Restricted] ONLY for designated groups and individuals Know WHEN unauthorized access is attempted Know WHAT actions are taken ©2014 Check Point Software Technologies Ltd. 14 Runs on All Platforms PLATFORMS •iOS •Android •Mac OS X DOCUMENTS • Microsoft Office • Adobe PDF •Windows Only solution providing C O M P R E H E N S I V E coverage [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 15 S E A M L E S S security for everywhere you go • Establishes a secure business environment on mobile devices • Secures your documents everywhere they go • Protects devices from threats everywhere Addressing A L L your mobile security needs [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. 16 ©2014 Check Point Software Technologies Ltd. 17
© Copyright 2025