Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Agents of Change: Check Point Software

Jack Loo | Jan. 28, 2013
Singapore’s IDA unveiled its Infocomm Technology Roadmap outlining nine technology trends that will shape the future. We asked various enterprise IT heavyweights for their perspectives on the Roadmap, and next up, we have security specialist Check Point Software.

In late August 2012, the Infocomm Development Authority (IDA) unveiled the latest edition of its Infocomm Technology Roadmap (ITR) to chart technology trends that will figure strongly in three to five years.

Computerworld Singapore is taking the opportunity to set the ITR as the foundation layer for its year-ahead feature. Heavyweights in the enterprise IT space are talking about their perspectives on the Roadmap; the industry developments and customer demands that they foresee happening in the specific themes that these technology giants operate in.

In the fifth part of a regular feature, Check Point Software is talking about its 2013 product and services roadmap, industry developments, customer demands and case study scenarios. The spokesperson is Rajlingam Sokalingam, Regional Director, South Asia, Check Point Software Technologies.

Cyber Security

Check Point Software continues to innovate and refine its overarching security strategy and offerings, to address nascent security challenges, as well as mitigate existing security challenges.

Some of the recent offerings that were launched are the DDoS Protector, the Secure Web Gateway, the Threat Prevention appliance, running Anti-Bot, Anti-Malware, IPS, URL Filtering Software Blades. Going forward, we believe our Check Point Anti-Bot Software Blade, leveraging on the Check Point ThreatCloud, the largest real-time security threat knowledge base from the cloud, would help detect stealthy bots before they can do damage and affect our clients and their users worldwide.

We have already seen more advanced and insidious cyber attacks such as the Eurograbber malware affecting the financial industry in Europe recently. That is merely one of the spikes in the overall security challenges we as practitioners face on an ongoing basis. Organisations have to design and implement security solutions that are able to detect and protect against Advanced Persistent Threats (APTs).

Organisations can no longer rely on simplistic perimeter defences, but have to implement a holistic, end-to-end security architecture that can detect threats proactively and even preemptively to prevent any damage to their business, data, and networks.

We are beginning to see more interest from the industry and our customers in wanting to understand how sophisticated attacks and intrusions can occur. There is also a lot of interest in the professional services engagement or assessments to help identify potential security loopholes through our partners using our Check Point technologies and tools. We are also seeing more interest from customers in our latest solution bundles and offerings such as Anti-bots, IPS and DLP, tightly integrated together for seamless and easy integration into their networks, rather than simply purchasing standalone tools.

Let's look at the recent Eurograbber malware incident affecting the European financial industry. Should Check Point Software solutions be implemented, our architectural solution would provide comprehensive protection for enterprises and consumers against all types of security threats.


1  2  Next Page 

Sign up for CIO Asia eNewsletters.