CHECK POINT SOFTWARE TECHNOLOGIES TOP 5 SECURITY PREDICTIONS FOR 2014

CALGARY, AB – December 30, 2013 – Check Point Software Technologies has identified the Top 5 Security Threats to beware of in 2014:
1. Hacking will hit home
Hacking is no longer limited to the enterprise and government spaces. Recent hacks have affected consumers directly and this will continue in 2014. New, more sophisticated techniques will impact consumer and home-based technologies. Household appliances containing Bluetooth and wireless communications could provide access to a private household’s systems and communications. A hacked GPS could cause issues that lead to tragedy. In addition, a compromised “SmartHome” could provide hackers with personal information and household occupants’ comings and goings.
2. Vendors will provide a unified front
Security architectures of single layers or multi-vendor point solutions are no longer acceptable security strategies and are ineffective solutions. We will see more and more vendors attempting to offer unified, single solutions through development, partnership and acquisition to attain all the required security elements that need to be unified. While this is happening now, we will see much more of this in the coming year with the added elements of threat collaboration.
3. Threat Collaboration
No single vendor or enterprise ever has a complete and current picture of the threat landscape. Therefore, in order to maintain the most current protection available, collaboration and the sharing of threat intelligence is required. As a result, partnerships between “frenemies” and acquisitions within the industry will occur to supplement building the leading unified solution with the best intelligence.
4. Continued experimentation with Big Data
Vendors and enterprises are seeking the magic formula here. Vendors are trying to design and build a big data “solution” that is “turn key” and can be replicated and add value across customer bases. Enterprises are seeking “turn key” vendor solution(s) and are investing in trying to build their own for better protection, context and awareness.
5. Threats to campaigns and Nation-state:
Campaigns – We expect continued and more sophisticated attack campaigns to steal IP and money, without physical access and leaving no fingerprints. This is only going to increase.
Nation-state – The nation state cyber initiatives, probing and attacks will continue, a la China and APT1. The bad guys are working hard to get better and are investing heavily. We believe they see lots of opportunities to take advantage of vulnerabilities.
-30-
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
©2013 Check Point Software Technologies Ltd. All rights reserved.

Leave a Reply