Professional Documents
Culture Documents
Superior Threat Prevention For Saas Applications
Superior Threat Prevention For Saas Applications
SAAS
SUPERIOR THREAT
PREVENTION FOR SAAS
APPLICATIONS
OVER 70% OF
ENTERPRISES ADOPTED
CLOUD APPLICATIONS*
ARE WE
SECURE?
*Gartner,
2016
©2018 Check Point Software Technologies Ltd. 2
SaaS Applications are
Hacked
$2M
Stolen Reported on July2017 to Check Point
IRT
©2018 Check Point Software Technologies Ltd. 4
Making
ACCOUNT
headlines:
TAKEOVER
Unauthorized access to an individual or
organization’s SaaS account for malicious
purposes.
TAKEO VER
Z E R O - D AY T H R E AT S
M A LWA R E
D E L I V E RY
©2018
©2018 Check
Check Point Software
Point Technologies
Software Technologies Ltd. 8
CLOUD SERVICE HELPS YOU
ELIMINATE REAL SAAS
THREATS
Simplified
Management
IDENTITY
SIMPLIFIED SHADOW IT
PROTECTIO
M ANAGEM EN
N
T DISCOVERY
Prevent
account
takeovers
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 11
CLOUDGUARD SAAS
THREAT
PROTECTION
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 12
ADVANCED THREAT PREVENTION
5THGENERATION OF CYBER
SECURITY
Threat Emulation
Blocks zero-day attacks
The only evasion resistant CPU-Level sandbox
Threat Extraction
Delivers safe
files prevention through file sanitation
Proactive
Sca Found
n malwa
Fil re
e
Threat Prevention
IDENTITY PROTECTION
• ID-Guard technology identifies imposturous access
• Blocks unauthorized users and devices, on mobile and
PCs
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 15
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY
PROTECTION
Agentless Mode Hacker
Authentication
interception
IDENTITY
PROTECTION Accesses Identity
ap
p
Provide
r
Only agent-registered devices allowed
to access your SaaS app
Frictionless UX without 2FA:
• CloudGuard SaaS prevents
phishing attacks and malware Identifies Device
that can bypass traditional Hacker Illegitimate Login
2FA
• If found, SaaS access is
blocked Attempts
Identity
to access
• Hassle free to users with
Provide
Visibility into detected threats for r
Stolen
admins and users credentia
ls
COMPREHENSIVE THREAT
INTELLIGENCE
Comprehensive security coverage
across the enterprise
•
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 20
Daily inputs from traffic across
150K security gateways world
wide
Translates threat intelligence data
into
actionable security protections
SIMPLIFIED
MANAGEMENT
Deploy within minutes,
scan instantly for
previous threats
Centralize configuration
and monitoring through
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies
intuitive web console 23
DEPLOY WITHIN
MINUTES
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 24
CLOUDGUARD SAAS
DATA LEAKAGE
PREVENTION
DATA LEAKAGE
PREVENTION
Block sharing of sensitive data and Shared Email Chat
files • documents
Over 800 data types identified •
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 25
DATA LEAKAGE
PREVENTION
FOR SAAS APPS Employee
Found a
Sca
sensitive
n
financial
Fil
report
e
Data Leak
Prevention
SHADOW IT DISCOVERY
Easy discovery of shadow SaaS apps •
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 27
COMPLEMENTING, GRANULAR SHADOW IT
CONTROL WITH CHCK POINT SECURITY GATEWAYS
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 28
EXECUTIVE REPORTING
WITH CHECK POINT
SMARTEVENT
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 29
CLOUDGUARD SAAS
SUPERIOR THREAT
PREVENTION FOR SAAS
APPLICATIONS
IDENTITY
SIMPLIFIED SHADOW IT
PROTECTIO
M ANAGEM EN
N
T DISCOVERY
Prevent
account
takeovers
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 30
SAAS ATTACKS
CAN BE
PREVENTS
PREVENTED
BLOCKS ZERO-DAY END-TO-END
ACCOUNT ADVANCED SAAS SECURITY
TAKEOVER THREATS COVERAGE