0% found this document useful (0 votes)
40 views19 pages

SKO Infinity Masterclass External

Uploaded by

lakbabi1035
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views19 pages

SKO Infinity Masterclass External

Uploaded by

lakbabi1035
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

INFINITY MASTER CLASS

Eran Orzel
Head of Strategic Sales and Partnerships

©2020 Check Point Software Technologies Ltd. 1


©2020 Check Point Software Technologies Ltd. 2
©2020 Check Point Software Technologies Ltd. 3
CISO ROLE AND RESPONSIBILITIES

Identify risks to systems, data, processes

Develop and implement the right safeguards

Monitor, detect and analyze cybersecurity events

Respond to attacks and minimize the damage

Recover, restore and improve

©2020 Check Point Software Technologies Ltd. 4


CISO CHALLENGES

©2020 Check Point Software Technologies Ltd. 5


1 THE IT ENVIRONMENT IS CHANGING

AT TA C K S U R FA C E S INTERNET
ARE WIDENING OF THINGS

BYOD

Employees, partner, contractors

©2020 Check Point Software Technologies Ltd. 6


2

“ UNFILLED
CYBERSECURITY
ROLES
WORLDWIDE IS
EXPECTED TO
REACH 1.5
MILLION BY THE
END OF 2020.
GARTNER
©2020 Check Point Software Technologies Ltd. 7
3 OWN YOUR ENVIRONMENT

>25
>1000

©2020 Check Point Software Technologies Ltd. 8


4

BUDGET
CONSTRAINTS

©2020 Check Point Software Technologies Ltd. 9


CISO CHALLENGES

D A I LY T H R E AT S
Keep with the pace
of business

Own the environment

Small IT Staff

>1M alerts Under budget constrain

©2020 Check Point Software Technologies Ltd.


©2019 10
10
SECURITY STRATEGY FOR TODAY’S CYBER DEFENSE

ARCHITECTURE

PREVENTION VISIBILITY &


CONTROL

AUTOMATION ENABLEMENT

©2020 Check Point Software Technologies Ltd. 11


INFINITY ARCHITECTURE

©2020 Check Point Software Technologies Ltd. 12


INFINITY TOTAL PROTECTION

©2020 Check Point Software Technologies Ltd. 13


By year-end 2024, 25% of firewall
end-user spend will be contained
within larger security “platform”
deals delivered by enterprise
license agreements (ELAs)
Gartner, Magic Quadrant for Network Firewall 09/19

©2020 Check Point Software Technologies Ltd. 14


WHAT INFINITY TOTAL PROTECTION
CAN DO FOR ME?

Strengthen
Grow
Provideoverall
customer
an end dealtosize
endand
services business
relationship for the
providing partners,
value
security coverage for
close
and multi-year
thought leadership
customers and keep the
deals
and overachieve your target!
competition out

©2020 Check Point Software Technologies Ltd. 15


NEXT STEPS…. Messaging and
business model

Account
mapping

Account
strategy

Tools
TCO calc, materials…

Deal support
strategic sales leaders
to lead with you

©2020 Check Point Software Technologies Ltd. 16


2.0

©2020 Check Point Software Technologies Ltd. 17


2.0

©2020 Check Point Software Technologies Ltd. 18


THANK YOU

©2020 Check Point Software Technologies Ltd. 19

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy