Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Secure everything

F.Y. Teng | Aug. 30, 2010
The big chief of Check Point Software Technologies says we have to cover all the bases and get proactive on the information security front now, or else!

Data leak prevention [DLP] is another area were trying to revolutionise. Theres a lot of demand for solutions in this area. Everyone understands the need for ways to counter instances when you send email mistakenly or send it to the wrong person, and suddenly your files are lost. Theres a lot of resonance when we speak to people about such a predicament and what should and can be done about data leak prevention.

And last year we started with intrusion prevention, making it part of every gateway. Theres a lot of traction in the market for that, and that portion of our business is growing nicely.

In general, people want to put security in more places, in more areas. Theres a lot of push that we are seeing in both high-end performance for the data centre, as well as introducing low-end models that people can put in every branch office and in every small office.

What is Check Points approach to security?
Our philosophy has been pretty consistent for the last 17 years. It dates all the way back to when I started Check Point. The main one is this: being much more proactive. Theres much security thinking out there focused on signature-based intrusion prevention, which is about identifying attack sources currently being encountered by referring to previous attacks and their sources. If theres a match, we can block it, but if its one we have never seen before, we may not be able to do so.

My thinking was always about how we could provide tools that would work under any circumstances. That also leads to the point about providing good infrastructure.

Were not saying to people: OK, theres a new application now, upgrade all your infrastructure. We are saying: We have a very strong and flexible set of tools that are very easy to work with, that let you define your own policies, based on your own requirements.

And that kind of thing of bringing security to every company around the world, rather than building a solution that is either too simplistic and works for many people but in a very limited way, or very strong but requires tons of professional services and customisation.

How does that translate into the products you rolled out recently?
One is the software blades architecture. We talked to customers a few years ago and realised we didnt have one big trend to deal with, but a lot of different requirements at different stages in deployment with every customer. So we introduced this software blade concept, which sees to it that when the customer can basically activate whatever security functionality that they need on every system in a very flexible manner.


Previous Page  1  2  3  4  5  6  7  8  Next Page 

Sign up for CIO Asia eNewsletters.