(Go: >> BACK << -|- >> HOME <<)

SlideShare a Scribd company logo
Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud 
Peter Kovalcik| SE Eastern Europe 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. ©2014 Check Point Software Technologies Lt1d
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 2
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 3
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 4
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 5
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 6
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 7
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 8
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 9
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 10
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 11
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 12
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 13
Growing enterprise complexity 
[Protected] Non-confidential content 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 14
METHODOLOGY OF SDP 
STEP 1: SEGMENTATION 
STEP 2: DEFINE PROTECTIONS 
STEP 3: CONSOLIDATION 
STEP 4: POLICY DEFINITION 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 15
Segmentation 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 16
METHODOLOGY OF SDP 
STEP 1: SEGMENTATION 
STEP 2: DEFINE PROTECTIONS 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 17
Access Control vs. Threat Prevention 
[Protected] Non-confidential content 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 18
Risk-based Selection 
[Protected] Non-confidential content 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 19
Threat Prevention 
Segment Target Protections 
DMZ Servers IPS 
LAN Client machines IPS, AV, TE 
DC Servers IPS 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 20
Threat Prevention 
Segment Target Protections 
DMZ Servers IPS 
LAN Client machines IPS, AV, TE 
DC Servers IPS 
LAN Users AB 
C&C 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 21
Data Protection 
Segment Target Protections 
LAN Users DLP 
DC Servers, Data DLP 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 22
METHODOLOGY OF SDP 
STEP 1: SEGMENTATION 
STEP 2: DEFINE PROTECTIONS 
STEP 3: CONSOLIDATION 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 24
Consolidation 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 25
Virtual Edition: zabezp. VMware ESX 
Security Challenges 
in Virtual Environments 
Protection from external 
threats 
Inspect traffic between 
Virtual Machines (VMs) 
Secure new Virtual Machines 
automatically 
[Restricted] ONLY for designated groups and individuals 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 26
Network Mode Hypervisor Mode 
Ext 
2.1.1.1 2.1.1.2 
Pkt 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 27 
vSwitch 1 
Ext 
GW 
Pkt 
Security API 
vSwitch 
Agent 
Ext 
Agent 
Pkt 
VE 
Operation Mode 
• Protection from External threats 
• Not aware of inter-vSwitch traffic 
• Protects VMs with inter-vSwitch inspection 
• Supports dynamic virtual environment 
vSwitch 2 
Pkt 
[Restricted] ONLY for designated groups and individuals
Deployments before VMsafe 
integration 
Gateway is not aware of inter-vSwitch traffic 
2.1.1.1 2.1.1.3 
2.1.1.2 2.1.1.4 2.1.1.5 
vSwitch 
Packets not 
inspected inside 
vSwitch 
Ext 
GW 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 28 
Pkt 
[Restricted] ONLY for designated groups and individuals
Layer 2 security packet flow 
ESX Server 
2.1.1.1 sends 
packet to 2.1.1.3 
2.1.1.1 22..11..11..33 
2.1.1.2 2.1.1.4 2.1.1.5 
Pkt 
Agent Agent Agent Agent Agent 
vSwitch 
Pkt 
Packet continues the 
flow from where it was 
intercepted 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 29 
Pkt 
VE 
Security API 
Packet is not 
inspected again 
Packet passed firewall 
inspection and is sent 
back to the Agent 
Packet intercepted in the 
Agent and forwarded to the 
Gateway for inspection 
[Restricted] ONLY for designated groups and individuals
Layer 2 security in dynamic environments 
ESX 1 ESX 2 
2.1.1.2 
Ext Ext 
Sync 
Agent Agent Agent 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 30 
2.1.1.1 
Security API 
vSwitch 
VE 
Ext 
Security API 
vSwitch 
Ext Ext VE 
2.1.1.2 2.1.1.3 
Pkt 
Pkt 
Connection initiated from 
2.1.1.1 to 2.1.1.3 
[Restricted] ONLY for designated groups and individuals
Layer 2 security in dynamic environments 
ESX 1 ESX 2 
2.1.1.2 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 31 
2.1.1.1 
2.1.1.2 
Security API 
vSwitch 
Agent 
Ext 
Security API 
vSwitch 
Ext Ext 
2.1.1.3 
Agent 
Sync 
2.1.1.3 
Agent Agent 
Ext Ext 
VM is migrating 
to ESX 2 
Connections related with 
2.1.1.3 will be marked that 
they are handled by ESX 1 
SG VE SG VE 
[Restricted] ONLY for designated groups and individuals
PPkktt 
Agent 
Layer 2 security in dynamic environments 
ESX 1 ESX 2 
Ext Ext 
Packet 
forwarded to 
ESX 1 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 32 
Existing 
connection 
2.1.1.1 2.1.1.2 
Pkt 
Security API 
vSwitch 
Agent 
Security API 
vSwitch 
Ext Ext 
2.1.1.3 
Sync 
Agent 
Pkktt 
Pkt 
Packet not 
forwarded 
New 
connection 
VE VE 
Pkt 
[Restricted] ONLY for designated groups and individuals
Installation automation 
Seamless security for dynamic environments 
VM 1 VM 2 VM 3 
VM 4 VM 5 
Agent Agent Agent Agent Agent 
VE attaches the Fast Path 
Agents on the vNICs of 
the new VMs 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 33 
2.1.1.1 
Security API 
vSwitch 
SG VE 
Ext 
External 
Switch 
Ext 
Service Console 
ESX Server 
VE installed 
VE retrieves 
information on 
VMs/Port 
groups/vSwitches 
Event sent to VE 
informing of new VMs 
VE attaches the Fast Path 
Agents on the vNICs of 
the new VMs 
[Restricted] ONLY for designated groups and individuals
METHODOLOGY OF SDP 
STEP 1: SEGMENTATION 
STEP 2: DEFINE PROTECTIONS 
STEP 3: CONSOLIDATION 
STEP 4: POLICY DEFINITION 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 34
Management 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 35
• Security Management 
• Multi-Domain Management 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 36 
Summary 
Physical Security Gateway Management Server 
21400 VSLS 
Virtual security Gateway (VSX) 
Security Gateway Virtual Edition 
• Hypervisor Mode 
• Network Mode 
Cloud Orchestration
THANK YOU! 
©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. ©2014 Check Point Software Technologies L3t7d

