The enterprise network environment is changing dramatically. Today, most
enterprises have many more users (both internal and external) accessing their
networks then they had in the past. Most of them are connected to several more
networks including the Internet and many of these networks are being accessed
remotely. Networks are expanding in one more sense-they are running myriad
applications that in turn drive many of the businesses that these enterprises
deal in. This growth and expansion of enterprise networks and increasing
reliance of business on them has given rise to new challenges of securing these
networks.
As the security environment worsens as a result of a complex set of threats
and vulnerabilities, network security must be dealt at different levels and in a
much more comprehensive manner than it is being done today. Moreover, there is a
growing need to look at the entire paraphernalia of internal security from a
fresh perspective. Addressing internal security challenges is not going to be
easy given the current network environment-there are thousands of systems to
be protected and hundreds of megabytes of traffic need to inspected and mediated
per second. The application environment too is changing fast with thousands of
new applications based on hundreds of new protocols coming up. Given all this,
security cannot be just about securing the perimeter with firewalls and IDS or
merely arming end user devices like PC or laptops with anti-virus solutions.
Security solution vendor Check Point Software Technologies realizes this
well. So keeping in mind the growing complexity of the networks, and the threats
and vulnerabilities they face, Check Point recently announced a new three
dimensional "Intelligent Security Strategy" that extends the concept
of security beyond the perimeter and takes care of internal and web security as
well. Besides, securing remote and mobile endpoints is another challenging area
that Check Point is addressing. Check Point, which has long been a confirmed
leader in the firewall solutions market globally, is now offering a family of
internal and web security solutions, and has already won accolades for its new
approach from customers and security analysts.
Opening the annual Check Point Experience, a conference of Asian partners and
users in Bangkok recently, Check Point chairman and CEO Gil Shwed argued
strongly in favour of moving beyond the perimeter with intelligent security in
view of the growing variety and complexity of challenges. Towards this end,
Shwed said Check Point would continue to expand its range of offerings working
on new solutions and concepts.
|
Shwed, who founded Check Point Software in 1993, also said that the company
would continue to strengthen its partnerships with other vendors so that
customers always get best-of-breed solutions. Check Point's Open Platform for
Security (OPSEC) framework and alliance that works for integration and interoper—ability
with best-of-breed solutions, already has over 350 companies. These include
companies like Symantec, RSA Security, Computer Associates, McAfee, Trend Micro,
Crossbeam, Resilience besides Microsoft, IBM, Intel, 3Com, HP and Sun
Microsystems.
At the two-day conference (September 1-2, 2004) attended by top Check Point
executives and partners like Nokia, Crossbeam Systems and Resilience among
others, Internal and Web security were clearly identified as the two biggest
challenge areas. However, as enterprises are just now starting to define their
requirement for internal security, it is going to be a challenging task even for
a pioneer like Check Point when it comes to making enterprises see benefits in
implementing comprehensive internal security. For one, as the vendor's
director, marketing, Vinay Goel, points out, in an environment where many users
still consider anti-virus/firewalls the end of security, educating users still
remains the biggest challenge for any vendor.
|
Urging that there was a need to redefine the perimeter "inward"
Mark Bouchard, senior program director, META Group, said that the current
internal/perimeter approach to security is based on flawed assumptions. "It
is wrong to assume that controls would be consistently effective or that threats
from internal sources are negligible," Endorsing Check Point's current
strategy, Bouchard said it is good that its solutions are addressing the new
emerging dimensions in security individually and holistically, along the major
dimensions.
Ravi Shekhar Pandey in
Bangkok