SlideShare a Scribd company logo
©2017 Check Point Software Technologies Ltd.©2017 Check Point Software Technologies Ltd. [Protected] Non-confidential content​
‫הדיגיטלית‬ ‫המהפכה‬
‫והשפעות‬‫הסייבר‬ ‫עולם‬
‫קדימה‬ ‫אחד‬ ‫צעד‬ ‫להיות‬
‫שגיא‬ ‫מוטי‬
‫אנחנו‬
‫חיים‬
‫בעולם‬
‫נפלא‬
‫חיים‬ ‫אנו‬‫יותר‬
Source: ourworldindata.org
age
‫חיים‬ ‫תוחלת‬
‫איכות‬‫החיים‬
‫יותר‬ ‫טובה‬
Source: ourworldindata.org
‫העוני‬ ‫קו‬
%‫העוני‬ ‫לקו‬ ‫מתחת‬ ‫מהאוכלסיה‬
‫מקבלים‬ ‫אנו‬‫טוב‬ ‫חינוך‬‫יותר‬
Source: ourworldindata.org
%‫מהאוכלוסיה‬‫לקרוא‬ ‫היודע‬
‫ודרכים‬ ‫תעופה‬ ‫מתאונות‬ ‫תמותה‬ ‫שיעור‬
1900
Deathsper100MillionMilesTraveled
Automobile Airline
Source: National Highway Traffic Safety Administration
1910 1920 1930 1940 1950 1960 1970 1980 1990 2000 2010
30
25
20
15
10
5
0
‫האוזון‬ ‫שכבת‬
‫מבריאה‬
‫והידעתם‬?
‫למה‬?‫למה‬‫עכשיו‬?
EXPONENTIAL
GROWTH OF TECHNOLOGIES
30‫ליניארים‬ ‫צעדים‬
1
2
3
4
5
6
7
8
9
30 Meters
26XAround the Earth!
30‫אקספוננטיאלים‬ ‫צעדים‬
1,073,741,824 Meters
THE FUNDAMENTAL OF EXPONENTIAL TECHNOLOGY
Moore's law
1951
2 Transistors
1971
2300 Transistors
$1
Intel 4004
2012
7.1 B Transistors
$0.0000001
Nvidia GPU
ByDavid.Monniaux,CCBY-SA2.0,https://commons.wikimedia.org/w/index.php?curid=185007
Source: dailymail.co.uk
Apple Watch Cray-2 Supercomputer
=
2X
2016 1985
5 BILLION NEW MINDS
Source: PHD Ventures, Inc.
% world population using the Internet
THE CONNECTED WORLD
2020
66%
2010
23%
2000
6%
8
7
6
5
4
3
2
1
0
(Globalpopulation(Billions)
Total PopulationConnected
‫לעצמכם‬ ‫תארו‬
‫מה‬5‫מיליארד‬
‫חדשים‬ ‫מוחות‬
‫מסוגלים‬
‫לייצר‬,‫לחדש‬,
‫לחלום‬
AUTONOMOUS CARS
3D PRINTED FOOD
REVOLUTIONIZING
DELIVERY SERVICES
#1 Taxi company
owns no cars
#1 Accommodation
company owns no
real estate
#1 Media provider
creates no content
#1 Fastest growing
TV network lays
no cables
#1 Valuable
retailer has no
inventory
DISRUPTIVE BUSINESS MODELS
‫מייצרים‬ ‫אלו‬ ‫שינויים‬
‫הזדמנויות‬
‫ל‬ ‫וגם‬"‫רעים‬"‫ל‬"‫טובים‬"
©2017 Check Point Software Technologies Ltd. 20
‫מתמדת‬ ‫בצמיחה‬ ‫האיומים‬!
In 2016*:
900% rise in unknown malware per
hour
12 million new malware variants
discovered every month
Every 4 Seconds an unknown malware
was downloaded
*Check Point 2017 Security Report
‫מנעוריו״‬ ‫רע‬ ‫האדם‬ ‫לב‬ ‫יצר‬ ‫״כי‬
©2017 Check Point Software Technologies Ltd. 21
‫חשופים‬ ‫כולנו‬!
‫מקום‬ ‫בכל‬
‫אחד‬ ‫מכל‬
‫הרסניים‬ ‫כלים‬ ‫עם‬
‫זמן‬ ‫בכל‬
‫סייבר‬ ‫התקפות‬
‫דוגמאות‬ ‫כמה‬ ‫ונראה‬ ‫בואו‬
©2017 Check Point Software Technologies Ltd. 23
‫מכוניות‬
©2017 Check Point Software Technologies Ltd. 24
‫קריטיות‬ ‫תשתיות‬
©2017 Check Point Software Technologies Ltd. 25
‫חכמים‬ ‫בתים‬(‫הדברים‬ ‫של‬ ‫האינטרנט‬IOT)
©2017 Check Point Software Technologies Ltd. 26
‫שלנו‬ ‫הסלולארי‬
27©2017 Check Point Software Technologies Ltd.