More Related Content

What's hot

Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's SecurityTop 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Praetorian
 
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONGCODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
Group of company MUK
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
Sigfox
 
Hacking a Professional Drone
Hacking a Professional DroneHacking a Professional Drone
Hacking a Professional Drone
Priyanka Aash
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Priyanka Aash
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Honeywell
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
mohannadalhanahnah
 
checkpoint
checkpointcheckpoint
checkpoint
Mayank Dhingra
 
CCNP Security-IPS
CCNP Security-IPSCCNP Security-IPS
CCNP Security-IPS
mohannadalhanahnah
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
Priyanka Aash
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
dkaya
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
ASBIS SK
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
David Spinks
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
GENIANS, INC.
 
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
SalmenHAJJI1
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
Chris Sistrunk
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
networkershome
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
Chris Sistrunk
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
Group of company MUK
 

What's hot (20)

Top 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's SecurityTop 9 Critical Findings - Dramatically Improve Your Organization's Security
Top 9 Critical Findings - Dramatically Improve Your Organization's Security
 
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONGCODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
CODE BLUE 2014 : [ドローンへの攻撃] マルウェア感染とネットワーク経由の攻撃 by ドンチョル・ホン DONGCHEOL HONG
 
Check Point Virtual Systems
Check Point Virtual SystemsCheck Point Virtual Systems
Check Point Virtual Systems
 
Secure sigfox ready devices recommendation guide
Secure sigfox ready devices  recommendation guideSecure sigfox ready devices  recommendation guide
Secure sigfox ready devices recommendation guide
 
Hacking a Professional Drone
Hacking a Professional DroneHacking a Professional Drone
Hacking a Professional Drone
 
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
CCNP Security-Secure
CCNP Security-SecureCCNP Security-Secure
CCNP Security-Secure
 
checkpoint
checkpointcheckpoint
checkpoint
 
CCNP Security-IPS
CCNP Security-IPSCCNP Security-IPS
CCNP Security-IPS
 
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and CloudIEEE MACSec and NSA ESS: How to  Protect Your WAN, LAN and Cloud
IEEE MACSec and NSA ESS: How to Protect Your WAN, LAN and Cloud
 
Mitigating worm attacks
Mitigating worm attacksMitigating worm attacks
Mitigating worm attacks
 
