Advertisment

A New Holistic Paradigm

author-image
DQI Bureau
New Update

The enterprise network environment is changing dramatically. Today, most

enterprises have many more users (both internal and external) accessing their

networks then they had in the past. Most of them are connected to several more

networks including the Internet and many of these networks are being accessed

remotely. Networks are expanding in one more sense-they are running myriad

applications that in turn drive many of the businesses that these enterprises

deal in. This growth and expansion of enterprise networks and increasing

reliance of business on them has given rise to new challenges of securing these

networks.

Advertisment

As the security environment worsens as a result of a complex set of threats

and vulnerabilities, network security must be dealt at different levels and in a

much more comprehensive manner than it is being done today. Moreover, there is a

growing need to look at the entire paraphernalia of internal security from a

fresh perspective. Addressing internal security challenges is not going to be

easy given the current network environment-there are thousands of systems to

be protected and hundreds of megabytes of traffic need to inspected and mediated

per second. The application environment too is changing fast with thousands of

new applications based on hundreds of new protocols coming up. Given all this,

security cannot be just about securing the perimeter with firewalls and IDS or

merely arming end user devices like PC or laptops with anti-virus solutions.

Security solution vendor Check Point Software Technologies realizes this

well. So keeping in mind the growing complexity of the networks, and the threats

and vulnerabilities they face, Check Point recently announced a new three

dimensional "Intelligent Security Strategy" that extends the concept

of security beyond the perimeter and takes care of internal and web security as

well. Besides, securing remote and mobile endpoints is another challenging area

that Check Point is addressing. Check Point, which has long been a confirmed

leader in the firewall solutions market globally, is now offering a family of

internal and web security solutions, and has already won accolades for its new

approach from customers and security analysts.

Opening the annual Check Point Experience, a conference of Asian partners and

users in Bangkok recently, Check Point chairman and CEO Gil Shwed argued

strongly in favour of moving beyond the perimeter with intelligent security in

view of the growing variety and complexity of challenges. Towards this end,

Shwed said Check Point would continue to expand its range of offerings working

on new solutions and concepts.

Advertisment

Check Point's New Testament 

Perimeter Security Challenges 



Threats no longer focused on network layer, the application layer is the hackers' new playground. Attack protection solutions must protect network, services and applications, provide secure office connection, secure remote employee access, resilient network availability, and controllable Internet access
 
Internet Security Challenges



Conventional security products are not ideal solutions to the internal security challenge. Internal security solutions must contain threats (like worms), compartmentalize the network, should not disturb legitimate traffic, protect the desk top, protect the server, secure the data center
Web Security Challenges 



70% of new attacks target web-enabled applications and their number is growing. Web security solutions should provide secure web access, protect web servers and applications, must 



be easy to deploy, should provide integrated access control

Shwed, who founded Check Point Software in 1993, also said that the company

would continue to strengthen its partnerships with other vendors so that

customers always get best-of-breed solutions. Check Point's Open Platform for

Security (OPSEC) framework and alliance that works for integration and interoper—ability

with best-of-breed solutions, already has over 350 companies. These include

companies like Symantec, RSA Security, Computer Associates, McAfee, Trend Micro,

Crossbeam, Resilience besides Microsoft, IBM, Intel, 3Com, HP and Sun

Microsystems.

At the two-day conference (September 1-2, 2004) attended by top Check Point

executives and partners like Nokia, Crossbeam Systems and Resilience among

others, Internal and Web security were clearly identified as the two biggest

challenge areas. However, as enterprises are just now starting to define their

requirement for internal security, it is going to be a challenging task even for

a pioneer like Check Point when it comes to making enterprises see benefits in

implementing comprehensive internal security. For one, as the vendor's

director, marketing, Vinay Goel, points out, in an environment where many users

still consider anti-virus/firewalls the end of security, educating users still

remains the biggest challenge for any vendor.

Advertisment

Interview

Kelvin Lim, regional manager, South Asia, Check Point Software Technologies
How would you define the current positioning of Check Point in the security solutions market?



Check Point is the market leader in firewall/VPN solution with more than 80% share in the enterprise market in India. Our state-of-the-art technology provides secured access to ITC resources and ensures business continuity over the Internet.

Your current roadmap focuses on layered solutions for perimeter, internal and Web security. What do you think are the challenges ahead for you on this roadmap? As a security vendor, what do you think is the biggest challenge you face while dealing with your customers?



It is unwise to believe that there is a single solution/product that could provide security for perimeter, internal and web. Applications, threats and traffic are different between the Internet, the LAN and the Web-based application. Hence, users need to understand the different types of protocol, applications and the threats to them that can be found in Internet, LAN and Web-based applications. Users may tend to choose a security product before designing the security policy.

How mature are enterprises when it comes to understanding security? Do you think business managers understand security? Do you think niche security companies like Check Point are at a disadvantage compared to a networking vendor like Cisco, which offers both networking and security solutions?



Some users put a lot of effort in designing their network infrastructure, server capacity, etc, but very little time and effort in choosing a security solution-without knowing that a by-the-way security solution may compromise the efforts put in the selection and designing of the infrastructure and endanger the business continuity. The objective of implementing or installing a security solution is security-security that not only protects illegal access to the network but also provides against any threat that may capitalize on the vulnerability of a application or protocol. 

How important is India in your current scheme of things?



India has and will always be an important market for Check Point. We will continue to work with our partners in India to provide the most secure solution to enable business continuity. By having a local presence, we will continue to build towards better service and support to the India market.

Urging that there was a need to redefine the perimeter "inward"

Mark Bouchard, senior program director, META Group, said that the current

internal/perimeter approach to security is based on flawed assumptions. "It

is wrong to assume that controls would be consistently effective or that threats

from internal sources are negligible," Endorsing Check Point's current

strategy, Bouchard said it is good that its solutions are addressing the new

emerging dimensions in security individually and holistically, along the major

dimensions.

Ravi Shekhar Pandey in

Bangkok

Advertisment