2
Most read
11
COMPLETE SECURITY
2©2020 Check Point Software Technologies Ltd.
IoT
WORKLOADS
COMPLETE SECURITY
WE SECURE 50+ TYPES
OF ASSETS CLOUD
MOBILE
Android 4.0 & up
7-10 32/64-bit
x10.8- x10.12
NETWORKS
ENDPOINT
iOS 9.0 & up
TCPUDP IP
3
Python
Code scan
Terraform
Integration
Open
Source
Vulnerability
Scanning
1
2
3
4
5
Anti-
ransomware
Context
aware
detection
Zero
phishing
Account
takeover
Malware
evasion
resistance
Huntress
Domain
reputation
Anti
Phishing
Anti
Spam
URL
reputation
VPN
Firewall
URL
filtering
Application
Control
Cloud
Native
Access
Identity
Awareness
IP
reputationAnti-bot
Anti-virus
Intrusion
prevention
Campaign
hunting
Threat
emulation
Threat
extraction
Malware
DNA
CPU-level
inspection
Mobile
Apps
Security
SDN
Micro
Segmentation
DLP
Remote
access
DDoSSD-WAN
LAMBDA
Compliance
Cloud
Bot
remediation
WAAP
Dynamic
Code
Analysis
Binary
Vulnerability
scanning
Container
Zero Trust
IaaS
Compliance
Static
Code
Analysis
Vulnerability
management
Hidden
Attacks
One-line
API
Linux
UEBA
Linux
Hardening
Linux
Run-time
security
COMPLETE SECURITY
WITH 60+
SECURITY SERVICES
5Code & API Security
1Prevent Known
3Zero Trust Access
2Prevent Unknown
Prevent Known1
Prevent Unknown2
Zero Trust Access3
Hardening & Compliance4
Code & API Security5
GDPR
SOC
HIPA
4 Hardening &
Compliance
©2020 Check Point Software Technologies Ltd.
4
Python
Code scan
Terraform
Integration
Open
Source
Vulnerability
Scanning
1
2
3
4
5
Anti-
ransomware
Context
aware
detection
Zero
phishing
Account
takeover
Malware
evasion
resistance
Huntress
Domain
reputation
Anti
Phishing
Anti
Spam
URL
reputation
VPN
Firewall
URL
filtering
Application
Control
Cloud
Native
Access
Identity
Awareness
IP
reputationAnti-bot
Anti-virus
Intrusion
prevention
Campaign
hunting
Threat
emulation
Threat
extraction
Malware
DNA
CPU-level
inspection
Mobile
Apps
Security
SDN
Micro
Segmentation
DLP
Remote
access
DDoSSD-WAN
LAMBDA
Compliance
Cloud
Bot
remediation
WAAP
Dynamic
Code
Analysis
Binary
Vulnerability
scanning
Container
Zero Trust
IaaS
Compliance
Static
Code
Analysis
Vulnerability
management
Hidden
Attacks
One-line
API
Linux
UEBA
Linux
Hardening
Linux
Run-time
security
COMPLETE SECURITY
WITH 60+
SECURITY SERVICES
Prevent Known1
Prevent Unknown2
Zero Trust Access3
Hardening & Compliance4
Code & API Security5
GDPR
SOC
HIPAA
©2020 Check Point Software Technologies Ltd.
5
THE MOST COMPLETE SECURITY
OVER 60 SECURITY
SERVICES
PROTECTING 50+
TYPES OF ASSESTS
©2020 Check Point Software Technologies Ltd.
6
NETWORK
Shared
Threat Intelligence
Multi & Hybrid Cloud
Headquarters Branch
Access Control
Multi Layered Security
Advanced Threat Prevention
Data Protection
Access Control
Multi Layered Security
Advanced Threat Prevention
Wi-Fi, DSL, PPoE Ready
MOBILE
Network Protection
Device Protection
App Protection
Capsule
WorkSpace/Docs
Remote Access
Secure Business Data
Protect Docs Everywhere
ENDPOINT
Anti-Ransomware
Forensics
Threat Prevention
Access/Data Security
Access Control
Secure Media
Secure Documents
CLOUD
SaaS, Email Security
Consolidated
Security Management
SD-WAN
INTERNET of THINGS
Risk Analysis, Auto Segmentation, Threat Prevention
Runtime Workload Protection
Cloud Posture Management Network Traffic Analysis
Cloud Access Control, Prevention Branch Threat Prevention
THE MOST COMPLETE SECURITY
7©2020 Check Point Software Technologies Ltd.
MANAGEMENT
Consolidated
Security
Management
THREAT
INTELLIGENCE
MOBILE
Network Protection
Device Protection
App Protection
Capsule
WorkSpace/
Docs
Remote Access
Secure Business
data
Protect docs
everywhere
ENDPOINT
Anti-Ransomware
Forensics
Threat Prevention
Access/Data Security
Access Control
Secure
Media
Secure Documents
CLOUD
Headquarters Branch
Access Control
Multi Layered Security
Advanced Threat
Prevention
Access Control
Multi Layered Security
Advanced Threat
Prevention
Wi-Fi, DSL, PoE Ready
NETWORK
Email, Serverless, Workloads, Infrastructure, and Posture Management
Identity
Protection
Sensitive Data Protection
Zero-Day Threat Protection
End-to-end SaaS Security
Advanced
Threat Prevention
Adaptive Security
Automation and
Orchestration
Visibility, Cross
Environment Policies,
Remediation
Hybrid Cloud
Data Protection
SD-WAN
THE MOST COMPLETE SECURITY
8
MOBILE
CYBERSECURITY
ECOSYSTEM
Shared Threat Intelligence
MANAGEMENTNETWORK
CLOUD
9
UNIFIED SECURITY ACROSS ALL ASSETS
EndpointsMobile OSs
Serverless
Environments
PlatformsIoT
Data CentersBranches
Cloud accounts
Web
ApplicationsContainers
Mobile Apps
SaaS Apps
PaaS
services
©2020 Check Point Software Technologies Ltd.