WannaCry/Petya Ransomware attack - the bottom line…
Criminals are using superpower technology
Massive damage to critical services
Advanced threat prevention tools exist, but insufficiently used
©2017 Check Point Software Technologies Ltd. 28
‫להתגונן‬ ‫אפשר‬ ‫איך‬?
‫אז‬
©2017 Check Point Software Technologies Ltd. 29
‫אפקטיבית‬ ‫גישה‬ ‫יש‬
‫ניתן‬‫למנוע‬‫שקורות‬ ‫לפני‬ ‫התקפות‬
©2017 Check Point Software Technologies Ltd. 30
‫המשימה‬:
‫תמיד‬ ‫להיות‬
"‫קדימה‬ ‫אחד‬ ‫צעד‬"
[Restricted] ONLY for designated groups and individuals
©2017 Check Point Software Technologies Ltd. 31
‫שקורות‬ ‫לפני‬ ‫התקפות‬ ‫של‬ ‫פרואקטיבית‬ ‫חסימה‬
‫הגנה‬360‫הסיכון‬ ‫נקודות‬ ‫בכל‬ ‫מעלות‬
"‫קדימה‬ ‫אחד‬ ‫צעד‬"‫המנחים‬ ‫העקרונות‬
‫מרכזי‬ ‫אחד‬ ‫ממקום‬ ‫שמנוהלת‬ ‫אחודה‬ ‫הגנה‬ ‫מערכת‬
Most security technologies today stay
PATCHWORK OF POINT SOLUTIONS.
COMPLEX SOLUTIONS WITH
UNCERTAIN SECURITY COVERAGE.
• Looking for yesterday’s signatures
• Detection instead of prevention
ONE STEP BEHIND
PREVENTION
ACROSS
ALL
BUSINESS
PLATFORMS
ONE STEP AHEAD MEANS
BLOCKING ATTACKS EVERYWHERE
MOBILE THREAT PREVENTION
PROTECTING MOBILE DEVICES
AUTOMATED SECURITY FOR
THE HYBRID CLOUD
ACI
ADVANCED SECURITY FOR
ALL DATACENTER TRAFFIC
PROTECTING THE CLOUD
SECURITY
ANALYSIS
INTELLISTORESENSORS
SECURITY
EVENTS
ANALYSIS
SECURITY
COMMUNITY
MALWARE
RESEARCH
with the most comprehensive
SECURITY INTELLIGENCE
CERTS
ONE STEP AHEAD
250 MILLION
BOT ADDRESSES
11 MILLION
MALWARE SIGNATURES
5.5 MILLION
INFECTED WEBSITES
©2017 Check Point Software Technologies Ltd. 37
Protect Every Frontier
One
architecture
Single
management
T O M O R R O W
T O D A Y
Y E S T E R D A Y
MOBILEDATA
CENTERCLOUD
NETWORK ENDPOINT
[Restricted] ONLY for designated groups and individuals
NATIONAL
SECURITYIOT
CRITICAL
INFRA.
AUTOMOTIVE
©2017 Check Point Software Technologies Ltd. 38
‫ש‬ ‫ד‬ ‫ח‬ ‫ה‬ ‫ם‬ ‫ל‬ ‫ו‬ ‫ע‬ ‫ה‬
‫הוליסטית‬ ‫פרואקטיבית‬ ‫גישה‬
‫מניעה‬ ‫וממוקדת‬
‫נקודות‬ ‫לכלל‬ ‫אחודה‬ ‫ניהול‬ ‫מערכת‬
‫ההגנה‬
‫לסיכום‬:‫מוכנים‬ ‫אנחנו‬!!!
F O C U S E D
S I N G L E M A N A G E M E N T
P R O A C T I V E
P R E V E N T I O N
C O N S O L I D A T E D
O N E S Y S T E M
Cyber intro 2017_hebrew
CHECK POINT SOFTWARE TECHNOLOGIES
The largest pure-play security vendor in the world
Protecting more than 100,000
companies with millions of users
worldwide
$1.7B annual revenues
Over 4,300 employees in more than 50 countries
Worldwide market share leader
$-
$200
$400
$600
$800
$1,000
$1,200
$1,400
$1,600
$1,800
$2,000
1994 1995 1996 1997 1998 2000 2004 2007 2010 2013 2016
Thousands
Sales
[Protected] Non-confidential content​
H I G H E S T M A L W A R E C A T C H R A T E
L E A D S C Y B E R S E C U R I T Y V I S I O N A N D I N N O V A T I O N
