Implementing Checkpoint for Productivity
The Next Generation Threat Prevention space:
One of the things we’ve done with our clients is micro-segmentation of our network using Checkpoint security gateways
Advice on implementing Checkpoint Security Management:
First and foremost, develop a good vulnerability management and patching program. Something like high 90s percent of attacks are performed using exploits of known vulnerabilities that have existed for upwards of ten years or more. That’s a substantial amount of attacks that could easily be prevented by keeping software patches up-to-date. It’s probably the best bang for your buck available in terms of risk mitigation. Assuming you’ve already taken care of known vulnerabilities and patching, understand that in today’s security landscape it’s all about the data. What is the data you’re trying to protect, where does it live, and what are the associated business risks that come along with being custodians of that data? With the numerous data protection laws, there can be very significant penalties associated with breaches and reputational risk is real. Our customers, many of them Fortune 100, don’t want to do businesses with companies that are lax on security. You can see it with the number of security and compliance related questions coming in their RFPs. About 35 percent of incoming RFP questions are related to security – that’s substantial given our core business is about providing assistance services to companies and the people that work for them. Once you know the data, that’s where things get interesting and Checkpoint can help. One of the things we’ve done with our clients is micro-segmentation of our network using Checkpoint security gateways. We know our different types of data, where the data lives and who needs to access it and thus we’ve built a security architecture around that, with Checkpoint being the core of the network and a central security inspection point. In this way Checkpoint next generation threat prevention technologies are applied every step of the way as information flows from system to system within our private cloud; from the internet user to the web layer, application layer to database, from database to backend reporting system, etc. Though we have very good and trustworthy people working for us, the threat of insider attack is a possibility we must consider and micro-segmentation gives us the tools to protect data at both the perimeter and internally. Once micro-segmentation is complete, that will provide very effective security eyes and ears within your network. But once having this information available, it’s only useful and protecting the organization if someone is monitoring and reacting to the constant stream of information that will be generated. Develop a good security operations program to make sense of that information and an incident response plan to go with it. With cost pressures of today it can be challenging to build that capability internally and so there are plenty of companies out there to help, such as Checkpoints Threat cloud service. Make sure that everyone knows what to do in the event of a breach. You don’t want people guessing if one occurs. Everyone should already have a good idea of what they should be doing.