About
Subscribe

CXP 2010 kicks off in London

Kirsten Doyle
By Kirsten Doyle, ITWeb contributor.
London, 14 Apr 2010

CXP 2010, Check Point Software Technologies' annual user and event, began in London yesterday, with more than 1 000 delegates from Israel and all over Europe.

Amnon Bar-Lev, VP of global field operations at Check Point, says this year's CXP is a unique event. “Security in the past was quite straightforward. There were few challenges and, therefore, few solutions. The Internet grew and so did - and it became increasingly complex.”

He says there are 15 different point products in the security industry. “Check Point is trying to present this in a different way; build a security infrastructure from an architecture perspective. In this way, policy and infrastructure will grow with a business, reducing complexity and minimising the need for a total overhaul of infrastructure to meet growing security needs.

“As we enter a new decade, we are all looking at the evolution of security - past and future. Over the last 10 years, Check Point has defined three areas for security: network, endpoint and security management. We have integrated these into complete security solutions, such as our single endpoint agent and our integrated appliances.”

In 2009, says Bar-Lev, Check Point changed the face of security, by introducing a software blade architecture. “In 2010, we are looking at a holistic approach, where endpoints and networks are integrated and leak prevention and intrusion prevention systems impact all domains of security.

“Our vision going forward is more, better, simpler. By more, we want to expand coverage and come up with more products. By better, we want to improve security, from detection to prevention. By simpler, we want to reduce complexity and consolidate our solutions.”

Bar-Lev says, in the decade to come, Check Point's focus will be on helping its customers solve the security maze. To this end, he says the company will unveil several new security solutions. “Delegates will learn how to get more security by choosing from over 30 gateway, endpoint and management security software blades.

“They will see how to achieve better security by moving beyond detection and prevention. Lastly, they will realise simpler security, when they turn information into action with unified security management across gateways, endpoints and mobile devices.”

Share