F A S T E S T T O S T O P Z E R O D A Y M A L W A R EB E S T S E C U R I T Y M A N A G E M E N T
LEADER: Enterprise
Network Firewall Magic
Quadrant Since 1997
MARKET SHARE LEADER:
Worldwide Next Generation Firewall and
Unified Threat Management
THE MOST NSS
“recommended” ratings:
13 since 2011
LEADER: Gartner’s Unified Threat
Management Magic Quadrant
LEADER: Mobile Data
Protection Magic
Quadrant
LEADER & BEST SCORE:
Forrester Automated Malware
Analysis Wave
INNOVATION. VISION. LEADERSHIP.
42©2017 Check Point Software Technologies Ltd.
What Should We Expect This Year?
ADVANCED THREATS
Our networks will
still be targeted!
MOBILITY
Fundamental part
of each business
CLOUDIFICATION
The shift is
accelerating
ATTACKS WILL CONTINUE TO GROW. WE ARE ALL TARGETS.
43©2017 Check Point Software Technologies Ltd.
THE FIRST CONSOLIDATED SECURITY ACROSS NETWORKS,
CLOUD, AND MOBILE, PROVIDING THE HIGHEST LEVEL
OF THREAT PREVENTION.
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
[PROTECTED] Distribution or
44©2017 Check Point Software Technologies Ltd.
ACROSS ALL NETWORKS, CLOUDS AND MOBILE
ONE SECURITY
PLATFORM
Leveraging unified
threat intelligence &
open interfaces
PREEMPTIVE
THREAT PREVENTION
Blocking the most
sophisticated attacks
before they happen
Single Management,
Modular Policy
Management & integrated
threat visibility
CONSOLIDATED
SYSTEM
T H E C Y B E R S E C U R I T Y A R C H I T E C T U R E O F T H E F U T U R E
[PROTECTED] Distribution or
45©2017 Check Point Software Technologies Ltd.
FIGHTING A
TARGETED CYBER CAMPAIGN
[PROTECTED] Distribution or Modification is subject to approval
46©2017 Check Point Software Technologies Ltd.
11:30
Incoming email with
PDF attachment
blocked
File hash: 4931c1259863e1ba59201e…
C&C server: pwnown.hack.evil
…
11:32 11:35
Access to web site on
mobile device was
blocked
1. Zero-day malicious PDF
detected by Check Point Sandbox
2. Address of remote C&C
identified in malicious PDF
3. Exposed indicator shared
with ThreatCloud
1. Malicious link identified
by the exposed indicators
Virtual machine on
public cloud was
quarantined
1. Detected infection (bot)
on cloud virtual machine.
Communication with C&C
identified by indicators
C A N ’ T D O I T W I T H S E P A R A T E S Y S T E M S !
[PROTECTED] Distribution or
47©2017 Check Point Software Technologies Ltd.
11:30 11:32 11:35
Shared intelligence and threat prevention
across networks, mobile, cloud
One consolidated system to fully block the
attack
Incoming email with
PDF attachment
blocked
Access to web site on
mobile device was
blocked
Virtual machine on
public cloud was
quarantined
[PROTECTED] Distribution or
48©2017 Check Point Software Technologies Ltd.
T H R E A T P R E V E N T I O NM O B I L EC L O U D
[PROTECTED] Distribution or

