Check Point refines security offerings to meet changing demands


LAS VEGAS – When Check Point Software started operating in the IT security industry in 1993, smartphones, mobile tablets, IoT and cloud applications and services did not exist yet. Back then, Check Point's # 1 position provided state-of-the-art security for protecting equipment, data centers and desktop computers that purred for a wide range of businesses.

But with the arrival of powerful smartphones, starting with the Apple iPhone, in 2007, the explosive growth of cloud computing and the continued spread of mobile computing, devices for the Internet of Things and Other new technologies, Check Point had to deal with a constantly changing demand. technological changes that help define its next moves.

"Customers will invest more in three directions in the coming years": more applications in the cloud, more mobile devices containing an increasing amount of sensitive data and an exponentially growing number of devices IoT, said Itai Greenberg, vice president of product management for Check Point. Greenberg talked with eWEEK This week, at the CPX 360 User and Partner Conference, we presented some details about the company's past and future projects as it refines and develops its lines of security products and services. IT for its customers.

"These are the problems the IT department will face," Greenberg said. "If companies today have a number of X applications in the cloud, they will have 10 times this number of applications over the next few years. cloud."

In response, Check Point continues to add more features to its products to meet the demands of its customers, he said. The company is investing in making this happen and has identified it as a priority, according to Greenberg.

"We have three initiatives: improving existing products, creating new products, and then planning technology in two or five years to create new capabilities that can last up to ten years," he said.

Today, Check Point has approximately 100,000 clients worldwide and provides services to many Fortune 500 companies, including banking and finance, Greenberg said. The company's products and services provide protection for a wide range of business-critical data center and cloud-based systems including e-mail, databases, Exchange Web servers, mobile devices, applications and more. strategic and more.

Recent acquisitions

Check Point also focused on making key strategic acquisitions to extend its customer offerings, including last year's acquisition of Dome9, which improves the security of the cloud infrastructure as a service to customers. Amazon Web Services, Microsoft Azure and Google Cloud. In January, Check Point also acquired ForceNock, which has created a Web application and API protection technology that Check Point is currently working on to integrate into its products, Greenberg said.

Aviv Abramovich, head of product management for the company's security services, said eWEEK Check Point has focused in recent years on providing a comprehensive IT security platform that includes just about all the tools that business customers need to protect their business.

"We are looking at the digital transformations that all our customers are going through," and we are evaluating them to determine what needs to be protected, from the data center to the cloud, through the endpoints, mobile devices, and more, Abramovich said. "We see attacks coming from all fronts on these things."

Instead of taking a fragmented approach involving multiple vendors and products targeting a particular vulnerability, Check Point strives to address all customer security issues, he said.

"It must be from start to finish, not just isolated pieces," he said. "If you have separate products protecting each of these things, you may not see other attacks on other systems." Intelligence sharing between attack vectors is essential. think having visibility where everything is in a unified system is better than multiple systems. "

As for the products, Check Point has presented its latest offer, Maestro, in late January to give customers a new option when they want to add new security gateways for expansion purposes. Maestro is an orchestration system that allows a single gateway to quickly expand to 52 gateways, providing businesses with increased flexibility and performance on demand.

at the end of January to give customers a new option when they want to add new security gateways for expansion. Maestro is an orchestration system that allows a single gateway to quickly expand to 52 gateways, providing businesses with increased flexibility and performance on demand.

Analysts weigh

Several industry analysts also attended the CPX 360 conference, including Mike Sapien from Ovum. And while Check Point executives often praised their leadership positions in the current IT security industry, Sapien said he saw the company in a catch-up role today.

"Although Check Point felt it was taking a leadership position, I really feel that they are making a comeback after years of competition," such as Fortinet and Palo Alto Networks, said Sapien. "Check Point was a clear leader five or ten years ago, but it is catching up to become one of the leaders now."

Paula Musich, Analyst at Enterprise Management Associates, agrees.

"Check Point is one of the leading independent computer security vendors on the market, although this distinction is not recognized in North America," said Mr. Musich. "In the past, their marketing was underutilized, although that seems to have changed more recently." I do not think the market recognizes the strength of Check Point's threat research organization. "

Another analyst, Chris Rodriguez of IDC, said several Check Point customers attending the conference said he was excited by the recent announcement of the company's latest offer, Maestro. "They've touted it as a new, positive, and exciting announcement, and that makes sense: it can deliver performance, scalability, reliability, and ultimately value."

According to Rodriguez, customers must monitor Check Point's operation to update its architecture as part of the transition to its next generation of software and security services called Gen IV.

"Part of the transition to Generation VI security will involve an update of the Check Point architecture, with nanoagents for IoT and a closer microservice architecture, all connected by a type of Fog-type cloud computing, "said Rodriguez. "This approach will help security protections better track assets and enforce the precise controls that will be needed in the information age."