SlideShare a Scribd company logo
1
©2021 Check Point Software Technologies Ltd.
Moti Sagey | Chief Evangelist & Head of Strategic Marketing
Why Check Point
THE CHECK POINT X-
FACTOR
2
©2020 Check Point Software Technologies Ltd.
We asked 826 customers…
WHY CHECK POINT?
[Protected] Distribution or modification is subject to approval 2
3
©2020 Check Point Software Technologies Ltd.
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
X-Factor
4
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
4
5
©2020 Check Point Software Technologies Ltd.
REAL TIME PREVENTION AS A PHILOSOPHY
MALWARE DNA
ZERO
PHISHING
FP-GUARD
PUBLIC-CLOUD
AUTO
PROVISION
MOBILE APP
SCANNING
MOBILE
CODE
ANALYSIS
MOBILE SMS
PHISHING
SS7 ATTACK
PREVENTION
MEMORY
ANALYSIS
THREAT EXTRACTION
HUMAN
INTERACTION
SIMULATION
ICON
SIMILARITY
MOBILE MAN
IN THE
MIDDLE
ATTACK
DOMAIN
PREDICTION
MACHINE LEARNING
CPU LEVEL SANDBOX
HYPERVISOR
LEVEL
SECURITY
ADVANCED
JAILBREAK
PROTECTION
CAMPAIGN
HUNTING
ENDPOINT
EXPLOITATION
DETECTION
FLASH
EMULATION
URL
REPUTATION
BLUETOOTH
ATTACK
DETECTION
INTRUSION
PREVENTION
Behavior
similarity
ANTI-RANSOMWARE
IMAGE FILE
SANITIZER
DECOYS &
TRAPS
OS-LEVEL
SANDBOX
DROPPED
FILES
EMULATION
TRANSPARENT
HTTPS
INSPECTION
ENDPOINT
FORENSICS
CPU EXPLOIT
DETECTOR
STATIC
ANALYZER
ACCOUNT TAKEOVER
PREVENTION
INTELLIGENCE
COLLABORATION
MACRO ANALYSIS
FILE
FEEDER
EMBEDDED OBJECTS
INSPECTION
BEHAVIORAL
BOT PROTECTION
SMEP Detector
TARGET LOCK
6
©2020 Check Point Software Technologies Ltd.
REAL-TIME PREVENTION IN ACTION
7
©2020 Check Point Software Technologies Ltd.
REAL-TIME PREVENTION IN ACTION
ZERO PHISHING WITH HARMONY BROWSE
8
©2020 Check Point Software Technologies Ltd.
Check Point gives us universal,
automatic protection that stops
threats every day—before we
even know they’re here.
TECHNOLOGY MANAGER IN A $30B+
ENTERPRISE SAID THAT…
8
[Protected] Distribution or modification is subject to approval
9
©2020 Check Point Software Technologies Ltd.
NOT ALL VENDORS PROVIDE
REAL-TIME PREVENTION
“SHUT DOWN THE NETWORK”?!
[Protected] Distribution or modification is subject to approval 9
10
©2020 Check Point Software Technologies Ltd.
NOT ALL VENDORS PROVIDE
REAL-TIME PREVENTION
DOES NOT BLOCK
[Protected] Distribution or modification is subject to approval 10
11
©2020 Check Point Software Technologies Ltd.
Highest
scores in
BPS test
#1 in NGFW
+ AEP
combined
reports
NSS LABS: THE BEST PROTECTION AND
VALUE TO OUR CUSTOMERS
Attractive
TCO
With
Infinity
0.0% False
Positives
100% block
rate
[Protected] Distribution or modification is subject to approval 11
12
©2020 Check Point Software Technologies Ltd.
14
1
4 2
4
13
9 9
CHECK POINT PROVEN TRACK RECORD OF SECURITY EXCELLENCE
Recommended:
14/15=93%
Recommended:
60%
Recommended:
60%
Recommended:
87%
Neutral Caution Recommended
Source: http://tiny.cc/nss_stats
NSS Labs Security tests (FW/NGFW/IPS/NGIPS/BDS/BPS/AEP)
Based on NSS Labs test all four vendors participated together
1
1
2
12
13
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
13
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
14
©2020 Check Point Software Technologies Ltd.
‘’We cut the time we spend on managing security
by 80%, thanks to the simplicity of the
Check Point solution!’’
IT MANAGER OF LARGE MANUFACTURING COMPANY
SAID….
[Protected] Distribution or modification is subject to approval 14
15
©2020 Check Point Software Technologies Ltd.
YOU HAVE TO
THINK LIKE
THE
END USER …
15
[Protected] Distribution or modification is subject to approval
16
©2020 Check Point Software Technologies Ltd.
IT'S NOT THE
LOAD THAT
BREAKS YOU
DOWN,
IT'S THE WAY AND
AGONY OF
CARRYING IT…
16
[Protected] Distribution or modification is subject to approval
17
©2020 Check Point Software Technologies Ltd.
AGONY METER
17
Full reference: http://tiny.cc/agonymeter
Palo Alto & Cisco with 5Xmore menus to operate network & cloud
Agony Meter
Task
Network
Security
Total Agony Score
6Menus
1 Menu
1 3.18 2.43 3.73
Cloud
Security
29 Menus
6 Menus
17 Menus
5 Menus
29 Menus
7 Menus
18
©2020 Check Point Software Technologies Ltd.
MOST LOVED CLOUD SECURITY SOLUTIONS
19
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
19
WE ASKED 826
CUSTOMERS…
WHY CHECK POINT?
20
©2020 Check Point Software Technologies Ltd. 20
THE MOST COMPLETE SECURITY
21
©2020 Check Point Software Technologies Ltd.
25/25
21/25 22/25
16/25
19/25
0%
10%
20%
30%
40%
50%
60%
70%
80%
90%
100%
NSA Top 25 CVEs 2020
misses 16%
misses 12%
misses 36%
Check Point customers are protected – NSA top 25 CVEs
misses 24%
100%
Protection
Validated as of Nov 2nd, 2020
22
©2020 Check Point Software Technologies Ltd.
MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED…
6
16
Mature SW Code
Swift response to
SW vulnerabilities
118
295
128
228
# Total of SW vulnerabilities (2016-2020)
Average fix time
(days)
Source: vendors security advisories web pages & http://tiny.cc/urgency
[Protected] Distribution or modification is subject to approval 22
23
©2020 Check Point Software Technologies Ltd.
3
COMPLETE
SOLUTION
REAL TIME
PREVENTION
1
[Protected] Distribution or modification is subject to approval
2
OPERATIONAL
EFFICIENCY
OUR X-FACTOR
BE PROUD
23
24
©2020 Check Point Software Technologies Ltd.
ANATOMY
OF
A WIN
24
“We can’t change the past, but by remembering it, we
might just change the future.” Rabbi Lord Jonathan Sacks
©2021 Check Point Software Technologies Ltd.
ANATOMY OF A WIN
WHAT WINNERS DID THAT MOVED THE NEEDLE
Introduced
Infinity
Demoed Real Time
Prevention in action
Used
Competitive Intel.
Worked closely
with the Partner
Used a
Reference
Positioned
Maestro
HyperScale
25
26
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
27
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
#2
#3
#1 #4
28
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
29
©2020 Check Point Software Technologies Ltd.
TOP TOOLS TO HELP YOU WIN
Security architecture sales
offer template with a
consultative approach
Scan to download
30
©2020 Check Point Software Technologies Ltd.
PREVENT CONSOLIDATE
STEP UP TO
GEN V
CLOUD SECURITY
NETWORK SECURITY SECURE USERS & ACCESS
YOUR OPPORTUNITY TO BECOME A CYBER HERO
NEW WORLD, NEW OPPORTUNITIES
31
©2021 Check Point Software Technologies Ltd.
Thank You

