Check Point’s latest innovations to curb increasing threats

Thursday, 2 August 2012 00:00 -     - {{hitsCtrl.values.hits}}

By Shanuka Tissera

Check Point Software Technology Ltd., the dominant world leader in internet security, launched a new family of security appliances to customers and partners through its sole distributor in Sri Lanka, South Asian Technologies Pvt. Ltd. at Cinnamon Grand on 30 July.

The seven new appliances launched are optimised for Check Point’s Software Blade Architecture and offer approximately three time higher performance than previous products.

Check Point Head of System Engineering Ramandeep Singh Walia took this opportunity to share the importance of internet security with key IT players in Sri Lanka.

“In the last few months, we have seen threats that are common with the US and EU. Developing countries within the South Asian region are also susceptible to an attack. People may think that this is all too far from reality, but we have seen these issues affect South Asian countries.”

From Q2 ’11 to Q2 ’12, there has been an 11% increase in threats. Within the same period there was a 17% increase in loss of data and service and advanced persistence threats was a vital topic covered.

Systems today require building multilayer security. Architecture must be compiled using the best components hence why I.T security revenue in 2011 was estimated at $ 30 billion with previous y-o-y growth.

Check Point Senior Consultant Kapil Awasthi explained how attackers are attacking differently today. “From ’07 to ’11, there has been a 600% increase in the amount of malware, 82% of enterprise experience a bot attack and over 90% of these attacks are avoidable given the right solutions.”

Hackers today are using polymorphic and homemade encryptions and as their level of sophistication increases, the ability to protect our self must increase faster.

Check Point’s new line of appliances, from the desktop 2200 model up to the 21400 model, scales up to 100 Gbps of firewall throughput and up to 2,900 Security Power units, a new metric for security performance recently announced.

In addition, the new security appliances are designed to support the new 64 bit operating system and enable customers to benefit from consolidated security, simplified management and unique mobile access features. From small businesses to large enterprises and data centres, Check Point provides customers with a powerful platform to build their 3D Security blueprint.

Check Point Founder/Chairman Gil Shwed said: “In a world where all industries and organisations face an ever increasing number of sophisticated threats, there is a need for a stronger security solutions to control network access, prevent data loss and protect against web based threats.”

The high-performing appliances are designed to support any combination of software blade protections including; firewall, VPN, intrusion protection, application control, mobile access, data loss prevention, URL filtering, antivirus, advanced networking as well as Check Point’s new Anti-Bot Software Blade.

By consolidating security into a single integrated solution, organisations of all sizes have the flexibility to customise their security infrastructure based on the precise level of protection and performance needed in an environment.

The value of the underground economy is huge. Techniques being used today are attachments, the browser, rogue apps and the most prominent being media. In a detailed explanation of the latest bot threats, 50,000 malware identified a day through the cloud based security screening. Even legitimate websites host malware and bots.

Check Point is used all over the world in a number of industries. They are capable of dealing with network floods, server floods, application floods and have state-of-the-art 24/7 threat management teams.

Customers today are looking for an integrated approach to security that can evolve with their business without breaking the budget, the combination of Check Point’s high performing appliances and extensible software blade protection is a flexible solution that helps businesses plan for future security needs. In a time where a war can start from a computer, it is vital that all companies both small to large are protected.

COMMENTS