More Related Content

PDF
Moti Sagey CPX keynote _Are All security products created equal
PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PPTX
Check Point Solutions Portfolio- Detailed
PPTX
Check point Infinity Overview
PDF
Cyber Security Coverage heat map
PDF
Check Point mission statement
PDF
Check point response to Cisco NGFW competitive
Moti Sagey CPX keynote _Are All security products created equal
CPX 2016 Moti Sagey Security Vendor Landscape
Check Point Solutions Portfolio- Detailed
Check point Infinity Overview
Cyber Security Coverage heat map
Check Point mission statement
Check point response to Cisco NGFW competitive

What's hot (20)

PPT
Panda Security2008
PPTX
Check Point vs competition security effectiveness
PPTX
INFINITY Presentation
PDF
Kaspersky Lab new Enterprise Portfolio
PPTX
Check Point Corporate Overview 2020 - Detailed
PDF
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
PPTX
Mind the gap_cpx2022_moti_sagey_final
PPTX
Mobile Security: 2016 Wrap-Up and 2017 Predictions
PPTX
Cloud Security Strategy by McAfee
PDF
2018 06 Presentation Cloudguard SaaS de Checkpoint
PDF
Are You Prepared for the Next Mobile Attack?
DOCX
NGFW RFP TEMPLATE - TEST PLAN
PDF
Talk1 esc3 muscl-standards and regulation_v1_1
PDF
Protect Your Enterprise - Check Point SandBlast Mobile
PDF
Scalar Security Roadshow - Toronto Presentation
PPTX
How Aetna Mitigated 701 Malware Infections on Mobile Devices
PPTX
2015 ISA Calgary Show: IACS Cyber Incident Preparation
PDF
OFFICE 365 SECURITY
DOCX
Security architecture proposal template
PPTX
Tools for Evaluating Mobile Threat Defense Solutions
Panda Security2008
Check Point vs competition security effectiveness
INFINITY Presentation
Kaspersky Lab new Enterprise Portfolio
Check Point Corporate Overview 2020 - Detailed
Kaspersky Lab’s Webinar ‘Emerging Threats in the APT World: Predictions for 2...
Mind the gap_cpx2022_moti_sagey_final
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Cloud Security Strategy by McAfee
2018 06 Presentation Cloudguard SaaS de Checkpoint
Are You Prepared for the Next Mobile Attack?
NGFW RFP TEMPLATE - TEST PLAN
Talk1 esc3 muscl-standards and regulation_v1_1
Protect Your Enterprise - Check Point SandBlast Mobile
Scalar Security Roadshow - Toronto Presentation
How Aetna Mitigated 701 Malware Infections on Mobile Devices
2015 ISA Calgary Show: IACS Cyber Incident Preparation
OFFICE 365 SECURITY
Security architecture proposal template
Tools for Evaluating Mobile Threat Defense Solutions

Similar to Cyber intro 2017_hebrew (20)