More Related Content

PDF
Why check point win top 4 facts
PDF
Why Check Point - Top 4
PPTX
Check Point vs competition security effectiveness
PDF
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
DOCX
Security architecture proposal template
PPTX
Check Point SMB Proposition
PPTX
Check Point Corporate Overview 2020 - Detailed
DOCX
NGFW RFP TEMPLATE - TEST PLAN
Why check point win top 4 facts
Why Check Point - Top 4
Check Point vs competition security effectiveness
Presentazione CHECKPOINT Evento CloudGarage 5-11 giugno 2013
Security architecture proposal template
Check Point SMB Proposition
Check Point Corporate Overview 2020 - Detailed
NGFW RFP TEMPLATE - TEST PLAN

What's hot (20)

PPT
Apresentação fortinet
PPTX
Mind the gap_cpx2022_moti_sagey_final
PPTX
Check point Infinity Overview
PDF
Moti Sagey CPX keynote _Are All security products created equal
PDF
2018 06 Presentation Cloudguard IaaS de Checkpoint
PPTX
Check Point Solutions Portfolio- Detailed
PPTX
Cyber intro 2017_hebrew
PDF
2018 06 Presentation Cloudguard SaaS de Checkpoint
PDF
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
PDF
CompTIA PenTest+: Everything you need to know about the exam
PPT
Information Security Seminar
PPTX
Check Point Consolidation
PDF
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
PPT
Escrow Presentation2010
PDF
5 things about os sharon webinar final
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
PDF
Security & DevOps - What We Have Here Is a Failure to Communicate!
PDF
Cybersecurity PowerPoint Presentation Slides
PDF
Webinar–Best Practices for DevSecOps at Scale
Apresentação fortinet
Mind the gap_cpx2022_moti_sagey_final
Check point Infinity Overview
Moti Sagey CPX keynote _Are All security products created equal
2018 06 Presentation Cloudguard IaaS de Checkpoint
Check Point Solutions Portfolio- Detailed
Cyber intro 2017_hebrew
2018 06 Presentation Cloudguard SaaS de Checkpoint
AUTOMATING CYBER RISK DETECTION AND PROTECTION WITH SOC 2.0
CompTIA PenTest+: Everything you need to know about the exam
Information Security Seminar
Check Point Consolidation
WatchGuard: Protecting Endpoints with Threat Detection Response (TDR)
Escrow Presentation2010
5 things about os sharon webinar final
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Security & DevOps - What We Have Here Is a Failure to Communicate!
Cybersecurity PowerPoint Presentation Slides
Webinar–Best Practices for DevSecOps at Scale
Ad

Similar to Why Check Point - Moti Sagey (20)

PDF
CPX 2016 Moti Sagey Security Vendor Landscape
PDF
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
PDF
Benvira Deck
PDF
комплексная защита от современных интернет угроз с помощью Check point sandblast
PPTX
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
PDF
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
PPTX
Aaron Swain at VMware Tanzu Public Sector Connect 2021
PPTX
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
PPTX
Government and Education Webinar: How the New Normal Could Improve your IT Op...
PPTX
Getting Started with ThousandEyes Proof of Concepts
PPTX
Getting Demo & POV Ready
PPTX
Webinar-MSP+ Cyber Insurance Fina.pptx
PPTX
Managing Multiple Assessments Using Zero Trust Principles
PPTX
OPS Executive insights Webinar - Tanzu Slides
PDF
Security as an Accelerator for Cloud Adoption
PPTX
roomos_webinar_280923_v2.pptx
PDF
Continuous Verification in a Serverless World
PDF
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
PDF
Backup Exec 15: Designing Protection for the Future, Today
PPT
Iveda sept general investor presentation 092614
CPX 2016 Moti Sagey Security Vendor Landscape
How BlueHat Cyber Uses SanerNow to Automate Patch Management and Beyond
Benvira Deck
комплексная защита от современных интернет угроз с помощью Check point sandblast
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Aaron Swain at VMware Tanzu Public Sector Connect 2021
Webinar - Nuage Networks Integration with Check Point vSEC Gateway
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Getting Started with ThousandEyes Proof of Concepts
Getting Demo & POV Ready
Webinar-MSP+ Cyber Insurance Fina.pptx
Managing Multiple Assessments Using Zero Trust Principles
OPS Executive insights Webinar - Tanzu Slides
Security as an Accelerator for Cloud Adoption
roomos_webinar_280923_v2.pptx
Continuous Verification in a Serverless World
Virtualization to Cloud with SDDC Operations Management and Service Provisioning
Backup Exec 15: Designing Protection for the Future, Today
Iveda sept general investor presentation 092614
Ad

More from Moti Sagey מוטי שגיא (7)

PDF
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
PDF
Why Check Point - Top 4 Facts
PDF
Cyber Security Coverage heat map
PDF
Check point response to Cisco NGFW competitive
PDF
Check Point mission statement
PDF
How to Choose a SandBox - Gartner
PDF
How to expose shortcuts in competitive poc
CPX23_Moti_2nd_best_sec_will_get_u_breached_v11.pdf
Why Check Point - Top 4 Facts
Cyber Security Coverage heat map
Check point response to Cisco NGFW competitive
Check Point mission statement
How to Choose a SandBox - Gartner
How to expose shortcuts in competitive poc

Recently uploaded (20)

