《步入第五代网络安全课件.pptx》由会员分享,可在线阅读,更多相关《步入第五代网络安全课件.pptx(27页珍藏版)》请在三一办公上搜索。
1、,步入第五代网络安全,Internal Use for Check Point employees,Yun Tan|SE Manager,North ChinaCheck Point Software Technologies,网络安全正在发生什么?,Internal Use for Check Point employees,Internal Use for Check Point employees,2017-2018年网络安全事件警钟?,Internal Use for Check Point employees,2018年全球风险报告,Internal Use for Check Po
2、int employees,我们正处在一个 转折点!,PROTECTIONS,1990,2000,2010,2017,威胁,让我们来看看这几代的攻击演变,Internal Use for Check Point employees,攻击类型的演变和防护,防病毒,防火墙,入侵防护(IPS),沙箱和防僵尸,100%of businesses,50%of businesses,100%of businesses,7%of businesses,Internal Use for Check Point employees,我们在那儿?,PROTECTIONS,1990,2000,2010,2015,2
3、017,威胁,保护,企业防护处在2代和3代之间,2.8,Internal Use for Check Point employees,PROTECTIONS,2018 第五代攻击,国家资助的技术,第四代的防御已经无法满足需求!,Internal Use for Check Point employees,PROTECTIONS,我们必须向前迈进!,Internal Use for Check Point employees,隆重介绍 针对多维度攻击形式的第五代安全架构,PROTECTIONS,Internal Use for Check Point employees,实时威胁防御技术,Int
4、ernal Use for Check Point employees,实时共享安全情报,我们的防御措施需要哪些元素?,最佳的安全技术,Internal Use for Check Point employees,最佳的安全技术,Internal Use for Check Point employees,实时威胁防御技术,将第五代防御变为可能,Internal Use for Check Point employees,共享安全情报,统一的管理体系,我们如何迁移到第五代安全架构?,Internal Use for Check Point employees,Internal Use for
5、Check Point employees,“网络攻击不可能发生在我身上”,“实际部署一个防御技术可能要花上6个月的时间.20个防御技术都部署完成估计要到2025年”,“那些东西太复杂了”,“我们不可能防御网络攻击”,有可能将所有技术都有效部署吗?,威胁提取,Internal Use for Check Point employees,这些技术可能组成一支军队,HTTPS 检查,端点检测与响应,人类行为分析,数据防泄露,反僵尸,Flash引爆,URL过滤,防火墙,数据防泄露,机器学习,代理,网络加密,反勒索软件,反钓鱼,移动安全,CPU级别沙箱,ICS/SCADA 防护,入侵防御,反病毒,DD
6、OS,虚拟化防护,应用程序控制,数据加密,Internal Use for Check Point employees,这些技术可能组成一支军队,Internal Use for Check Point employees,看起来不可能是吗?,那么奇迹只是会来的晚一些.(查尔斯亚历山大德卡隆,1794),ThreatExtraction,你可以使它成为可能,Internal Use for Check Point employees,ImageSanitization,Endpoint Detection&Response,Human Behavioral Analytics,Data Lea
7、kPrevention,Anti-Bot,FlashDetonation,URLFiltering,Firewall,DGADetector,MachineLearning,Proxy,NetworkEncryption,Anti-Ransomware,ZeroPhishing,Mobile ThreatPrevention,CPU-LevelSandboxing,IconSimilarity,IPSProtections,Anti-Virus,DDOS,HypervisorLevel Security,AppControl,DataEncryption,ThreatExtraction,Vi
8、rtual Firewall,Endpoint Detection&Response,Human Behavioral Analytics,DataEncryption,Data LeakPrevention,Anti-Bot,FlashDetonation,URLFiltering,Firewall,ICS/SCADA Protection,MachineLearning,Proxy,NetworkEncryption,Anti-Ransomware,ZeroPhishing,Mobile ThreatPrevention,CPU-LevelSandboxing,HTTPS Inspecti
9、on,Intrusion Prevention,Anti-Virus,DDOS,HypervisorLevel Security,ApplicationControl,实时共享威胁情报,统一安全管理,多重&混合云,总部,分支,访问控制,多层安全,高级威胁防护,数据保护,访问控制,多层安全,高级威胁防护,支持Wi-Fi,DSL,PPoE,Click on Icons,总结,Internal Use for Check Point employees,Internal Use for Check Point employees,我们正处在一个转折点!,PROTECTIONS,1990,2000,2010,2017,威胁,防护,Internal Use for Check Point employees,具有最好的安全性实时预防,我们需要升级到,谢谢!,Internal Use for Check Point employees,