0% found this document useful (0 votes)
29 views

3D Security Analysis Report April-18-12

C)2012 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties are you really secured?
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views

3D Security Analysis Report April-18-12

C)2012 Check Point Software Technologies Ltd. [Confidential] For Check Point users and approved third parties are you really secured?
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 26

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

Agenda

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

2 2

Agenda

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

3 3

We have security therefore we are secured

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

4 4

Are you really secured?

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

5 5

How About Web Usage Control?

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

6 6

What about Sensitive Do you know where it is being sent to?

Information?

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

7 7

Is your organization protected from Bots & Viruses?

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

8 8

Security Challenges Summary


Threats and Intrusions

High Risk Applications

Sensitive Information Loss

Bots & Viruses

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

9 9

Know Your Current Security Status


Threats and Intrusions

High Risk Applications

Sensitive Information Loss

Bots & Viruses 12 Bots & Viruses Found 23 Infected Hosts


| 10 10

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

How to generate a report?


Check Point SmartEvent (Special activation file required)

One Click!

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 11 11

Agenda

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 12 12

Simple to Read No Interference to Your Network Free of Charge Fully Customizable

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 13 13

The Report
Clear Executive Summary

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 14 14

The Report

Summary of Top Events

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 15 15

The Report
Security Findings

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 16 16

The Report

Recommended Remediation

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 17 17

Agenda

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 18 18

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 19 19

Mirror Port

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 20 20

Delivery Method (recommendations)

Report is customizable- can change logo and template

Once report is finalized, convert to PDF


Share the report with the customer (password protected) Conduct mutual discussion with customer pointing key findings: Discuss the results Discuss the evaluation phase and blades used Explain the simplicity of obtaining security with 3D

Conclude the meeting by discussing next steps by promoting 3D Software Security Blades

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 21 21

Customers Registration
www.checkpoint.com

Register Now

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 22 22

Promotions

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 23 23

Availability
Check Point PartnerMAP
Tutorial Video

Tool download
User Guide And more

02:47

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 24 24

Partner Rebate for 3D Security Analysis Reports! Show them you mean BUSINESS, Show them you mean 3D SECURITY!

Submit through PartnerMAP 10 customer-signed 3D Security Analysis Reports and get a rebate of $1000

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 25 25

Agenda

2012 Check Point Software Technologies Ltd.

[Confidential] For Check Point users and approved third parties

| 26 26

You might also like