PPTX
INTERNET------BASICS-------UPDATED PPT PRESENTATION
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Introduction to the IoT system, how the IoT system works
PPTX
Digital Literacy And Online Safety on internet
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
Testing WebRTC applications at scale.pdf
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PPTX
artificial intelligence overview of it and more
PPTX
E -tech empowerment technologies PowerPoint
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PPTX
Introuction about ICD -10 and ICD-11 PPT.pptx
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PDF
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)
INTERNET------BASICS-------UPDATED PPT PRESENTATION
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
RPKI Status Update, presented by Makito Lay at IDNOG 10
Introduction to the IoT system, how the IoT system works
Digital Literacy And Online Safety on internet
Paper PDF World Game (s) Great Redesign.pdf
Testing WebRTC applications at scale.pdf
presentation_pfe-universite-molay-seltan.pptx
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
Design_with_Watersergyerge45hrbgre4top (1).ppt
artificial intelligence overview of it and more
E -tech empowerment technologies PowerPoint
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Unit-1 introduction to cyber security discuss about how to secure a system
522797556-Unit-2-Temperature-measurement-1-1.pptx
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
Tenda Login Guide: Access Your Router in 5 Easy Steps
Introuction about ICD -10 and ICD-11 PPT.pptx
Decoding a Decade: 10 Years of Applied CTI Discipline
FINAL CALL-6th International Conference on Networks & IOT (NeTIOT 2025)

