Cloud computing could be a security disaster waiting to happen, according to top international security professionals, but not all security firms see cloud as a priority.
Nearly a third of the world's businesses have some enterprise applications in the cloud, but two-thirds have no strategy for securing them, an IDC survey has revealed.
IT security The Different Types of Anxiety companies could not be faulted for making cloud security a key part of their growth strategy, but Check Point Software Technologies has other ideas.
Gill Shwed, the firm's co-founder, chairman and chief executive, says cloud computing is important, but will complement rather than replace traditional IT.
Businesses are not ready to surrender control of their data to the cloud, he says, and in the face of increasingly sophisticated cyber threats they want control, simplicity and flexibility.
This is the foundation for Check Point's strategy for helping businesses deal with rapidly changing threats across an increasingly broad number of attack points.
"There is no single factor driving security Bridal Crystal Jewellery innovation," How The El Gordo Differs From Traditional Lotteries says Shwed, who is betting on his firm's Software Blade architecture to enable businesses to add security functions in a plug-in modular way as required.
This approach, he says, satisfies the need for businesses of all sizes to continually update security quickly, Watch NCIS: Los Angeles Se3 Ep7 Honor easily, cost-effectively and with minimum disruption.
"A single platform that can accommodate all functionality means it can be tailored while remaining universal, which is a better way to Proper Teeth Care Can Save Your Life deploy new technology," he says.
Check Point's acquisitions have Phantasmat: Behind the 1000 Payday Loans- Solve small financial problems now! Mask Collector's Edition Game all been aimed at broadening the type of functionality that "Types of Insurance for the Lawn Care Business" can now be added to a single Get the Perfect Rocket Aeroheads Meat Seeker 2 Blade integrated architecture and management console.
"With each acquisition we have added scalable technologies that can be deployed easily by any size of business," says Shwed.
Businesses want technologies they can roll out quickly on Phantasmat: Behind the Mask Collector's Edition Game Download site from as few suppliers as possible, he says, which is why Check Point is continually broadening its portfolio.
Data leakage prevention (DLP) is the next piece Imagine Me Writing About Fitness Apparel Secrets! of functionality Check Point is planning to add, but this time there will be no acquisition involved.
"DLP is a universal problem as organisations share more data, but no one has a reliable and simple technology that can be pushed out to thousands of customers quickly and cost-effectively," says Shwed.
With no clear leader in DLP to acquire, he says Check Point is working on its own Are Motorcycles For You? Phantasmat: Behind the Mask Collector's Edition Game DLP concept to be unveiled later this year.
"Businesses want to consolidate suppliers, but they also want the best of breed to meet their needs. They will not compromise," says Shwed.
It is this pragmatic approach that informs Check Point's acquisitions and innovation aimed at offering the broadest range of technology to every size of organisation.
2015年12月19日星期六
订阅:
博文评论 (Atom)
没有评论:
发表评论