Check Point has wrapped up their annual CPX 360 conference. The lights are off. The delegates gone. Now all that remains are those insights that left a mark. Below we look at three points that resonated and share some insights from CPX 360, recent Check Point views on those topics combined with our own thoughts. So, if you didn’t get to Bangkok this yearread on to find out what’s on the radar for Check Point.
1. Unified security platforms will dramatically simplify security for more robust defense
The industry has long talked of the merits of simplicity in security, and whilst Leonardo da Vinci may not have been talking about cyber security when he uttered the words “Simplicity is the ultimate sophistication”, the mantra has been adopted by serious security players.
This focus on platforms is a direct response to the modern landscape where organisations are converging applications and data onto IP-based networks and rolling out cloud native applications as and when they are needed. Workers are no longer bound to a desktop in the office, rather laptops, tablets, and BYOD are the flavour of the day. Applications have shifted from traditional on premises into a hybrid world and are feeding an IoT revolution. All that isn’t even considering the amount of or outsourced software under the SaaS umbrella.
To mitigate the threat and protect a modern-day workforce, Check Point took the opportunity to express the value of using a single security provider across threat, mobile and cloud – highlighting their Infinity platform and Gen V security. The Gen V promises to leave the piecemeal, multiple point-solution deployment as a thing of the past. Instead, Check Point are putting an architecture capable of unifying all networks, cloud, and mobile, supported by automatic and immediate threat intelligence at the centre of modern security practices.
Key to that success was the threat direction coupled with a world class management layer with Check Point citing Infinity’s key differentiator when compared to other approaches is the integration of best in class threat prevention and management across the architecture.
As Check Point states “No other vendor has Check Point’s level of leadership in both areas, which is why we are the only vendor in the top-right section of Gartner’s 2017 Magic Quadrant for both next-generation firewalls and unified threat management.”
2. AI is here, but it’s not quite a silver bullet (yet)
Evan Dumas, Threat Prevention Sales Leader at Check Point took to the stage to discuss AI’s role in cyber security and whether it’s the silver bullet that some claim it to be.
Several vendors in the industry are touting AI, deep learning and machine learning as the future of security (or the future of IT.Period), and well it may be. But professionals need to protect their environment today, not just in the future. So, is AI ready to take on the challenge as it stands right now?
The answer is yes… and no.
It has the capacity to fundamentally impact the ability of an organisation in the prevention, detection and remediation of attacks for the better, but as an embarrassing moment for AI back in 2016 showed, even a simple AI chatbot doesn’t always get it right. It was a clear demonstration that we may not be quite there yet when it comes to AI tech.
AI is a topic that’s been raised before by Check Point and was again highlighted during CPX 360 – stressing the fact Check Point has been investing in AI for a number of years now. The company has built machine learning into many of its threat intelligence products, primarily to run analytical tasks. Those analytical tasks are resulting in 10% higher attack recognition rates than comparative figures when humans are in charge.
Check Point is continuing to invest and build on the current AI platforms and as the company pushes their Gen V security platform and ultimately onto Gen VI one day, AI will become even more prevalent.
So, what was the key take away? AI isn’t coming, it’s here.
And those that don’t plan and build a future that incorporates AI are looking more likely than not to become outdate and obsolete targets for malicious activity.
IOT – What device proliferation means to security
Is winter coming? That was the question posed by Avi Rembaum, Vice President, Security Solutions at Check Point in relation to the rise and rise of IoT.
It certainly seems that way.
More connected devices and more connectivity present more opportunities for cyber attackers. That risk is being demonstrated already with researchers at the company watching a Botnet ‘IoTroop’, which has been evolving and recruiting IoT devices at a far greater pace and with more potential damage than the Mirai botnet of 2016.
Check Point monitored this threat and it soon became apparent that the attempted attacks were coming from many different sources and a variety of IoT devices, meaning the attack was being spread by the IoT devices themselves.
The challenge for security professionals is the upside to intelligent IoT is too great for businesses to ignore. But also, that the days of security of the data centre perimeter are over. Today the perimeter is everywhere and security vendors, and those responsible inside organisations, need to consider this new paradigm when designing security.
Check Point has said in the past they estimate over a million organisations have already been scanned worldwide, including the US, Australia and everywhere in between, and the number is only increasing.
The good news? Check Point is at the forefront of preventing these IPS attacks and that IPS coverage is well within the scope of Check Point with the methods of these IoT Bot infections already being prevented by Check Point IPS.
So what is the key takeaway on IoT security? A new cyber-storm is gathering, and businesses need to be acting today to prevent the attacks of tomorrow with next generation security tools capable of dealing with next generation threats.
Interested in working with Check Point?
Arrow’s making significant investment in the technologies of the future. We’re serving the IT channel with Check Point professionals on standby to support you with pre-sales, sales and marketing support.
If you’re looking for a quick way to introduce Check Point into an organisation today and ensure they’re protected for tomorrow, consider a Security Check-Up with Arrow or contact Arrow to discuss Check Point and the security of tomorrow.