In the last few years there has been a strong drive around Digitization by the enterprises and a stronger thrust by Government around “Digital India”. This has led to creation of huge Digital Estate both in Enterprises & Government. The digital drive on one side has enabled respective entities to be more competitive or even transform their businesses, but on the other side has augmented their threat landscape.
While the growing digital estates have increased the critical mass for the Cyber attackers to act, their competence level has also improved considerably over the years. The attacks have come of generations and have become increasingly sophisticated, leading to data thefts, frauds, identify theft, etc.In the wake of evolving threat landscape leading to fast rise in cyber compromises and breaches, enterprises need to re-access their readiness and gaps.
Check point has yet again demonstrated their leadership by putting together a structured and simple model of risk generations over last 25 to 30 years. While we face Gen V attacks today: Large scale, multi-vector, mega attacks targeting businesses, individuals and countries, readiness is hovering between 2nd and 3rd generation across threat vectors, thus severely exposed and vulnerable.
Reserve Bank of India (RBI) has registered a total of 2,059 and 921 cases of fraud involving ATM/debit cards/credit cards and Internet banking frauds reported (amount involved Rs 1 lakh and above) during the year 2017-18 and 2018-19 (up to September 30, 2018), respectively.
According to Venugopal N, Director of Security Engineering, India, Check Point Software Technologies (India) Ltd, “At Check Point, we offer the largest security technology portfolio to the industry. Our single-architecture, integrated, intelligence-driven solutions protect customers from the data centre to the cloud and all points in between.” This gives customers the freedom to create, grow and transform their businesses securely, by protecting them against current and potential attacks across all their networks, virtual, cloud, remote office and mobile environments.
Check Point’s Gen V security leaves the patchwork, best-of-breed deployments of the past behind. It is characterized by an architecture that UNIFIES all networks, cloud, end points and mobile, supported by automatic and immediate threat intelligence.
Gen V protection is based on attack prevention and speed of response. New techniques analyse behaviour at the OS and CPU levels, using behavioural analysis to prevent malware at the exploit phase before it has an opportunity to deploy. Proactive file sanitation offers true, powerful prevention without processing delays.
Check Point has a vast customer base across various Industry verticals – Financial Services, Healthcare, Retail, Power, Oil & Gas, Manufacturing, Pharmaceutical, Government, Defence, Homeland security etc.
Any Organization across any industry vertical that has embraced digital to conduct their business is a potential critical mass for hackers. No business is too small or too large to fall prey to data breach, and no industry has proved immune to attacks. From Health, banking, Online Retail to Manufacturing, Education, Power, Oil & Gas, every single industry is facing cyber threats.
As per the forecasts, world economy will pay upward of US $ 6 trillion to the cyber criminals by 2021. Venugopal N further adds, “The growing use of smarter mobile phones, cloud computing technology, Internet of Things (IoT) and the widespread availability of information in the cyberspace have not only caused information technology (IT) paradigms to shift across industries, but also opened up new avenues of attack for cyber-criminals and hackers.”
Lastly, wide range of motives of the perpetrators, from financial gains, demonstrating technical superiority, political motives to serving military objectives for home countries, stealing trade secrets leave no single industry insulated from cyber attacks.
As a security provider, Check Point is focusing on rolling out more comprehensive and hyper scalable solutions to provide protection against evolving cyber threats. We are already ready with the security of the future with a robust cloud security portfolio that supports single click and agile deployment. Further, talking about building our product portfolio strength, we have identified key focus areas for the year and will be centring our energies to create awareness on the following offerings in the market.
Check Point Ethos is “Prevention Not Detection “once Malware is inside, it’s already too late. Our philosophy has always been to work closely with the channel partner community and our market strategy is consciously aligned to make customers more security aware and make them proactively deploy the latest in security and enabling them to proactively secure themselves.
The three things CISOs should be looking at
- With every single organization gone digital to transform their businesses and attain competitive advantage, it’s time for CISOs to go back to the drawing board and re-access Risk Landscape for their business and accordingly prescribe key priorities.
- Re-look and plan existing3 security architecture which is based on multiple point products to move to standards based unified architecture based supporting single pane of glass for management, covers all threat vectors, Prevention first approach, sharp visibility to actionable information and proactive enforcement to mitigate potential attacks.
- Partner with industry leaders and experts in cyber security space with strong track record over the years to build safe and secure digital business.