Check Point

Check Point | News, how-tos, features, reviews, and videos

Cisco Unveils a New Security Architecture at CiscoLive

As someone with more than 25 years in the IT industry, I have to give strong kudos to Cisco for putting on a great show this week. CiscoLive is being held in Orlando which is totally appropriate as Cisco has made the event the...

Why Blue Coat acquired Solera Networks

A few weeks ago, Blue Coat Systems acquired Solera Networks. No one was surprised about the acquisition of Solera as it plays in the white hot big data security analytics market. That said, many people remain perplexed by the...

Feds Take A Leadership Role Toward Self-Defending Networks

Around 2005, Cisco coined the term "self-defending networks" and used it to market products like Cisco PIX and Catalyst IDS blades. By 2007, the marketing brain trust at Cisco had moved on in another direction, adopting another grand...

McAfee’s Stonesoft Acquisition: A Strategic Enterprise Move With Short- and Long-term Benefits

I received an email early this morning announcing that McAfee acquired European Next-generation firewall (NGFW) vendor Stonesoft for $389 million. I’m sure the trade press and young/rich Wall Street analysts are running around...

Network Security Trumps Server Security in the Enterprise (Part 2)

I posted a blog at the end of March describing that network security processes, skills, and technical controls are often more thorough than server security processes, skills, and technical controls at enterprise organizations. As a...

Network Security Trumps Server Security in the Enterprise

There is a historical conundrum in cybersecurity about where to concentrate security skills, controls, and oversight. Hackers penetrate networks in order to compromise hosts and steal data. Given this obvious workflow, should CISOs...

Where do Cisco's network security plans go from here?

Despite its leadership position in most enterprise security product areas, Cisco faces a number of technological and competitive challenges to stay out in front. For example, the overarching security plan Cisco outlined two years ago...

What’s Old Is New Again In Information Security

For many years, the RSA Conference was all about the new new thing. New threats, new compliance mandates, new technologies, etc. At the same time, the industry intelligentsia dismissed staple security technologies like endpoint...

First Impressions Of The RSA Conference 2013

After much anticipation, the 2013 RSA Conference has come and gone. I have a number of topics to blog about starting with my positive impressions of the show: 1. Attendance was way up. In the past, a typical RSA Conference in the...

Important and Banal Topics You'll Hear at the RSA Security Conference

Just 3 weeks until the annual RSA Security Conference geek-fest in San Francisco. Should be a good one since the economy is doing okay, VCs are throwing money around and organizations are increasing security budgets. Oh, and let’s...

Could IF-MAP Accelerate Big Data Security Analytics?

Based upon recent ESG research data, it is easy to conclude the big data security analytics is inevitable. In fact, large public sector and commercial organizations are already experimenting with technologies like Hadoop, Splunk,...

Random security predictions for 2013

It’s January 15 which means I probably should have posted a blog on my security predictions for 2013. Here is a somewhat random list of things I believe will happen this year: 1. Visible increase in hacktivism. Hacktivists have a...

Big Changes Could be Coming in the Endpoint Security Market

Over the past few weeks, I’ve spoken to a number of security vendors including Bit9, Bromium, CounterTack, Invincea, Malwarebytes, and Sourcefire. Each of these firms is offering some type of new security technology for...

The Security Skills Shortage Is Worse Than You Think

I’ve written a lot about the security skills shortage but it is worth reviewing a bit of data here for context. According to ESG Research, 55% of enterprise organizations (i.e. those with more than 1,000 employees) plan to hire...

Software-defined Security?

Security continues to be a major hurdle for server virtualization and cloud computing so we are likely to hear a lot of cybersecurity buzz coming out of VMworld this week. Leading up to the show, I’ve heard a few people pushing a...

Advance Malware Protection: Network or Host?

Large organizations have legitimate cause for concern. Malware creation and proliferation is increasing rapidly as cybercriminals and state-sponsored organizations create the next round of APTs, botnets, Trojans, and rootkits. What's...

A Multitude of Mobile Security Issues

The Black Hat USA conference takes place next week.  If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security.  Yup, a lot of hype but this is a topic worth discussing as...

Check Point plans to release document security software

The technology came from its 2010 acquisition of Liquid Machines

Check Point: Now you can run up to 250 virtual security systems on 1 gateway

Check Point Software Technologies Monday unveiled a gateway it says will let businesses radically consolidate the vendor's firewall/VPN, intrusion-prevention and other security products as "virtual systems" on a single appliance. ...

Survey reveals tech security generation gap

Analyst questions results that show young tech-savvy users are less concerned with security -- and more prone to breaches -- than older users

Load More
You Might Also Like