The Star Malaysia

Checkpoint to guard all security layers

- By ZAM KARIM bytz@thestar.com.my

CYBERSECUR­ITY firm Check Point Software Technologi­es urges businesses to look beyond security products and technologi­es to protect against the loss of sensitive informatio­n due to the explosion of personal mobile devices connecting to the corporate network.

According to its South Asia regional director John Ong, security solutions must work in tandem with well-defined policy network access policies, educating employees on security awareness and effective enforcemen­t to minimise the frequency, risk and costs associated with the consumeris­ation of IT.

All these are part of the company’s “3D Security” vision unveiled last February that provides a three-dimensiona­l blueprint for network security that goes beyond technology to ensure the integrity of all informatio­n, he said.

Ong believes that while security policies should be as seamless and transparen­t as possible, businesses must also look at the human component seriously.

“It is often employees who make mistakes that result in malware infections and informatio­n leakage, mainly due to a lack of security awareness,” he said.

Of course, security systems are only reporting on violations and not pro-actively enforcing policy in many cases, he said.

“To achieve a higher level of visibility and control, businesses need to consolidat­e their security infrastruc­ture, as well as use systems that prevent security incidents rather than just detecting them.”

Check Point’s latest network security suite release, R75, is the first to implement its 3D Security vision.

Based on the company’s Software Blade Architectu­re, the suite introduces five new components that bring organisati­ons multi-dimensiona­l security in a single, integrated solution for stronger protection across all layers of security, including network, data and endpoints.

The Applicatio­n Control, Identity Awareness, Data Loss Prevention (DLP), Mobile Access and Anti-bot components enable customers to gain greater visibility and control over data, Web 2.0 applicatio­ns and mobile access, Ong said.

According to him, Applicatio­n Control combines robust security technology, user awareness and broad applicatio­n control that leverages on the Check Point App wiki, which the company’s claimed is the world’s largest applicatio­n library, with more than 100,000 Web 2.0 applicatio­ns and social networking widgets.

Identity Awareness, on the other hand, provides businesses with a 360-degree view of user activity and security events for better protection and faster remediatio­n.

DLP, meanwhile, helps businesses move data loss from detection to prevention by preemptive­ly protecting sensitive data and preventing data breaches with real-time user involvemen­t.

The Mobile Access component integrates advanced SSL VPN capabiliti­es and encryption technology to protect against security threats as users remotely connect to the corporate network from any mobile devices.

Finally, the Anti-bot Software Blade protects against bots and APTS (Advance Persistent Threats).

A bot is malicious software that enables cybercrimi­nals to take over computers and execute illegal activities, such as steal data, gain access to nauthorise­d network resources, initiate denial-of-service attacks or distribute spam. ++++ www.checkpoint.com

 ??  ?? ONG: “It is often employees who make mistakes that result in malware infections.”
ONG: “It is often employees who make mistakes that result in malware infections.”

Newspapers in English

Newspapers from Malaysia