Why Check Point - Moti Sagey

  • 1. 1 ©2021 Check Point Software Technologies Ltd. Moti Sagey | Chief Evangelist & Head of Strategic Marketing Why Check Point THE CHECK POINT X- FACTOR
  • 2. 2 ©2020 Check Point Software Technologies Ltd. We asked 826 customers… WHY CHECK POINT? [Protected] Distribution or modification is subject to approval 2
  • 3. 3 ©2020 Check Point Software Technologies Ltd. WE ASKED 826 CUSTOMERS… WHY CHECK POINT? 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY X-Factor
  • 4. 4 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY WE ASKED 826 CUSTOMERS… WHY CHECK POINT? 4
  • 5. 5 ©2020 Check Point Software Technologies Ltd. REAL TIME PREVENTION AS A PHILOSOPHY MALWARE DNA ZERO PHISHING FP-GUARD PUBLIC-CLOUD AUTO PROVISION MOBILE APP SCANNING MOBILE CODE ANALYSIS MOBILE SMS PHISHING SS7 ATTACK PREVENTION MEMORY ANALYSIS THREAT EXTRACTION HUMAN INTERACTION SIMULATION ICON SIMILARITY MOBILE MAN IN THE MIDDLE ATTACK DOMAIN PREDICTION MACHINE LEARNING CPU LEVEL SANDBOX HYPERVISOR LEVEL SECURITY ADVANCED JAILBREAK PROTECTION CAMPAIGN HUNTING ENDPOINT EXPLOITATION DETECTION FLASH EMULATION URL REPUTATION BLUETOOTH ATTACK DETECTION INTRUSION PREVENTION Behavior similarity ANTI-RANSOMWARE IMAGE FILE SANITIZER DECOYS & TRAPS OS-LEVEL SANDBOX DROPPED FILES EMULATION TRANSPARENT HTTPS INSPECTION ENDPOINT FORENSICS CPU EXPLOIT DETECTOR STATIC ANALYZER ACCOUNT TAKEOVER PREVENTION INTELLIGENCE COLLABORATION MACRO ANALYSIS FILE FEEDER EMBEDDED OBJECTS INSPECTION BEHAVIORAL BOT PROTECTION SMEP Detector TARGET LOCK
  • 6. 6 ©2020 Check Point Software Technologies Ltd. REAL-TIME PREVENTION IN ACTION
  • 7. 7 ©2020 Check Point Software Technologies Ltd. REAL-TIME PREVENTION IN ACTION ZERO PHISHING WITH HARMONY BROWSE
  • 8. 8 ©2020 Check Point Software Technologies Ltd. Check Point gives us universal, automatic protection that stops threats every day—before we even know they’re here. TECHNOLOGY MANAGER IN A $30B+ ENTERPRISE SAID THAT… 8 [Protected] Distribution or modification is subject to approval
  • 9. 9 ©2020 Check Point Software Technologies Ltd. NOT ALL VENDORS PROVIDE REAL-TIME PREVENTION “SHUT DOWN THE NETWORK”?! [Protected] Distribution or modification is subject to approval 9
  • 10. 10 ©2020 Check Point Software Technologies Ltd. NOT ALL VENDORS PROVIDE REAL-TIME PREVENTION DOES NOT BLOCK [Protected] Distribution or modification is subject to approval 10
  • 11. 11 ©2020 Check Point Software Technologies Ltd. Highest scores in BPS test #1 in NGFW + AEP combined reports NSS LABS: THE BEST PROTECTION AND VALUE TO OUR CUSTOMERS Attractive TCO With Infinity 0.0% False Positives 100% block rate [Protected] Distribution or modification is subject to approval 11
  • 12. 12 ©2020 Check Point Software Technologies Ltd. 14 1 4 2 4 13 9 9 CHECK POINT PROVEN TRACK RECORD OF SECURITY EXCELLENCE Recommended: 14/15=93% Recommended: 60% Recommended: 60% Recommended: 87% Neutral Caution Recommended Source: http://tiny.cc/nss_stats NSS Labs Security tests (FW/NGFW/IPS/NGIPS/BDS/BPS/AEP) Based on NSS Labs test all four vendors participated together 1 1 2 12
  • 13. 13 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY 13 WE ASKED 826 CUSTOMERS… WHY CHECK POINT?