PDF
SOLUCIONES CHECKPOINT - Redes y Comunicaciones
PPTX
Stay One Step Ahead of Cyber Threats - Check Point
PPTX
Check Point Infinity
PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PDF
Ciberseguridad en el mundo de la IA
PDF
Completing your Next Generation Threat Prevention - Check Point
PDF
Understanding Advanced Threats and How to Prevent Them
PDF
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
PPTX
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
PPTX
2015 Security Report
PDF
"Evolving cybersecurity strategies" - Seizing the Opportunity
PDF
PIONEERING GEN V SECURITY WITH CHECK POINT
PPTX
Art Hathaway - Artificial Intelligence - Real Threat Prevention
PPTX
CP_CorpOverview_2025-check point 2025.pptx
PPTX
Ascendiendo a la GEN V de Cyber Security
PDF
End to End Security - Check Point
PPTX
Augusta gen v presentation adapture v2
PDF
Why Check Point - Moti Sagey
PDF
CheckPoint Firewall Presentation CCSA.pdf
PDF
Digitální transformace: zabezpečení agilních prostředí
SOLUCIONES CHECKPOINT - Redes y Comunicaciones
Stay One Step Ahead of Cyber Threats - Check Point
Check Point Infinity
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Ciberseguridad en el mundo de la IA
Completing your Next Generation Threat Prevention - Check Point
Understanding Advanced Threats and How to Prevent Them
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
2015 Security Report
"Evolving cybersecurity strategies" - Seizing the Opportunity
PIONEERING GEN V SECURITY WITH CHECK POINT
Art Hathaway - Artificial Intelligence - Real Threat Prevention
CP_CorpOverview_2025-check point 2025.pptx
Ascendiendo a la GEN V de Cyber Security
End to End Security - Check Point
Augusta gen v presentation adapture v2
Why Check Point - Moti Sagey
CheckPoint Firewall Presentation CCSA.pdf
Digitální transformace: zabezpečení agilních prostředí

Recently uploaded (20)

PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
Introduction to cybersecurity and digital nettiquette
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
PPTX
presentation_pfe-universite-molay-seltan.pptx
PPT
250152213-Excitation-SystemWERRT (1).ppt
DOCX
Unit-3 cyber security network security of internet system
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
E -tech empowerment technologies PowerPoint
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPT
Ethics in Information System - Management Information System
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PPT
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
Internet___Basics___Styled_ presentation
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
INTERNET------BASICS-------UPDATED PPT PRESENTATION
Introduction to cybersecurity and digital nettiquette
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
presentation_pfe-universite-molay-seltan.pptx
250152213-Excitation-SystemWERRT (1).ppt
Unit-3 cyber security network security of internet system
artificialintelligenceai1-copy-210604123353.pptx
E -tech empowerment technologies PowerPoint
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Ethics in Information System - Management Information System
Exploring VPS Hosting Trends for SMBs in 2025
isotopes_sddsadsaadasdasdasdasdsa1213.ppt
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Mathew Digital SEO Checklist Guidlines 2025
Internet___Basics___Styled_ presentation
Power Point - Lesson 3_2.pptx grad school presentation
SASE Traffic Flow - ZTNA Connector-1.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...

