We use cookies to make sure our website better meets your expectations.
You can adjust your web browser's settings to stop accepting cookies. For further information, read our cookie policy.
SEARCH
IN Warsaw
Exchange Rates
Warsaw Stock Exchange - Indices
The Warsaw Voice » Business » February 20, 2008
Business
You have to be logged in to use the ReadSpeaker utility and listen to a text. It's free-of-charge. Just log in to the site or register if you are not registered user yet.
Keeping Computers Safe
February 20, 2008   
Article's tools:
Print

Michał Jarski, country manager for Poland, Romania and Bulgaria at Check Point Software Technologies, talks to Konrad Bagiński.

Is your computer safe?
Of course.

How can you be so sure? How can one make their computer secure and protect it from attacks?
In our internal security policies, we use all those ideas and systems that we offer our clients. My laptop has all the latest Check Point solutions. I have many of them well before they appear on the market, because our own organization is an excellent testing ground. Thanks to that we have the best control over the product.

What have you installed lately?
Endpoint Security, which is an excellent product for laptops. All the latest security technologies for portable computers are combined in a unique way. These are firewall systems and intrusion prevention systems (IPS). A firewall system protects your computer from network attacks; it acts as a wall that protects from intruders. The IPS, in turn, detects and blocks attacks. The system analyzes the behavior at the other end of the network in relation to my computer. The moment it detects an attack it activates an additional protection mechanism; it acts as a security guard holding back a suspicious-looking guest.

The two systems complement each other very well. The IPS is based on behavioral analysis thanks to which we can fight back viruses that have not yet been named or have not appeared on a large scale.

That is the network layer, while the second Endpoint Security component relates to the virtual private network (VPN), which enables remote access to the corporate network via a public network. This creates a virtual channel of access which is impossible to be viewed or intercepted by unauthorized computers. We have a huge amount of experience in creating such solutions, and we are talking here about hundreds of millions of terminals around the world.

Who are your most important clients?
All the biggest banks, financial institutions, internet service providers and IT operators. We work for the biggest companies in most countries throughout the world. Not all of them like to talk about it: security is always shrouded in mystery, so we do not disclose our list of clients. But I can say that Check Point has created some global industry standards.

What threats do you look out for the most?
The company at the outset dealt in firewalls and the VPN-we grew from that. We have always had two objectives: solutions must be effective and easy to manage. Fantastic products can be created, but if they can't be managed easily, they will not fulfill their role. Of course, we also offer antivirus protection products-this refers to applications, file and program protection. We also have leading-edge technology in this area, which combines a variety of features to uncover hostile code. We don't deal in creating computer vaccines after the event, but we detect threats as they arise, including those not discovered earlier by anyone else.

We also have something like an advisory system-a special program that alerts you whether an application that you download from the internet is friendly, or if it was created with a hostile intent.

Identifying dangers comes from the consumer world. Our program Zone Alarm collects information from users. If one of them has a problem with some application, this information is automatically sent to the remaining users of the program. We also have systems to protect data from being leaked out. Data can be copied onto to a USB stick from any computer. It is enough to have an ordinary mp3 player with modified software, which, when connected to the computer automatically, will suck in the contents from the hard disk. End Point Security also protects the computer from such uncontrolled data leaks. That is a unique solution ensuring the broadest possible data and computer protection.
© The Warsaw Voice 2010-2018
E-mail Marketing Powered by SARE