  • 14. 14 ©2020 Check Point Software Technologies Ltd. ‘’We cut the time we spend on managing security by 80%, thanks to the simplicity of the Check Point solution!’’ IT MANAGER OF LARGE MANUFACTURING COMPANY SAID…. [Protected] Distribution or modification is subject to approval 14
  • 15. 15 ©2020 Check Point Software Technologies Ltd. YOU HAVE TO THINK LIKE THE END USER … 15 [Protected] Distribution or modification is subject to approval
  • 16. 16 ©2020 Check Point Software Technologies Ltd. IT'S NOT THE LOAD THAT BREAKS YOU DOWN, IT'S THE WAY AND AGONY OF CARRYING IT… 16 [Protected] Distribution or modification is subject to approval
  • 17. 17 ©2020 Check Point Software Technologies Ltd. AGONY METER 17 Full reference: http://tiny.cc/agonymeter Palo Alto & Cisco with 5Xmore menus to operate network & cloud Agony Meter Task Network Security Total Agony Score 6Menus 1 Menu 1 3.18 2.43 3.73 Cloud Security 29 Menus 6 Menus 17 Menus 5 Menus 29 Menus 7 Menus
  • 18. 18 ©2020 Check Point Software Technologies Ltd. MOST LOVED CLOUD SECURITY SOLUTIONS
  • 19. 19 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY 19 WE ASKED 826 CUSTOMERS… WHY CHECK POINT?
  • 20. 20 ©2020 Check Point Software Technologies Ltd. 20 THE MOST COMPLETE SECURITY
  • 21. 21 ©2020 Check Point Software Technologies Ltd. 25/25 21/25 22/25 16/25 19/25 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% NSA Top 25 CVEs 2020 misses 16% misses 12% misses 36% Check Point customers are protected – NSA top 25 CVEs misses 24% 100% Protection Validated as of Nov 2nd, 2020
  • 22. 22 ©2020 Check Point Software Technologies Ltd. MAKE SURE YOUR SYSTEMS ARE NOT EXPOSED… 6 16 Mature SW Code Swift response to SW vulnerabilities 118 295 128 228 # Total of SW vulnerabilities (2016-2020) Average fix time (days) Source: vendors security advisories web pages & http://tiny.cc/urgency [Protected] Distribution or modification is subject to approval 22
  • 23. 23 ©2020 Check Point Software Technologies Ltd. 3 COMPLETE SOLUTION REAL TIME PREVENTION 1 [Protected] Distribution or modification is subject to approval 2 OPERATIONAL EFFICIENCY OUR X-FACTOR BE PROUD 23
  • 24. 24 ©2020 Check Point Software Technologies Ltd. ANATOMY OF A WIN 24 “We can’t change the past, but by remembering it, we might just change the future.” Rabbi Lord Jonathan Sacks
  • 25. ©2021 Check Point Software Technologies Ltd. ANATOMY OF A WIN WHAT WINNERS DID THAT MOVED THE NEEDLE Introduced Infinity Demoed Real Time Prevention in action Used Competitive Intel. Worked closely with the Partner Used a Reference Positioned Maestro HyperScale 25
  • 26. 26 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN
  • 27. 27 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN #2 #3 #1 #4
  • 28. 28 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN
  • 29. 29 ©2020 Check Point Software Technologies Ltd. TOP TOOLS TO HELP YOU WIN Security architecture sales offer template with a consultative approach Scan to download
  • 30. 30 ©2020 Check Point Software Technologies Ltd. PREVENT CONSOLIDATE STEP UP TO GEN V CLOUD SECURITY NETWORK SECURITY SECURE USERS & ACCESS YOUR OPPORTUNITY TO BECOME A CYBER HERO NEW WORLD, NEW OPPORTUNITIES
  • 31. 31 ©2021 Check Point Software Technologies Ltd. Thank You