More Related Content

PPTX
palo-alto-networks-sase-overview-deck.pptx
PPTX
Azure Security Fundamentals
PDF
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
PPTX
Check Point Corporate Overview 2020 - Detailed
PDF
VMware Horizon DaaS for Service Providers
PPTX
Azure Stack Fundamentals
PDF
evolving-network-technologies-e-book.pdf
PDF
Cloud Security Strategy
palo-alto-networks-sase-overview-deck.pptx
Azure Security Fundamentals
Azure Arc - Managing Hybrid and Multi-Cloud Platforms
Check Point Corporate Overview 2020 - Detailed
VMware Horizon DaaS for Service Providers
Azure Stack Fundamentals
evolving-network-technologies-e-book.pdf
Cloud Security Strategy

What's hot (20)

PDF
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
PPTX
Cyber Defense Matrix: Revolutions
PDF
VMware NSX 101: What, Why & How
PDF
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
PPTX
Fortinet k
PDF
IBM DataPower Gateway appliances feature & virtual edition comparison
PDF
Fortinet security fabric
PPTX
Azure security and Compliance
PPT
Cloud computing
PDF
Understanding SASE
PDF
2019 DevSecOps Reference Architectures
PPTX
AWS solution Architect Associate study material
PDF
AWS Well-Architected Review
PDF
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
PPTX
AWS VS AZURE VS GCP.pptx
PPTX
Understanding the Cyber Security Vendor Landscape
PPTX
Cisco Security portfolio update
PPTX
Cloud security
PDF
Practical DevSecOps - Arief Karfianto
PPTX
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Enterprise WAN Transformation: SD-WAN, SASE, and the Pandemic
Cyber Defense Matrix: Revolutions
VMware NSX 101: What, Why & How
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Fortinet k
IBM DataPower Gateway appliances feature & virtual edition comparison
Fortinet security fabric
Azure security and Compliance
Cloud computing
Understanding SASE
2019 DevSecOps Reference Architectures
AWS solution Architect Associate study material
AWS Well-Architected Review
Emerging Trends in Hybrid-Cloud & Multi-Cloud Strategies
AWS VS AZURE VS GCP.pptx
Understanding the Cyber Security Vendor Landscape
Cisco Security portfolio update
Cloud security
Practical DevSecOps - Arief Karfianto
Building an Enterprise-scale DevSecOps Infrastructure: Lessons Learned
Ad

Similar to Check point Infinity Overview (20)

PPTX
Modelo de apresentação do Security Series 2022
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PPTX
What's new in​ CEHv11?
PPTX
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
PDF
Security_Reference_Architecture_Overview_and_Use_Cases_072023_PDF.pdf
PPTX
Security: more important than ever - Sophos Day Belux 2014
PPTX
Check Point Solutions Portfolio- Detailed
PPTX
Vulnerability in Security Products
PPTX
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
PDF
Trust Wallet Clone Development
PDF
Generación V de ciberataques
PPTX
IT security for busines
PDF
security-reference-architecture.pdf
PDF
Blockchain Cybersecurity Development
PDF
Blockchain Cybersecurity
PPTX
Introduction to WAF and Network Application Security
PPTX
Steve Porter : cloud Computing Security
PPT
Volume And Vectors 090416
PDF
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
PPTX
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Modelo de apresentação do Security Series 2022
Estratégia de segurança da Cisco (um diferencial para seus negócios)
What's new in​ CEHv11?
PLNOG 17 - Marek Karczewski - Mity i fakty skutecznej ochrony aplikacji inter...
Security_Reference_Architecture_Overview_and_Use_Cases_072023_PDF.pdf
Security: more important than ever - Sophos Day Belux 2014
Check Point Solutions Portfolio- Detailed
Vulnerability in Security Products
EDR - Cehckpoint CPX 2024 Harmony Endpoint.pptx
Trust Wallet Clone Development
Generación V de ciberataques
IT security for busines
security-reference-architecture.pdf
Blockchain Cybersecurity Development
Blockchain Cybersecurity
Introduction to WAF and Network Application Security
Steve Porter : cloud Computing Security
Volume And Vectors 090416
Cisco Connect 2018 Malaysia - Cybersecurity strategy-an integrated approach
Sophos synchronized security in action @Netpluz CS Event Nov 2017
Ad

