Securing mobile data, simplifying security management, protecting branch offices and collaborative attack intelligence will be key areas of focus for security software firm Check Point in 2013, according to chief executive Gil Shwed.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
“Cyber attacks grow more sophisticated every year, which demands constant innovation,” Gil Shwed told more than 1,400 attendees at the CPX2013 Check Point customer and partner event in Barcelona.
Innovation, said Shwed, was key to supporting the company’s vision of securing the internet and ensuring it is a safe environment in which to do business.
This involves constantly reviewing performance and platforms, security management, security technologies and mobile data protection, he said.
Outlining some of Check Point’s plans for 2013, Shwed the company would focus on raising the bar on security for branch offices.
“Most organisations have their headquarters adequately protected, but security is only as strong as the weakest link; therefore branch offices need to be as secure,” he said.
Read more about Check Point
Shwed announced the launch of a new 1100 appliance, designed to deliver high-end protections with a throughput capacity of up to 1.5Gbps, in a smaller form factor, under €1,000.
Shwed said simplicity was the key to security management and promised Check Point would achieve new levels of simplicity with a new interface and a new architecture.
“This is not just a facelift, the underlying architecture is new, enabling high level navigation and improved management of software blades with unified policies and split-second performance monitoring,” he said.
Protecting mobile data
Protecting mobile data will also be a big focus for Check Point in 2013.
According to the firm’s latest security report, 90% of organisations polled said employees store business data on smartphones and 69% of employees store data using public cloud services.
“Data is leaving the enterprise and is being stored in uncontrolled environments,” said Shwed.
New threats, in combination with data migration out of the enterprise, present a huge challenge, which means that – on top of consolidated threat protection – mobile is a strategic focus for Check Point.
“We need to enable business to cope with demands such as employees bringing their own devices into the enterprise,” said Shwed.
The Check Point approach is to encrypt all data on creation, set restrictions by default and use secure containers to ensure corporate data can be accessed securely on any device.
However, Schwed said this approach is most effective when used in combination with disk- and USB-encryption and virtual private network (VPN) technologies.
In conclusion, Shwed said Check Point remained committed to its software blade architecture, which enables the company to develop additional capabilities as the threat landscape evolves.