Feeds

'Boil the ocean' data loss prevention needs to change

Check Point slams security so complex you never get around to turning it on

Protecting against web application threats using SSL

Check Point is pushing its vision of consolidating disparate security products, managed from a single dashboard and centred on enterprise firewalls.

Consolidating security offers better control, Gil Shwed, Check Point's chief exec, told delegates to the security vendors' annual conference in Barcelona on Wednesday. Check Point's 3D security approach brings together three strains – policy, people and enforcement – on technologies such as anti-malware and data loss prevention delivered through software modules on firewall appliances and endpoints, such as laptops or mobile devices.

The Israeli-based security firm is touting its R75 next-gen Firewall and Check Point Unified Security Manager as the best tools for the job of consolidation without making any specific announcements about improvements to the technology, instead promoting the idea that sysadmins can enjoy better security at lower costs by culling point products in corporate environments.

The approach can allow large enterprises to reduce the number of security vendors they have in their environment from 15-20 to a more manageable 3-5, according to Shwed, who said the strategy offered "better security at lower cost".

"It's not enough to pile up different technologies like weapons," Shwed said. "Security should become a business process."

In addition, complexity can also be reduced by applying "simple, usable and meaningful" rules for technologies such as data loss prevention.

John Vecchi, head of global product marketing at Check Point, and a former senior exec as McAfee and Symantec, described the data loss prevention (DLP) market as the "most disappointing" segment of the security market and not just because it has failed to achieve widespread adoption.

"DLP has been on the market for years but very few firms have deployed and utilised the technology," Vecchi said.

Often even large enterprise early adopters have failed to apply the technology because of what Vecchi described as a "boil the ocean" approach to deployment that some technologies require.

"Some of these technologies are sophisticated and impressive but it can take 12 months to discover and a further 12 months to classify data. That leaves you with an implementation time of 24 months so that many firms who have bought the technology have not turned it on," Vecchi said.

This needs to change so that the technology can be up and running in hours rather than months, according to Vecchi, who added even small business (such as dentists) need data loss prevention technology to guard against the accidental emailing of confidential data or the deliberate extraction of commercial information.

The problem of buying but actually applying security technologies has cropped up before in the world of information security, most notably with intrusion prevention technology. "Many firms still run IPS in passive mode," Vecchi said. "It's a mature market – please turn it on."

Vecchi underlined Schwed's central message that security unification needs to happen in order to give sysadmins any hope of managing threats.

"The number one challenge is managing the madness of complexity, not dealing with threats," Vecchi concluded. ®

Reducing the cost and complexity of web vulnerability management

More from The Register

next story
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Home Depot: 56 million bank cards pwned by malware in our tills
That's about 50 per cent bigger than the Target tills mega-hack
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
UK.gov lobs another fistful of change at SME infosec nightmares
Senior Lib Dem in 'trying to be relevant' shocker. It's only taxpayers' money, after all
Critical Adobe Reader and Acrobat patches FINALLY make it out
Eight vulns healed, including XSS and DoS paths
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.