Check Point Battle Card
Total Page:16
File Type:pdf, Size:1020Kb
Q2 2016 Battle Card – Check Point vSEC Overview Key Messages How are solution is unique The Check Point vSEC and VMware NSX integrated 1. Security protections seamlessly enforced Industry’s Most Advanced Security Protection solution delivers dynamic orchestration of advanced inside the Software-Defined Datacenter . Multi-layered, advanced threat prevention with threat prevention for all data center traffic a.Advanced threat prevention with the highest the industry’s best-catch rates and real-time Software-Defined Datacenter (SDDC) – Abstracts the catch-rates against malware, protects intra-VM intelligence ensures your virtual network is as physical infrastructure so that capacity can be pooled traffic secure as your physical network and repurposed. Provides programmatic control to allow b.Detects & tags infected virtual machines (VMs), . Security capacity scales elastically to meet virtual machines to be dynamically created and updates NSX for automatic quarantine and changing traffic workloads remediation Virtual Traffic Threat Forensics managed. c.Security capacity scales elastically to adjust to . Virtual data center objects identity preserved in VMware NSX is a network virtualization platform that dynamic traffic workloads logs for easy traffic monitoring and analysis makes micro-segmentation operationally feasible. NSX 2. Automated security provisioning and . Comprehensive security event analysis detects provides the foundation for the SDDC that enables orchestration virtual traffic anomalies and zero-day threats automated deployment, orchestration and scale-out of a.Fine-grained security policies dynamically tied Agile, Automated Security Provisioning advanced security services. to NSX security groups and vCenter VM Check Point vSEC with Advanced Threat Prevention objects ensure virtual applications are secured . Integrated with NSX and vCenter to dynamically delivers multi-layered defenses to proactively stop regardless of network topology changes pull NSX-defined objects for fine-grained security malware and zero-day attacks. Check Point’s unified b.Easy policy segmentation enables granular rule policies management of virtual and physical gateways simplifies definition, automation and segregation of . Security is auto-provisioned in minutes instead of hours security management and control across the data cent duties aligned to NSX micro-segmentation c.Security is auto-provisioned as new ESX hosts . Security policy easily segmented into sub-policies Elevator Pitch – Top 3 Selling Points are deployed and VMs move within the SDDC for network segment level enforcement & 3. Comprehensive threat visibility across the segregation of duties • Complete Integration with vCenter and NSX and full SDDC Unifies Management of Virtual and Physical visibility of all data center objects in security policy a.Single policy for both virtual & physical Environments • Complete protection using Next Generation Threat gateways simplifies security enforcement . Single policy for virtual and physical gateways Prevention to protect against cyber threats and share VM b.Centralized monitoring, logging and event simplifies security enforcement security state of infected VM with NSX for automatic analysis ensures comprehensive threat visibility . Centralized management ensures remediation across the SDDC comprehensive visibility into security posture, minimizes operational overhead • Detailed vCenter & NSX context (VM names) in log and events Sales Enablement Resources Product Information Other resources • Customer Presentation • The Best Security for Data Centers • Product Page • NSX Demo - CP vSEC vs. PAN VM- • Sales Guide Series • Competitive Fact Sheet Need more info? Contact [email protected] Q2 2016 Battle Card – Check Point vSEC How to Compete Against... Network Check Point Palo Alto Fortinet Trend Micro Vendors • Limited integration with VMware - Panorama cannot integrate with pre-NSX data centers (no central management of vCenter/ESXi security) • Limited visibility with no option to import vCenter objects 1 vCNS/NSX certified (VM’s, resource pools, ESX clusters, etc’) to security policy • manual & complex operations are required on NSX and Micro Segmentation Panorama to import data center objects to the security policy • Limited forensics with no data center objects identity in logs VM-series Unified policies 2 2 NSX Edition • Panorama is unable to automatically trigger remediation actions for virtual and physical on infected machines (VM security tagging). requires Gateways rd 3 collaboration with 3 party solutions (SIEM) at an extra cost Multi-Tenancy/ Multiple services • Administration overhead and complexity - Fortinet requires Data center policy 4 separate managements and policies for enterprise security and segmentation with layers and sub policies (R80) NSX security 5 • Limited visibility with no option to import