RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Check Point 3D Security

Product
Developers: Check Point Software Technologies
Date of the premiere of the system: February, 2011
Technology: Cybersecurity - Antiviruses,  cybersecurity - the Antispam,  the Firewall

3D Security — new the direction of development of products of Check Point company allowing to define security as the three-dimensional business process integrating personnel, politicians and fulfillment of requirements for ensuring more reliable protection at all security levels. Thanks to the 3D Security компании can easily implement the protection which is coming out far beyond technologies to provide integrity of all information security systems.

Development of the 3D Security компании Check Point allows the organizations to transform security to business process by a join path of the following three spheres: policy, personnel and fulfillment of requirements.

  • Politics. Security begins with precisely certain and clear policy which includes requirements and the strategy of the organization. Today in most the organizations there is no such policy. Instead the companies rely on lists of system procedures of check and a set of separate technologies which do not allow to provide the desirable security level.
  • Personnel. Users of IT systems are especially important part of process of security. Often the mistakes made by users of a system lead to its infection with malware and to information leaks. Most the organizations do not pay due attention to involvement in process of security of users while in fact employees should know security policy and own it and also be able correctly to work during the work on the Internet or exchange of confidential data. At the same time security should work is simplest and transparent and not to cause to users any inconveniences.
  • Fulfillment of requirements. Security consists in receiving bigger control over numerous levels of protection. Unfortunately, the companies are forced to state often loss of control over incompatible politicians of different specialized products. In many cases of a security system give reports about violations, but politicians do not fulfill the requirement. The companies should and can reach higher level of transparency and control by the consolidation of the infrastructure of security and application of the systems which are preventing security violation facts, but not simply identifying them.

Check Point and Ponemon prove need of three-dimensional security (3D Security)

The company Check Point Software Technologies and Ponemon Institute, the research organization in the field of ensuring confidentiality and information management, published data of the global research "Justification of a Question of Complexity of Security in the field of IT in the 21st Century" (Understanding Security Complexity in 21st Century IT Environments) in which it is said that the complexity of security is the main obstacle which the companies face today. Based on a research, the organizations constantly resolve the issues connected with the growing number of priorities in a security system and the low level of awareness of personnel on the corporate policy of the company. Key outputs of the report confirm importance Check Point 3D Security, new approach to security which is beyond technology and combines politicians, personnel and fulfillment of requirements to help to bring IT into accord with business needs.

According to poll more than 2,400 administrators on IT security from the different countries of the world management of the difficult environment of security is the most important of the tasks facing today the companies, and over 55% of the companies use more than seven different suppliers for security of the networks. Researches showed that in issues of strengthening of the IT sector of the organization try to reduce costs and to increase performance. For use of more effective protection the companies need to approach security issues with complex assessment of the environment to find out where there can be possible risks.

According to poll, over 700 respondents consider observance of rules a priority for implementation of new technology. With distribution of "cloud" technologies, mobility, the Web 2.0 and applications for shared access to files, the companies often try to provide appropriate levels of security at all network layers, at the same time strictly adhering to regulatory requirements. Security and observance of regulatory requirements in modern conditions begins with accurately certain policy approved with business requirements of the organization and industry standards.

New technologies created new methods of communication and cooperation for the companies, however the organizations try to manage multidimensional computing environments; it often complicates security and increases risk of loss of information the employees or other persons having to it access. 48.8% of respondents consider that the staff of their organizations it is not enough or are not informed on data protection and corporate policy at all. Thus, higher level of informing and awareness is necessary to help people to realize importance of their role in security of the company. Besides, respondents consider that capability of the user to manage politicians is key function for the general strengthening of security, and 58% of respondents called awareness a priority question.

The architecture of blades of Check Point and the newest development of R75 help to implement 3D Security, turn security into three-dimensional business process, thanks to a combination of policy, personnel and fulfillment of requirements for protection gain. Thanks to a unique combination of the innovative technology and user awareness, the company have more opportunities for preventive protection of the business against threats of the next generation today.

The research "Justification of a Question of Complexity of Security in the field of IT in the 21st Century" (Understanding Security Complexity in 21st Century IT Environments) was conducted independently by the Ponemon Institute organization in February, 2011 by poll of administrators on IT security from the USA, Great Britain, France, Germany and Japan. The focus group included the organizations of different level from 14 industries, including, finance, the industry, defense, retail, health care and education. It is possible to look at the complete report here.