Check Point: Security in virtual environment
Check Point: Security in virtual environmentCheck Point: Security in virtual environment
Check Point: Security in virtual environment
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2Ccna sv2 instructor_ppt_ch2
Ccna sv2 instructor_ppt_ch2
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
Mastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installationMastering checkpoint-1-basic-installation
Mastering checkpoint-1-basic-installation
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
Check Point sizing security
Check Point sizing securityCheck Point sizing security
Check Point sizing security
 

Similar to Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud

Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
MarketingArrowECS_CZ
 
vSEC pro VMware NSX
vSEC pro VMware NSXvSEC pro VMware NSX
vSEC pro VMware NSX
MarketingArrowECS_CZ
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
MarketingArrowECS_CZ
 
[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...
[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...
[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...
Ian Choi
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
MarketingArrowECS_CZ
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
Nextel S.A.
 
6th SDN Interest Group Seminar - Session6 (131210)
6th SDN Interest Group Seminar - Session6 (131210)6th SDN Interest Group Seminar - Session6 (131210)
6th SDN Interest Group Seminar - Session6 (131210)
NAIM Networks, Inc.
 
How to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowHow to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNow
SecPod
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
EBERTE
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
TI Safe
 
vSEC pro CISCO ACI
vSEC pro CISCO ACIvSEC pro CISCO ACI
vSEC pro CISCO ACI
MarketingArrowECS_CZ
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
MarketingArrowECS_CZ
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
Nextel S.A.
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
Ashley Zupkus
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
Moti Sagey מוטי שגיא
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
Krishna Chennareddy
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
Check Point Software Technologies
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
 
CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5
Chaing Ravuth
 

Similar to Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud (20)

Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
Zabezpečení softwarově definovaných datových center prostřednictvím Check Poi...
 
vSEC pro VMware NSX
vSEC pro VMware NSXvSEC pro VMware NSX
vSEC pro VMware NSX
 
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centraCheck Point vSEC - Bezpečnostní řešení pro moderní datová centra
Check Point vSEC - Bezpečnostní řešení pro moderní datová centra
 
[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...
[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...
[OVNC 2013] Controlling Secure & Software Defined Network for Cloud Infrastru...
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
Síla virtuality - virtualizovaná bezpečnost softwarově definovaných datových ...
 
Detección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check PointDetección y mitigación de amenazas con Check Point
Detección y mitigación de amenazas con Check Point
 
6th SDN Interest Group Seminar - Session6 (131210)
6th SDN Interest Group Seminar - Session6 (131210)6th SDN Interest Group Seminar - Session6 (131210)
6th SDN Interest Group Seminar - Session6 (131210)
 
How to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNowHow to securely manage endpoints using SanerNow
How to securely manage endpoints using SanerNow
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
vSEC pro CISCO ACI
vSEC pro CISCO ACIvSEC pro CISCO ACI
vSEC pro CISCO ACI
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
Gestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazasGestiona el riesgo de las grandes amenazas
Gestiona el riesgo de las grandes amenazas
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Mind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_finalMind the gap_cpx2022_moti_sagey_final
Mind the gap_cpx2022_moti_sagey_final
 
Operational Technology Security Solution for Utilities
Operational Technology Security Solution for UtilitiesOperational Technology Security Solution for Utilities
Operational Technology Security Solution for Utilities
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5CCNA4 Verson6 Chapter5
CCNA4 Verson6 Chapter5
 

More from MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
MarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
MarketingArrowECS_CZ
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
MarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
MarketingArrowECS_CZ
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
MarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
MarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
MarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
MarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
MarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
MarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
MarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
MarketingArrowECS_CZ
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
MarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
MarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
MarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
MarketingArrowECS_CZ
 

More from MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Recently uploaded

DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
Edge AI and Vision Alliance
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
Lessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien RiouxLessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien Rioux
crioux1
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
anupriti
 
Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1
FellyciaHikmahwarani
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
The Digital Insurer
 
Running a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU ImpactsRunning a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU Impacts
ScyllaDB
 
Hire a private investigator to get cell phone records
Hire a private investigator to get cell phone recordsHire a private investigator to get cell phone records
Hire a private investigator to get cell phone records
HackersList
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
BookNet Canada
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
Larry Smarr
 
this resume for sadika shaikh bca student
this resume for sadika shaikh bca studentthis resume for sadika shaikh bca student
this resume for sadika shaikh bca student
SadikaShaikh7
 
