Mobile Security Revolutionized

CHECK POINT
Mobile Security Revolutionized
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
1
Rapidly Expanding Mobile Threats
M O B I L E T H R E A T S are ESCALATING
in frequency and sophistication E V E R Y Y E A R
11.6 million
mobile devices
infected2
2007
First iPhone
2008
First Android
2010
First mobile virus1
2005
•
2004
•
2012
•
SMS Trojans
CABIR worm,
Infecting Symbian OS
via Bluetooth connection
1st malware for
Android and iOS
1Source:
2Source:
[Restricted] ONLY for designated groups and individuals
2014
•
Spyware
•
Ransomware
•
Root exploits
•
Banking
malware
Symantec, “A Brief History of Mobile Malware” February 2014
Kindsight Security Labs Malware Report 2013
©2014 Check Point Software Technologies Ltd.
2
Has your mobile device been used …
To access
Dropbox?
By your kids?
Facebook?
Over 30% of parents
let their kids
use their corporate
devices1
71% of adults over
18 have a Facebook
account2
12013
Norton Report, Oct 2013, by Symantec
22013
Pew Research Center Internet Project Tracking Survey
3Nasuni
[Restricted] ONLY for designated groups and individuals
1 in 5 employees
use consumer cloud
storage for work
documents3
Survey of 1300 business users as reported by GigaOm
©2014 Check Point Software Technologies Ltd.
3
Infection or Loss … Easy as 1, 2, 3
SURF THE INTERNET
FORGET DEVICE
[Restricted] ONLY for designated groups and individuals
UPLOAD FILES
TO THE CLOUD
©2014 Check Point Software Technologies Ltd.
4
So maybe you only did one of these
Now
By the number of
Employees =
C O N S E R V A T I V E number of potential
B R E A C H E S on your network
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
5
Expanding Network for the CIO
Protecting Across ALL Networks
Protect Documents
Everywhere
Protect Devices on
Other Networks
Protect Own Network
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
6
Today’s Solutions Leave Security Gaps
•
Device management focused
•
No protection for data once
it leaves the device
•
No capability to secure
devices from threats
•
Complex management
requiring multiple consoles
How do you protect devices from T H R E A T S ?
How do you protect D A T A wherever it goes?
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
7
Are You S E C U R E In Today’s
M O B I L E Environment?
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
8
Introducing….
• Establishes a secure business environment on mobile devices
• Secures your documents everywhere they go
• Protects devices from threats everywhere
SEAMLESS security for everywhere you go
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
9
A Secure Business Environment
SECURELY log-in
EASILY ACCESS
business applications
PLACE ONLY business
*****
information under IT’s control
Protect business data E V E R Y W H E R E
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
10
Secure documents at your organization
My-Company
NO passwords
SEAMLESS access for
authorized users
GRANULAR document
permissions
Secure documents E V E R Y W H E R E they go
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
11
Secure mobile devices
On Premise Gateways
On Premise
Off Premise
Check Point Capsule
Scans all traffic in the cloud
Protect A L L devices from viruses, threats and data leakage
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
12
Single Security Management for
On Premise and Cloud
On Premise
Security Gateways
Check Point
Capsule
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
13
Integrated IT Experience and Management
Know
WHERE
documents
are sent
Know
WHO is
accessing
files
[Restricted] ONLY for designated groups and individuals
Know
WHEN
unauthorized
access is
attempted
Know
WHAT
actions are
taken
©2014 Check Point Software Technologies Ltd.
14
Runs on All Platforms
PLATFORMS
•iOS
•Android
•Mac OS X
DOCUMENTS
• Microsoft
Office
• Adobe PDF
•Windows
Only solution providing C O M P R E H E N S I V E coverage
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
15
S E A M L E S S security for everywhere you go
• Establishes a secure business environment on mobile devices
• Secures your documents everywhere they go
• Protects devices from threats everywhere
Addressing A L L your mobile security needs
[Restricted] ONLY for designated groups and individuals
©2014 Check Point Software Technologies Ltd.
16
©2014 Check Point Software Technologies Ltd.
17