Vous êtes sur la page 1sur 29

PROTECTION COMPLÈTE

POUR LE CLOUD EMAIL &


SUITE DE PRODUCTIVITÉ
CONSTAT ALARMANT :
PLUS DE 90% DES ATTAQUES CONTRE LES
ORGANISATIONS COMMENCENT PAR UN
EMAIL MALVEILLANT
According to Verizon 2019 DBIR

©2020 Check Point Software Technologies Ltd. 2


CE QUE PEUT FAIRE UN EMAIL MALVEILLANT
L’ATTAQUE DE BUSINESS EMAIL COMPROMISE (BEC) PAR LE “BANKER
FLORENTINE” FRAPPE LES BANQUES BRITANNIQUES VOLANT PLUS D’1
MILLION DE $

COSTS OF BEC ATTACKS SKYROCKET

$1.7B
Phishing campaign

Cost in $BN
Account takeover $1.2B

Ask for money


$675M
Over $1M transferred
2017 2018 2019
Source: IC3 BEC reports

©2020 Check Point Software Technologies Ltd. 3


LES EMPLOYÉS SONT LES MAILLONS FAIBLES
LES ATTAQUES SONT TROP SOPHISTIQUEES POUR ETRE VISIBLES DANS L’AMAS DE MAILS RECUS
QUOTIDIENNEMENT

MALWARE PHISHING
Job application to HR The urgent request

©2020 Check Point Software Technologies Ltd. 4


INSUFFISANCE DE LA SECURITE TRADITIONNELLE &
BUILT-IN

PROTECTION LIMITEE POUR SECURITE INSUFFISANTE ACQUISITION DE PLATEFORMES


LES APPLICATIONS DE SUR TOUS LES VECTEURS MULTIPLES, A GERER ET
PRODUCTIVITE DE MENACES DEPLOYER

©2020 Check Point Software Technologies Ltd. 5


Il doit y avoir un meilleur
moyen de sécuriser les
applications cloud de
messagerie et de
productivité

©2020 Check Point Software Technologies Ltd. 6


CLOUD EMAIL & PRODUCTIVITY SUITE SECURITY

COMPLETE PROTECTION BULLETPROOF SECURITY LOWEST TCO

©2020 Check Point Software Technologies Ltd. 7


CLOUD EMAIL & PRODUCTIVITY SUITE SECURITY

COMPLETE BULLETPROOF SECURITY LOWEST TCO


PROTECTION

©2020 Check Point Software Technologies Ltd. 8


PHISHING

BEC & IMPERSONATION

MALWARE
ALL THE EMAIL &
PRODUCTIVITY SUITE
SECURITY YOU NEED ACCOUNT TAKE OVER

INTERNAL THREATS

DATA LEAKAGE

©2020 Check Point Software Technologies Ltd. 9


BLOQUER LES ATTAQUES DE SOCIAL ENGINEERING EN AMONT
ZERO-DAY PHISHING, BEC & IMPERSONATION

SUSPICIOUS SENDER
ADDRESS

MALICIOUS ATTACHMENT

MALICIOUS LINK

BODY INDICATES
SUSPICIOUS SENSE OF
URGENCY

©2020 Check Point Software Technologies Ltd. 10


BLOQUER LES PIECES JOINTES MALICIEUSES
AVEC ZERO IMPACT SUR LA PRODUCTIVITE
FILES SANITIZED BY
THREAT EXTRACTION

• CLEAN FILES DELIVERED IN


LESS THAN 1.5 SECONDS

• SELF-CATERED ACCESS TO
ORIGINAL FILE

Evasion resistance sandboxing with industry's


best catch rate
SandBlast’s emulation takes a couple of
minutes, while Microsoft emulation can take
10 minutes
©2020 Check Point Software Technologies Ltd. 11
PREVENIR LES FUITES DE
DONNEES
PREVENT LEAKAGE OF:

Personal Data Financial Data


Social security number Credit card number
Home address Bank account
Phone number Routing number

Medical Data Intellectual Property

Medical history Source code


Prescriptions Roadmap
Medical facility names Org chart

And 100s predefined and custom data types…

©2020 Check Point Software Technologies Ltd. 12


PREVENT ADVANCED ACCOUNT TAKEOVER

Agent Mode Agentless Mode Anomaly detection


Ensures device Enforces multi factor Suspicious time of
health authentication (MFA) connection, user location,
via SMS or email connection type, etc.