vCenter objects Fetch vCenter and NSX data 5 6 Fortinet center objects for use FortiGate- (VM’s, resource pools, ESX clusters, etc’) to security policy in global security policy • manual & complex operations are required on NSX and VMX Dynamic enforcement of VMs 7 Panorama to import data center objects to the security policy in security policy even without • Lack of automated security – No support for automatic NSX tagging or update of NSX with VM current security state Threat Prevention with 8 8,9 9 multi-layered defenses for • Limited forensics with no data center objects identity in logs Virtual Data Center • Administration overhead and complexity – Trend micro has Tag infected VM and update 10 NSX with it security state for many point solutions with separate managements and policies automatic remediation for enterprise security and data center security View VM objects in security • Lack a consolidated data center protection – Complete Data logs/reports Center security requires 2 different products. Deep Security and Deep Deep Discovery (Sandboxing) Security • Limited Micro Segmentation with no ability to view, import and Complete data center use NSX Security groups in Trend Micro policy security • Cumbersome deployment and VM management - must 1) No vCNS support 6) Cannot fetch NSX SG install agent on each VM for complete data center protection 2) Separate policies/Mgmt 7) Static IP based FW policy 3) With MDM / Multi SVM 8) Prone to evasions 4) R80.10 9) No Sandbox (add. product) Need more info? Contact [email protected] rd 5) Cannot fetch VM’s 10) Using 3 party SIEM Q2 2016 Battle Card – Check Point vSEC Target Audience and Questions to Ask Objection Handling CIO, CISO DIRECTOR IT / SECURITY I am in charge of network How do you plan protect east/west traffic inside security and firewalls your virtualized data center? How do you plan to INFOSEC MANAGERS only. I don’t deal with target cyber threats and security incidents inside How do you gain Can you protect the How do you add NSX data center infrastructure the data center? security and visibility software defined data and vCenter data I already have built-in SDDC have basic security (firewall only) which is inside the data center center with the same center objects into security in my software not enough to protect against the most with your existing security infrastructure your existing security defined data center sophisticated threats. Virtual data center security security solution? as your physical policy? solution (NSX) should be equal to physical network security gateways? Why should I use Check Check Point has strong integration with VMware Point as my data center as well as many other private/public cloud security solution platforms. One example is the ability to harness How do you protect How do you know if a How do you identify Threat Prevention mechanisms for automatic the data center malware is and remediate a VM remediation of potential threats (VM tagging) against the latest propagated inside the infected with cyber threats? data center? malware? I don’t have the Insertion of security to the software define data resources to manage center should be easy and fast. The integration data center security and provisioning of Check Point vSEC with VMware hypervisor is done automatically with How do you secure How do you How do you secure immediate visibility into vCEnter/NSX while using business applications automatically VM-to-VM traffic the same ‘Gold Standard’ unified management on the software provision security to inside the virtualize for both physical and virtual gateways defined data center? protect data center data center? applications? I don’t have NSX Check Point management can import VM from deployed in my data vCenter and use them in security policy even center yet without NSX. This allow dynamic enforcement Summary – Ensuring the Win and protection of VM’s north-south traffic Top Positioning Tips Check Point provides “data center aware” security solution for the software defined data center. The unique integration between Check 1. Highlight the strong integration Check Point has with VMware and Point vSEC and VMware allow automation and orchestration of security the ability to connect to both vCenter and NSX using a single ‘Gold Standard’ management for physical and virtual 2. Show the increased visibility of data center objects in security gateways. vSEC allows automatic provisioning and increased visibility of policy, logs and events vCenter and NSX objects in security policy, logs and events. It also 3. Emphasize that Check Point can provide the best protection provide advance security against cyber threats using Next Generation against cyber threats with its Next Generation Threat Prevention Threat Prevention mechanisms for infected VM’s which can initiate and also share security state with NSX for automatic remediation automatic remediation of potential threats (automatic VM tagging) .