18.07.2012 Views

printmgr file

printmgr file

printmgr file

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHECK POINT SOFTWARE<br />

FORM 20-F DFN ON-BOA<br />

ˆ200FDMqk04f7fmY7sŠ<br />

200FDMqk04f7fmY7<br />

RR Donnelley ProFile wcrdoc1<br />

10.10.12 WCRjacis0in 26-Mar-2012 17:20 EST<br />

229899 TX 20 2*<br />

PAL<br />

09-Apr-2012 13:21 EST CURR<br />

PS PMT 1C<br />

• Growing Complexity in the IT Network. Another key trend affecting IT security is the complexity<br />

of deploying, managing and monitoring the many technologies needed to fully secure the<br />

enterprise IT network. Each security solution comes with its own management console and<br />

requires specific training, stretching IT department resources. Integrated security solutions are<br />

sought in an effort to keep the security infrastructure simple to manage yet flexible enough to<br />

make changes.<br />

Check Point’s Vision for Security<br />

In responses to these various trends and challenges, enterprises have been seeking to add layers of security<br />

to their existing infrastructure, multiplying the number of disparate point solutions that they deploy in an attempt<br />

to achieve a higher level of protection. Unfortunately, while adding new solutions, enterprises also create more<br />

IT infrastructure complexity, leaving them with a nearly unmanageable environment. In February 2011, Check<br />

Point announced its new vision, which seeks to redefine security and enable enterprises to address major security<br />

challenges with a strong security platform that elevates simplicity as a top priority. Check Point’s vision, known<br />

as 3D Security, redefines security as a business process that will allow enterprises to achieve the required level of<br />

security while streamlining operations and educating employees and users on corporate security policy. Check<br />

Point 3D Security combines policy, people and enforcement for stronger protection across all layers of security –<br />

network, endpoint, applications and data. With 3D Security, enterprises will be able to implement a blueprint for<br />

security that goes beyond technology to ensure the integrity of all information security within the network.<br />

The three dimensions of Check Point’s vision are:<br />

• Policy: Security starts with a well-defined and widely-understood coherent and consistent desired<br />

level of security that outlines the enterprise’s needs and strategies. Many enterprises today do not<br />

have such a strategy; and instead, they rely on lists of system-level checks and on a collection of<br />

disparate technologies that do not always deliver the desired level of security.<br />

• People: Users of IT systems are a critical part of the security process. It is often users who make<br />

mistakes that result in malware infections and information leakage. Most enterprises do not pay<br />

sufficient attention to the involvement of users in the security process, when, in fact, employees<br />

need to be informed and educated on the security policy and their expected behavior when<br />

accessing the enterprise network and data. Employees should be the first line of defense against<br />

social engineering but their security awareness is too often neglected. At the same time, security<br />

should be as seamless and transparent as possible and should not change the way users work.<br />

• Enforcement: One of main requirements of security is gaining better control over the many layers<br />

of protection. Unfortunately, enterprises often find themselves losing control over the disparate<br />

configurations from various point products. In many cases security systems generate violation<br />

reports but do not enforce the policy. Enterprises should and can achieve a higher level of<br />

visibility and control by consolidating their security infrastructure, and by using systems that<br />

prevent security incidents rather than just detecting them.<br />

In November 2011, Check Point announced the acquisition of privately held Dynasec Ltd., a leading<br />

provider of Governance, Risk Management and Compliance (GRC) solutions. The acquisition extends Check<br />

Point 3D Security that enables companies to view security as a business process, focusing on policy, people and<br />

enforcement. The combined security and GRC solutions will enable customers to manage their entire 3D<br />

Security process from corporate objectives, to policies and security enforcement – maintaining a continuous<br />

holistic security and compliance picture.<br />

Check Point’s offering will include security, business and consulting services together with Dynasec’s<br />

easy2comply leading GRC software solution that provides a rich set of GRC frameworks with built-in best<br />

practices that are customizable for hundreds of compliance standards. The Check Point solution will offer a<br />

simple way for businesses to automate the manual task of handling a growing number of regulations and<br />

compliance standards.<br />

20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!