Check Point Software: New Approaches Needed for Cybersecurity
CHECK POINT CPX 360 — As he travels the world as the global security strategist for Check Point Software, Edwin “Eddie” Doyle hears real world stories from customers about their IT security worries and data-security problems. Doyle’s job entails meeting with customers and giving talks about the company’s IT security products as he shares Check Point’s broad cybersecurity capabilities.
The customers talk about their constant stresses, about their never-ending security tasks and their fears of accidentally missing a potential attack or issue that could lead to a damaging data breach or malicious event. Those concerns are heard from customers across the globe, he told Channel Futures at the Check Point CPX360 conference in Las Vegas,. where some 3,400 IT professionals have gathered to learn more about the company’s strategy and tools.
“A common theme among the people who come to talk to me after my talks is that they tell me they stay in detection mode in their anti-malware and other security applications because they need courage to go into prevention mode,” said Doyle.
That can slow networks and systems down when actual attacks take place, he added. Prevention-mode analysis doesn’t fight and defeat attacks, but at least it doesn’t potentially slow systems to a crawl.
For IT security professionals, it’s a tough balance to maintain, he said. And at the same time, IT security leaders say they often don’t have enough staff to always monitor incoming threats and properly make the right decisions about what is and isn’t an attack.
“Customers say they are having these issues,” said Doyle.
One of his answers to these problems, he said, is to bring in prevention products and test them thoroughly to learn their capabilities so all questions and concerns can be evaluated and answered before deploying them. Then – and only then – companies should take the plunge and move toward putting them into real-world production.
“They should test the products in true prevention mode and then launch them in a production environment to see how they are going to work” on a company’s critical systems, said Doyle. “People are afraid to do it and I get it. That takes courage,” he said, to move from detection to actual prevention in a production environment where slowdowns can mean lost business and lower revenue, and where a true attack can be even worse.
At that point, the conversation inside the organization also must change, said Doyle. It is there, he says, when companies need to look at working closely with a channel partner who can really help by providing broad protection and who can manage all the systems that are involved in an integrated and consistent way.
“Spending money on multiple technologies doesn’t mean you are more secure,” said Doyle.
Partners, particularly MSPs, can help businesses by providing the services and the personnel to deploy and manage those applications for their clients.
“We even partner with big data centers so we can manage the blinking lights for them, too.”
Organizational Change Must Also be Discussed
What’s also needed to bolster IT security, said Doyle, is a new relationship between a company’s IT department leaders and …