019
CHECK POINT 2013 SECURITY REPORT
02
_ THREATS TO YOUR ORGANIZATION
multiple sites and organizations to increase the likelihood
of an attack’s success. When enterprises fight these threats
separately, many attacks are left undetected because there
is no way for corporations to share threat information. To
stay ahead of modern threats, businesses must collaborate
and share threat data. Only jointly can they make security
stronger and more effective.
Intrusion Prevention
Intrusion prevention is a mandatory security layer in the fight
against the different cyber-attack vectors. An IPS solution
is required for deep traffic inspection in order to prevent
malicious attempts to breach security and gain access to
organizational assets. An adequate IPS solution will provide
the following capabilities:
 Protocol Validation and Anomaly Detection – Identify
and prevent traffic that does not comply with protocol
standards and can create device malfunction or security
issues.
 Prevent transmission of unknown payloads that can
exploit a specific vulnerability.
 Prevent excessive communication that can indicate a
Denial of Service (DoS) attack.
See the Threat Picture and Take Action
A clear view of security events and trends is another
key component in the fight against cybercrime. The
security administrator must have a constant and clear
understanding of the network security status to be
aware of threats and attacks targeting the organization.
This understanding requires a security solution that can
provide a high-level overview of the security protections
and emphasize critical information and potential attacks.
The solution should also enable the ability to conduct
deep investigations on specific events. The ability to take
immediate action based on this information is another
essential capability that enables real-time prevention
of attacks or for pro-actively blocking future threats.
The security solution must have flexible and intuitive
management to simplify threat analysis and reduce the
operational overhead of changes.
Security Updates and support
In a constantly changing threat environment, defenses
must evolve with or ahead of threats. Security products
can only effectively manage the latest malware,
vulnerabilities and exploits if the security vendor is able
to conduct comprehensive research and provide frequent
security updates.
Excellent security service is based on:
 Vendor internal research and obtaining data from
multiple sources
 Frequent security updates to all relevant technologies
including IPS, Anti-Virus and Anti-Bot
 Easy and convenient support that can answer questions
and issues specifics to the customer’s environment.
1...,8,9,10,11,12,13,14,15,16,17 19,20,21,22,23,24,25,26,27,28,...50