printmgr file
printmgr file
printmgr file
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CHECK POINT SOFTWARE<br />
FORM 20-F DFN ON-BOA<br />
ˆ200FDMqk04f7fmY7sŠ<br />
200FDMqk04f7fmY7<br />
RR Donnelley ProFile wcrdoc1<br />
10.10.12 WCRjacis0in 26-Mar-2012 17:20 EST<br />
229899 TX 20 2*<br />
PAL<br />
09-Apr-2012 13:21 EST CURR<br />
PS PMT 1C<br />
• Growing Complexity in the IT Network. Another key trend affecting IT security is the complexity<br />
of deploying, managing and monitoring the many technologies needed to fully secure the<br />
enterprise IT network. Each security solution comes with its own management console and<br />
requires specific training, stretching IT department resources. Integrated security solutions are<br />
sought in an effort to keep the security infrastructure simple to manage yet flexible enough to<br />
make changes.<br />
Check Point’s Vision for Security<br />
In responses to these various trends and challenges, enterprises have been seeking to add layers of security<br />
to their existing infrastructure, multiplying the number of disparate point solutions that they deploy in an attempt<br />
to achieve a higher level of protection. Unfortunately, while adding new solutions, enterprises also create more<br />
IT infrastructure complexity, leaving them with a nearly unmanageable environment. In February 2011, Check<br />
Point announced its new vision, which seeks to redefine security and enable enterprises to address major security<br />
challenges with a strong security platform that elevates simplicity as a top priority. Check Point’s vision, known<br />
as 3D Security, redefines security as a business process that will allow enterprises to achieve the required level of<br />
security while streamlining operations and educating employees and users on corporate security policy. Check<br />
Point 3D Security combines policy, people and enforcement for stronger protection across all layers of security –<br />
network, endpoint, applications and data. With 3D Security, enterprises will be able to implement a blueprint for<br />
security that goes beyond technology to ensure the integrity of all information security within the network.<br />
The three dimensions of Check Point’s vision are:<br />
• Policy: Security starts with a well-defined and widely-understood coherent and consistent desired<br />
level of security that outlines the enterprise’s needs and strategies. Many enterprises today do not<br />
have such a strategy; and instead, they rely on lists of system-level checks and on a collection of<br />
disparate technologies that do not always deliver the desired level of security.<br />
• People: Users of IT systems are a critical part of the security process. It is often users who make<br />
mistakes that result in malware infections and information leakage. Most enterprises do not pay<br />
sufficient attention to the involvement of users in the security process, when, in fact, employees<br />
need to be informed and educated on the security policy and their expected behavior when<br />
accessing the enterprise network and data. Employees should be the first line of defense against<br />
social engineering but their security awareness is too often neglected. At the same time, security<br />
should be as seamless and transparent as possible and should not change the way users work.<br />
• Enforcement: One of main requirements of security is gaining better control over the many layers<br />
of protection. Unfortunately, enterprises often find themselves losing control over the disparate<br />
configurations from various point products. In many cases security systems generate violation<br />
reports but do not enforce the policy. Enterprises should and can achieve a higher level of<br />
visibility and control by consolidating their security infrastructure, and by using systems that<br />
prevent security incidents rather than just detecting them.<br />
In November 2011, Check Point announced the acquisition of privately held Dynasec Ltd., a leading<br />
provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check<br />
Point 3D Security that enables companies to view security as a business process, focusing on policy, people and<br />
enforcement. The combined security and GRC solutions will enable customers to manage their entire 3D<br />
Security process from corporate objectives, to policies and security enforcement – maintaining a continuous<br />
holistic security and compliance picture.<br />
Check Point’s offering will include security, business and consulting services together with Dynasec’s<br />
easy2comply leading GRC software solution that provides a rich set of GRC frameworks with built-in best<br />
practices that are customizable for hundreds of compliance standards. The Check Point solution will offer a<br />
simple way for businesses to automate the manual task of handling a growing number of regulations and<br />
compliance standards.<br />
20