Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 30

CHECK POINT CLOUDGUARD

SAAS
SUPERIOR THREAT
PREVENTION FOR SAAS
APPLICATIONS
OVER 70% OF
ENTERPRISES ADOPTED
CLOUD APPLICATIONS*

ARE WE
SECURE?
*Gartner,
2016
©2018 Check Point Software Technologies Ltd. 2
SaaS Applications are
Hacked

©2017 Check Point Software Technologies Ltd. 3


THE CASE OF
KAYE
FINANCIALS
Kaye moved
its email to
the cloud
Kaye’s customers received
email invoices with fake
bank accounts
Emails were sent by
hackers who took over
Kaye’s accountant email
account

$2M
Stolen Reported on July2017 to Check Point
IRT
©2018 Check Point Software Technologies Ltd. 4
Making
ACCOUNT
headlines:

TAKEOVER
Unauthorized access to an individual or
organization’s SaaS account for malicious
purposes.

Account takeover becomes common in the


cloud:
- Cloud services are externally exposed
- Default SaaS security does not protect against them
©2018 Check Point Software Technologies Ltd. 5
Biggest Threat to SaaS
Applications: Account Takeover
Mindless Data
Sharing
11%

Malware Delivery Account Takeover


35% 54%

Check Point Incident Response Data


Customers=250, Cloud breaches=55%, Check Point Q1-3-
2017
©2018
©2018 Check
Check Point Software
Point Technologies
Software Technologies Ltd. 6
IS YOUR FOCUS IN THE RIGHT
PLACE? ACCOUNT

TAKEO VER
Z E R O - D AY T H R E AT S
M A LWA R E

D E L I V E RY

SAAS SECURITY - WHAT’S NEEDED?


EXTENSIVE T H R E AT PREVENTION, BLOCKING
OF ACCOUNT TA K E O V E R S
©2018 Check Point Software Technologies Ltd. 7
INTRODUCING
CLOUDGUARD
SAAS
SUPERIOR THREAT
PREVENTION FOR SAAS
APPLICATIONS

©2018
©2018 Check
Check Point Software
Point Technologies
Software Technologies Ltd. 8
CLOUD SERVICE HELPS YOU
ELIMINATE REAL SAAS
THREATS

©2018 Check Point Software Technologies Ltd. 9


HOW IT
WORKS: Azure
AD
Award-winning Identity Authentication
technologies Protection
CHECK POINT SECURITY STACK

Zero-day Threats Data Leak Reveal


Protection Preventio Shadow
n IT

Simplified
Management

©2018 Check Point Software Technologies 1


CLOUDGUARD SAAS
SUPERIOR THREAT
PREVENTION FOR SAAS
APPLICATIONS

ZERO-DAY COMPREHENSIV DATA


THREATS E THREAT LEAKAGE
PROTECTIO INTELLIGENCE PREVENTIO
N N

IDENTITY
SIMPLIFIED SHADOW IT
PROTECTIO
M ANAGEM EN
N
T DISCOVERY
Prevent
account
takeovers

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 11
CLOUDGUARD SAAS
THREAT
PROTECTION

ZERO-DAY THREAT PROTECTION


• Prevent malware and zero-day threats from getting to SaaS
users
• Block phishing emails for Office365 and Gmail
• Protect file sharing, messaging, and more

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 12
ADVANCED THREAT PREVENTION
5THGENERATION OF CYBER
SECURITY
Threat Emulation
Blocks zero-day attacks
The only evasion resistant CPU-Level sandbox

Threat Extraction
Delivers safe
files prevention through file sanitation
Proactive

Anti-Phishing for Email


Advanced protection of user emails
SANDBLAST SCORED 100% BREACH PREVENTION
Breach Prevention System Test 11/2017

©2018 Check Point Software Technologies 1


THREAT
PREVENTION FOR
SAAS APPS HOW IT Hacker

WORKS: Shares / emails


malicious
content
API: New Quarantin
File e file
Detecte
d

Sca Found
n malwa
Fil re
e

Threat Prevention

©2018 Check Point Software Technologies Ltd. 14


CLOUDGUARD SAAS
IDENTITY
PROTECTION

IDENTITY PROTECTION
• ID-Guard technology identifies imposturous access
• Blocks unauthorized users and devices, on mobile and
PCs

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 15
PREVENT ACCOUNT
TAKEOVER WITH
CLOUDGUARD SAAS
IDENTITY
PROTECTION
Agentless Mode Hacker

 Policy rules for: device type, OS, IP,


location Attempts to
access Identity
 Centralized multi-factor authentication with stolen Provide
 Machine learning enginesvalidate user credentials r Intelligen
ce
logins and identify bad scenarios:
• Unusual SaaS app activities
• Different locations
• Different devices
 Status check-ups for: rules, permissions,
privileges, etc.

