Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Adapt a multiple-layered, multi-engine defence strategy: David Wigley

Yogesh Gupta | Feb. 16, 2015
Wise IT administrators would avoid just accepting yesterday’s technology because they are owned and sold by what are in effect IT marketing juggernauts. They do not necessarily provide state-of-the-art or cost-effective security solutions.

ContentKeeper's secure Internet gateway provides both reactive (signature-based) and proactive (behavioral and sandbox-based) defenses with its multi-layered, multi-engine approach to malware protection. None of the above vendors can filter multi-gigabit data streams as efficiently and cost effectively as ContentKeeper's secure Internet gateway.

CIO: But high profile attacks and new malware continue to threaten organisations.
David Wigley: There is no such thing as full-proof security. No one technology can answer all security concerns. That is why ContentKeeper takes a multiple-layered and a multi-engine approach to malware defense. ContentKeeper incorporates traditional/reactive signature-based methods as well as the newer proactive methods. These work together globally within ContentKeeper's collaborative filtering community network to deliver the best possible, real-time protection available.

With thousands of deployments across the globe and our R&D using the in-house technology of closed-loop, collaborative filtering, ContentKeeper strives to work on real-time data from customers. Spread across various datacenters on the globe, we plug out latest vulnerabilities and bring down the level of risk associated with it.

CIO: What would you suggest to CIOs to build a secure IT infrastructure?
David Wigley: Look at the underlying platform technology, because the selected security vendor cannot be changed easily. Proxy is an old technology now, they throttle high-speed networks and create unnecessary choke points. The layer 2 Ethernet bridge is the technology for today and tomorrow as it delivers the high-speed access required by modern businesses.

Wise IT administrators would avoid accepting yesterday's technology because they are owned and sold by what are in effect IT marketing juggernauts. They do not necessarily provide a state-of-the-art or cost-effective security solutions.

CIOs, CTOs and CISOs have complex problems to address. They must consider functionality in both standalone products as well as how those products integrate into their networking and overall processing environments. The maintenance and support offered is also a critical component of any IT strategy. The emergence and widespread use of mobile devices must be catered to.

ContentKeeper offers a hybrid solution for security, offering Web, gateway and mobile device solutions along with highly automated updates, maintenance and support.

CIO: Has ContentKeeper gone the cloud route? What are the pros and cons of this emergent consumption model?
David Wigley: Cloud or no cloud, ContentKeeper provides a seamless environment where clients can have the best of both worlds. They can select a 100 percent cloud-based solution or a 100 percent on-site appliance-based solution. They can also adopt the hybrid approach which will no doubt dominate the seen in the years to come.

Large enterprises will primarily stick to on-site appliances to handle their LAN-based security load while utilizing integrated cloud-based services for mobile platforms, and for the more CPU-intense processing involved in security functions such as sandboxing. Users will be able to wander seamlessly both on-net and off-net while receiving the same protection regardless of where they are working. ContentKeeper provides this capability today.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.