More from Moti Sagey מוטי שגיא (18)

PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PDF
Why Check Point - Top 4 Facts
PPTX
Mind the gap_cpx2022_moti_sagey_final
PDF
Why check point win top 4 facts
PDF
Why Check Point - Moti Sagey
DOCX
NGFW RFP TEMPLATE - TEST PLAN
PPTX
Check Point vs competition security effectiveness
PDF
Why Check Point - Top 4
DOCX
Security architecture proposal template
PDF
Cyber Security Coverage heat map
PDF
Moti Sagey CPX keynote _Are All security products created equal
PPTX
Cyber intro 2017_hebrew
PDF
Check point response to Cisco NGFW competitive
PDF
Check Point mission statement
PDF
How to Choose a SandBox - Gartner
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
How to expose shortcuts in competitive poc
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Why Check Point - Top 4 Facts
Mind the gap_cpx2022_moti_sagey_final
Why check point win top 4 facts
Why Check Point - Moti Sagey
NGFW RFP TEMPLATE - TEST PLAN
Check Point vs competition security effectiveness
Why Check Point - Top 4
Security architecture proposal template
Cyber Security Coverage heat map
Moti Sagey CPX keynote _Are All security products created equal
Cyber intro 2017_hebrew
Check point response to Cisco NGFW competitive
Check Point mission statement
How to Choose a SandBox - Gartner
CPX 2016 Moti Sagey Security Vendor Landscape
How to expose shortcuts in competitive poc

Recently uploaded (20)

PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
Reading as a good Form of Recreation
PDF
The Evolution of Traditional to New Media .pdf
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PPTX
Cyber Hygine IN organizations in MSME or
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
Computer Networking, Internet, Casting in Network
PPTX
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
PPT
12 Things That Make People Trust a Website Instantly
PDF
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
PPTX
Partner to Customer - Sales Presentation_V23.01.pptx
PPTX
MY PRESENTATION66666666666666666666.pptx
PPTX
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
PPTX
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PDF
Alethe Consulting Corporate Profile and Solution Aproach
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Reading as a good Form of Recreation
The Evolution of Traditional to New Media .pdf
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
AI_Cyberattack_Solutions AI AI AI AI .pptx
Cyber Hygine IN organizations in MSME or
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Computer Networking, Internet, Casting in Network
在线订购名古屋艺术大学毕业证, buy NUA diploma学历认证失败怎么办
12 Things That Make People Trust a Website Instantly
Session 1 (Week 1)fghjmgfdsfgthyjkhfdsadfghjkhgfdsa
Partner to Customer - Sales Presentation_V23.01.pptx
MY PRESENTATION66666666666666666666.pptx
ECO SAFE AI - SUSTAINABLE SAFE AND HOME HUB
Tìm hiểu về dịch vụ FTTH - Fiber Optic Access Node
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
Layers_of_the_Earth_Grade7.pptx class by
Alethe Consulting Corporate Profile and Solution Aproach

Check point Infinity Overview

Editor's Notes

  • #2: As we strive to offer the best possible cyber security technology, we started researching and introducing AI-based engines across our Threat Prevention platform, in different capacities, and I’d like to tell you about a few of these engines and the success we are seeing with them
  • #9: Check Point provides a rich set of APIs to integrate third party security tools as part of the broader security infrastructure. Check Point enables you to build a single, cohesive security posture while making your security team more efficient and effective in their operations. Check Point delivers that comprehensive and timely threat intelligence across all of your enforcement points. Through Check Point ThreatCloud, all enforcement points in your network, cloud and mobile are armed with threat intelligence derived from multiple external feeds, internal research, and indicators from Check Point customers around the world. While ThreatCloud provides the foundation, we understand that any security infrastructure likely includes additional products and data sources.
  • #10: Data tube – baseline for all logs, registration process Sourceguard – CI/CD of GitLab on CVE vulnerabilities – Currently in POC Shift – CloudGuard IaaS – injection of IaaS into cloud