©2018 Check Point Software Technologies Ltd. 16


PREVENTING ACCOUNT
TAKEOVER
WITHOUT disturbing user workflow

Authentication
interception

1. Pair user to 2. Verify that user 3. Allow


device and device are access
paired
USERS: Continue to use username and password
HACKERS: Can’t break in with stolen credentials
©2018 Check Point Software Technologies Ltd. 17
PREVENT ACCOUNT
TAKEOVER WITH
Identifies
CLOUDGUARD SAAS
Employee
Device

IDENTITY
PROTECTION Accesses Identity
ap
p
Provide
r
 Only agent-registered devices allowed
to access your SaaS app
 Frictionless UX without 2FA:
• CloudGuard SaaS prevents
phishing attacks and malware Identifies Device
that can bypass traditional Hacker Illegitimate Login
2FA
• If found, SaaS access is
blocked Attempts
Identity
to access
• Hassle free to users with
Provide
 Visibility into detected threats for r
Stolen
admins and users credentia
ls

©2018 Check Point Software Technologies Ltd. 19


CLOUDGUARD SAAS
THREAT
INTELLIGENCE

COMPREHENSIVE THREAT
INTELLIGENCE
Comprehensive security coverage
across the enterprise

Shared threat intelligence across


network, cloud, and mobile devices


©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 20
Daily inputs from traffic across
150K security gateways world
wide
Translates threat intelligence data
into
actionable security protections

Security updates in Real


Time
CLOUDGUARD SAAS
SIMPLIFIED
MANAGEMENT

SIMPLIFIED
MANAGEMENT
Deploy within minutes,
scan instantly for
previous threats

Centralize configuration
and monitoring through
©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies
intuitive web console 23
DEPLOY WITHIN
MINUTES

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 24
CLOUDGUARD SAAS
DATA LEAKAGE
PREVENTION

DATA LEAKAGE
PREVENTION
Block sharing of sensitive data and Shared Email Chat
files • documents
Over 800 data types identified •

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 25
DATA LEAKAGE
PREVENTION
FOR SAAS APPS Employee

HOW IT WORKS: Shares sensitive


content

API: New Quarantin


File e file
Detecte
d

Found a
Sca
sensitive
n
financial
Fil
report
e

Data Leak
Prevention

©2018 Check Point Software Technologies Ltd. 26


CLOUDGUARD SAAS
SHADOW IT
DISCOVERY

SHADOW IT DISCOVERY
Easy discovery of shadow SaaS apps •

Granular, comprehensive shadow IT discovery with Check Point


security gateways •

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 27
COMPLEMENTING, GRANULAR SHADOW IT
CONTROL WITH CHCK POINT SECURITY GATEWAYS

Over 7859 applications


and in-app activities

Highly granular policy with content,


user- awareness and engagement
policies

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 28
EXECUTIVE REPORTING
WITH CHECK POINT
SMARTEVENT

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 29
CLOUDGUARD SAAS
SUPERIOR THREAT
PREVENTION FOR SAAS
APPLICATIONS

ZERO-DAY COMPREHENSIV DATA


THREATS E THREAT LEAKAGE
PROTECTIO INTELLIGENCE PREVENTIO
N N

IDENTITY
SIMPLIFIED SHADOW IT
PROTECTIO
M ANAGEM EN
N
T DISCOVERY
Prevent
account
takeovers

©2018 Check
©2018 Check Point
Point Software
Software Technologies Ltd.
Technologies 30
SAAS ATTACKS
CAN BE
PREVENTS
PREVENTED
BLOCKS ZERO-DAY END-TO-END
ACCOUNT ADVANCED SAAS SECURITY
TAKEOVER THREATS COVERAGE

©2018 Check Point Software Technologies Ltd. 35


THANK
YOU

©2018 Check Point Software Technologies Ltd. 36

You might also like