Cyber intro 2017_hebrew

Editor's Notes

  • #8: https://www.theguardian.com/environment/2016/jun/30/ozone-layer-hole-appears-to-be-healing-scientists-say#img-1 https://www.theguardian.com/environment/2016/jun/30/ozone-layer-hole-appears-to-be-healing-scientists-say
  • #13: What is FLOPS FLOPS (floating point operations per second) is a measure of computer performance, useful in fields of scientific computations that require floating-point calculations. Source: https://en.wikipedia.org/wiki/FLOPS Source for data point (may 2015) http://www.dailymail.co.uk/sciencetech/article-3098315/The-supercomputer-wrist-Infographic-reveals-Apple-Watch-equivalent-two-iPhone-4s.html
  • #15: Imagine a future where we start communicating just by thought. We might implant chips that will turn our thoughts into actions. That's where technology is taking us. This future is not far away.
  • #20: Evolving technologies create huge opportunities for all of us. However, this change creates opportunities not only for the bad actors but also for the good guys.
  • #21: Security Report Methodology: We collected data from different sources, including: more than 1,100 Security Checkups at client events, events discovered through ThreatCloud (which is connected to more than 25,000 gateways worldwide), and more than 6,000 gateways reporting to our Threat Emulation Cloud. Every 4 seconds an unknown malware was downloaded – this figure is based on a calculation of average attacks per gateway in an average organization
  • #33: Currently, there are hundreds of security vendors. Most vendors create point solutions that protect one attack vector. Looking at old signatures that don’t prevent unknown threats when using those point solutions, organizations soon find themselves with a complex patchwork of point solutions that is extremely hard to manage and leaves holes in their security coverage.   Most of the security vendors provide detection, not prevention. Detection means finding threats after they penetrate the system. Costs for remediation are huge - close to a million dollars per incident, not to mention the bad reputation and management time spent.
  • #34: We protect all the new and emerging business platforms whether they are: physical and virtual networks, desktop, mobile, cloud, and IoT.
  • #35: Lets talk about mobile. Most of you have a smartphone. If you receive work emails or connect to your company's intranet, your smartphone is mixing your private data and business data. Your smartphone goes everywhere with you and has a GPS that knows where you are. It has microphone that can listen to your conversations. The company and personal information on your smartphone and the connections to your business network are available to you and anyone else who can take control of your phone. Your smartphone must be secure. Check Point offers very innovative protection for smartphones and tablets. We do this by sending your metadata, applications and networking behavior to the cloud. We analyze your mobile device's activity in the cloud and give you an immediate alert for any malware or breach. Suggested anecdote: Want to be a hacker? Here’s how to conduct a man-in-the-middle attack. Simply connect to free airport Wi-Fi and change your phone settings to broadcast “free airport Wi-Fi.” In a instant, you’ll have a hundred users connected to your phone. You can harvest every password or login on their phones: corporate and personal.
  • #36: Another fast growing technology is public and private cloud. We see more companies using Amazon AWS and Microsoft Azure public cloud platforms. We also see more companies moving to private cloud environments. Very advanced cloud technologies from Cisco ACI, VMware NSX, OpenStack and others are helping more organizations migrate to cloud computing. These cloud environments are not stand-alone. They're extensions of existing infrastructures.   Check Point protects cloud the same way we protect physical networks; our security is platform-agnostic. You can secure and manage a physical network and a cloud environment with the same management and the same policies.
  • #37: Once you have this enforcement point for all environments, we support it with security intelligence. Check Point takes advantage of its large size and global presence. We gather the collective wisdom coming from Check Point security analysts, sensors spread around the Internet and cybersecurity organizations from around the world. Check Point combines a huge quantity of threat information from these many sources into one large data repository we call ThreatCloud.
  • #40: Another fast growing technology is public and private cloud. We see more companies using Amazon AWS and Microsoft Azure public cloud platforms. We also see more companies moving to private cloud environments. Very advanced cloud technologies from Cisco ACI, VMware NSX, OpenStack and others are helping more organizations migrate to cloud computing. These cloud environments are not stand-alone. They're extensions of existing infrastructures.   Check Point protects cloud the same way we protect physical networks; our security is platform-agnostic. You can secure and manage a physical network and a cloud environment with the same management and the same policies.
  • #41: Partners (channel partner program excl. not in program / revoked), with over 100K bookings in the past 2 years (2015-2016YTD)
  • #42: We lead the standard by which all security solutions are measured: Most NSS recommended products, 13 Since 2011 LEADER: Enterprise Network Firewall Magic Quadrant Since 1997 LEADER: Mobile Data Protection Magic Quadrant LEADER: Unified Threat Management Magic Quadrant LEADER & BEST SCORE: Forrester Automated Malware Analysis Wave MARKET SHARE LEADER: Worldwide NGFW and UTM HIGHEST MALWARE CATCH RATE LEADS CYBERSECURITY VISION AND INNOVATION