MYIR Product Brochure - A Global Provider of Embedded SOMs & Solutions
MYIR Product Brochure - A Global Provider of Embedded SOMs & SolutionsMYIR Product Brochure - A Global Provider of Embedded SOMs & Solutions
MYIR Product Brochure - A Global Provider of Embedded SOMs & Solutions
Linda Zhang
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
Raphaël Semeteys
 
What's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdfWhat's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdf
SeasiaInfotech2
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
SynapseIndia
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
ScyllaDB
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 

Recently uploaded (20)

DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
“Intel’s Approach to Operationalizing AI in the Manufacturing Sector,” a Pres...
 
The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
Lessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien RiouxLessons Of Binary Analysis - Christien Rioux
Lessons Of Binary Analysis - Christien Rioux
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum ThreatsNavigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
Navigating Post-Quantum Blockchain: Resilient Cryptography in Quantum Threats
 
Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1Why do You Have to Redesign?_Redesign Challenge Day 1
Why do You Have to Redesign?_Redesign Challenge Day 1
 
K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024K2G - Insurtech Innovation EMEA Award 2024
K2G - Insurtech Innovation EMEA Award 2024
 
Running a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU ImpactsRunning a Go App in Kubernetes: CPU Impacts
Running a Go App in Kubernetes: CPU Impacts
 
Hire a private investigator to get cell phone records
Hire a private investigator to get cell phone recordsHire a private investigator to get cell phone records
Hire a private investigator to get cell phone records
 
Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024Details of description part II: Describing images in practice - Tech Forum 2024
Details of description part II: Describing images in practice - Tech Forum 2024
 
The Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive ComputingThe Rise of Supernetwork Data Intensive Computing
The Rise of Supernetwork Data Intensive Computing
 
this resume for sadika shaikh bca student
this resume for sadika shaikh bca studentthis resume for sadika shaikh bca student
this resume for sadika shaikh bca student
 
MYIR Product Brochure - A Global Provider of Embedded SOMs & Solutions
MYIR Product Brochure - A Global Provider of Embedded SOMs & SolutionsMYIR Product Brochure - A Global Provider of Embedded SOMs & Solutions
MYIR Product Brochure - A Global Provider of Embedded SOMs & Solutions
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
AI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AIAI_dev Europe 2024 - From OpenAI to Opensource AI
AI_dev Europe 2024 - From OpenAI to Opensource AI
 
What's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdfWhat's Next Web Development Trends to Watch.pdf
What's Next Web Development Trends to Watch.pdf
 
How RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptxHow RPA Help in the Transportation and Logistics Industry.pptx
How RPA Help in the Transportation and Logistics Industry.pptx
 
How to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory ModelHow to Avoid Learning the Linux-Kernel Memory Model
How to Avoid Learning the Linux-Kernel Memory Model
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 

Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud

  • 1. Bezpečnostní architektura Check Point (nejen) pro váš privátní cloud Peter Kovalcik| SE Eastern Europe ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. ©2014 Check Point Software Technologies Lt1d
  • 2. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 2
  • 3. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 3
  • 4. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 4
  • 5. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 5
  • 6. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 6
  • 7. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 7
  • 8. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 8
  • 9. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 9
  • 10. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 10
  • 11. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 11
  • 12. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 12
  • 13. ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 13
  • 14. Growing enterprise complexity [Protected] Non-confidential content ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 14
  • 15. METHODOLOGY OF SDP STEP 1: SEGMENTATION STEP 2: DEFINE PROTECTIONS STEP 3: CONSOLIDATION STEP 4: POLICY DEFINITION ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 15
  • 16. Segmentation ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 16
  • 17. METHODOLOGY OF SDP STEP 1: SEGMENTATION STEP 2: DEFINE PROTECTIONS ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 17
  • 18. Access Control vs. Threat Prevention [Protected] Non-confidential content ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 18
  • 19. Risk-based Selection [Protected] Non-confidential content ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 19
  • 20. Threat Prevention Segment Target Protections DMZ Servers IPS LAN Client machines IPS, AV, TE DC Servers IPS ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 20
  • 21. Threat Prevention Segment Target Protections DMZ Servers IPS LAN Client machines IPS, AV, TE DC Servers IPS LAN Users AB C&C ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 21
  • 22. Data Protection Segment Target Protections LAN Users DLP DC Servers, Data DLP ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 22
  • 23. METHODOLOGY OF SDP STEP 1: SEGMENTATION STEP 2: DEFINE PROTECTIONS STEP 3: CONSOLIDATION ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 24
  • 24. Consolidation ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 25
  • 25. Virtual Edition: zabezp. VMware ESX Security Challenges in Virtual Environments Protection from external threats Inspect traffic between Virtual Machines (VMs) Secure new Virtual Machines automatically [Restricted] ONLY for designated groups and individuals ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 26
  • 26. Network Mode Hypervisor Mode Ext 2.1.1.1 2.1.1.2 Pkt ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 27 vSwitch 1 Ext GW Pkt Security API vSwitch Agent Ext Agent Pkt VE Operation Mode • Protection from External threats • Not aware of inter-vSwitch traffic • Protects VMs with inter-vSwitch inspection • Supports dynamic virtual environment vSwitch 2 Pkt [Restricted] ONLY for designated groups and individuals
  • 27. Deployments before VMsafe integration Gateway is not aware of inter-vSwitch traffic 2.1.1.1 2.1.1.3 2.1.1.2 2.1.1.4 2.1.1.5 vSwitch Packets not inspected inside vSwitch Ext GW ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 28 Pkt [Restricted] ONLY for designated groups and individuals
  • 28. Layer 2 security packet flow ESX Server 2.1.1.1 sends packet to 2.1.1.3 2.1.1.1 22..11..11..33 2.1.1.2 2.1.1.4 2.1.1.5 Pkt Agent Agent Agent Agent Agent vSwitch Pkt Packet continues the flow from where it was intercepted ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 29 Pkt VE Security API Packet is not inspected again Packet passed firewall inspection and is sent back to the Agent Packet intercepted in the Agent and forwarded to the Gateway for inspection [Restricted] ONLY for designated groups and individuals
  • 29. Layer 2 security in dynamic environments ESX 1 ESX 2 2.1.1.2 Ext Ext Sync Agent Agent Agent ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 30 2.1.1.1 Security API vSwitch VE Ext Security API vSwitch Ext Ext VE 2.1.1.2 2.1.1.3 Pkt Pkt Connection initiated from 2.1.1.1 to 2.1.1.3 [Restricted] ONLY for designated groups and individuals
  • 30. Layer 2 security in dynamic environments ESX 1 ESX 2 2.1.1.2 ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 31 2.1.1.1 2.1.1.2 Security API vSwitch Agent Ext Security API vSwitch Ext Ext 2.1.1.3 Agent Sync 2.1.1.3 Agent Agent Ext Ext VM is migrating to ESX 2 Connections related with 2.1.1.3 will be marked that they are handled by ESX 1 SG VE SG VE [Restricted] ONLY for designated groups and individuals
  • 31. PPkktt Agent Layer 2 security in dynamic environments ESX 1 ESX 2 Ext Ext Packet forwarded to ESX 1 ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 32 Existing connection 2.1.1.1 2.1.1.2 Pkt Security API vSwitch Agent Security API vSwitch Ext Ext 2.1.1.3 Sync Agent Pkktt Pkt Packet not forwarded New connection VE VE Pkt [Restricted] ONLY for designated groups and individuals
  • 32. Installation automation Seamless security for dynamic environments VM 1 VM 2 VM 3 VM 4 VM 5 Agent Agent Agent Agent Agent VE attaches the Fast Path Agents on the vNICs of the new VMs ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 33 2.1.1.1 Security API vSwitch SG VE Ext External Switch Ext Service Console ESX Server VE installed VE retrieves information on VMs/Port groups/vSwitches Event sent to VE informing of new VMs VE attaches the Fast Path Agents on the vNICs of the new VMs [Restricted] ONLY for designated groups and individuals
  • 33. METHODOLOGY OF SDP STEP 1: SEGMENTATION STEP 2: DEFINE PROTECTIONS STEP 3: CONSOLIDATION STEP 4: POLICY DEFINITION ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 34
  • 34. Management ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 35
  • 35. • Security Management • Multi-Domain Management ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. 36 Summary Physical Security Gateway Management Server 21400 VSLS Virtual security Gateway (VSX) Security Gateway Virtual Edition • Hypervisor Mode • Network Mode Cloud Orchestration
  • 36. THANK YOU! ©2014 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. ©2014 Check Point Software Technologies L3t7d