©2020 Check Point Software Technologies Ltd. 13


CLOUD EMAIL & PRODUCTIVITY SUITE SECURITY

COMPLETE PROTECTION BULLETPROOF LOWEST TCO


SECURITY

©2020 Check Point Software Technologies Ltd. 14


PART OF CHECK POINT INFINITY
A CONSOLIDATED SECURITY ARCHITECTURE

Cloud

Datacenter

Email
Consistent security across the entire IT infrastructure
Globally shared threat intelligence
IoT Offices Single security management and a unified policy

Mobile & Endpoint

©2020 Check Point Software Technologies Ltd. 15


POWERED BY
THE WORLD’S MOST POWERFUL THREAT INTELLIGENCE
Translates threat intelligence data from 100M
86 Billion
gateways and end points around the world
into actionable security protections Transactions a day

4 Million
Emulated files a day

100,000
Connected networks

8,300
Zero-day files blocked a day

©2020 Check Point Software Technologies Ltd. 16


LA SEULE SOLUTION DE SÉCURITÉ 100%
DE MESSAGERIE AVEC UN CATCH- 100% Protection
Block Rate against HTTP
RATE PROUVÉ DE 99,1% Malware

100% 100% 100%


Protection Catch-rate in
Exploit
against Email post infection
Resistant
Malware

0.0%
False Positives

©2020 Check Point Software Technologies Ltd. 17


PLUS DE 60 MOTEURS AI ET NON-AI
EVASION-RESISTANT SANDBOX

Human Interaction Simulator


Neural Network Model
CPU-level Detection
AI-based Behavioral Patterns
AI
Evasion Detection
ENGINES
Documents macro analyzer
DeepScan
AI-based Aggregator Model
Macro Analysis
Virtual Network Service
Malware DNA
NON-AI VERDICT Click-time URL Protection
ENGINES
Malware Universe Model
Network Activity Monitor

©2020 Check Point Software Technologies Ltd. 18


UNE PROTECTION IN-LINE PLUS EFFICACE BASÉE SUR LES API

Built-in
Security

©2020 Check Point Software Technologies Ltd. 19


UNE PROTECTION IN-LINE PLUS EFFICACE BASÉE SUR LES API

AI TRAINED ON
WHAT BUILT-IN MISS
02
INTERNAL
THREAT
PREVENTION
04

SECURITY OUT
01 03
INVISIBLE TO
CYBER OF THE BOX
CRIMINALS

©2020 Check Point Software Technologies Ltd. 20


CLOUDGUARD SAAS STOPPE 30% DE MENACES EN PLUS
QUE LA SÉCURITÉ BUILT-IN
Lors d’une recherche interne, nous avons envoyé 1000 emails malveillants à un compte de
messagerie Office 365 :
300 emails
malicieux
manqués
CloudGuard SaaS a
stoppé 1000 emails
malicieux
Built-In
Security

700 emails
malicieux détectés
comme
spam/phishing
Source: Internal research ©2020 Check Point Software Technologies Ltd. 21
CLOUD EMAIL & PRODUCTIVITY SUITE SECURITY

COMPLETE PROTECTION BULLETPROOF SECURITY


LOWEST
TCO

©2020 Check Point Software Technologies Ltd. 23


DEPLOYEZ INSTANTANÉMENT ET OBTENEZ DES RESULTATS EN
QUELQUES HEURES

CONFIGURATION MODE AUTHORIZATION PICK ACCOUNT

01 Ne nécessite pas de changement MX record 02 Analyse rétroactive des menaces existantes

©2020 Check Point Software Technologies Ltd. 24


1 LICENCE UNIQUE POUR L’EMAIL ET LES SUITES CLOUD

MS E5 Subscription =
M S Ad v a n c e d T h r e a t
Prevention +
C o n d i t i o n a l Ac c e s s +
Ad v a n c e d D L P +
Az u r e AD P 1 + M C AS
Conditional
MCAS
ATPAD
Azure
DLP
Access

©2020 Check Point Software Technologies Ltd. 25


MONITORING D’UN DASHBOARD SIMPLE

SECURITY EVENTS
(AGGREGATED
VIEW)

SECURITY
EVENTS (FEED
VIEW) LOGIN EVENTS
(MAP VIEW)

APPS USAGE

©2020 Check Point Software Technologies Ltd. 26


OBTENIR DES INFORMATIONS ET DES RAPPORTS EXPLOITABLES

Créer une allow-list ou block-list

Mettre en quarantaine / supprimer tous les emails


avec cette pièce jointe

Ajuster la politique de
sécurité
MALWARE FAMILY
SUSPICIOUS FILE ACTIVITIES
EMULATION VIDEOS
ADVANCED FORENSICS
AND MORE..

©2020 Check Point Software Technologies Ltd. 27


COMPLETE
PROTECTION

BULLETPROOF
CLOUD EMAIL AND SECURITY
PRODUCTIVITY SUITE
SECURITY
LOWEST TCO

©2020 Check Point Software Technologies Ltd. 28


NEXT STEPS

START A FREE TRIAL DEPLOY INSTANTLY SEE RESULTS WITHIN HOURS

https://portal.checkpoint.com/

©2020 Check Point Software Technologies Ltd. 29


MERCI!

30

Vous aimerez peut-être aussi