/Bhaskar Bakthavatsalu, Managing Director – India and SAARC at Check Point Software Technologies

Bhaskar Bakthavatsalu, Managing Director – India and SAARC at Check Point Software Technologies

Bhaskar Bakthavatsalu
“Checkpoint is uniquely positioned to address a whole lot of cyber security related complexities”

Check Point, an Israeli cyber security company listed at NASDAQ, holds expertise in providing solutions for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management. In India, it has a consumer base including companies, MNCs and government bodies where its services are being used. Bhaskar Bakthavatsalu, Managing Director – India and SAARC at Check Point Software Technologies (India) had a word with Haider Ali Khan on Check Point’s offerings for India.

Is data the new oil?

Data acts as the most important asset for any company and an individual. If leveraged efficiently, data can help organizations understand its customer needs and give direction to monetize business strategies. While storing data is easier, there should never be an assumption that information thus, stored is automatically secured even if basic security perimeter are deployed.

Today, data is more transferrable and accessible than ever before. No matter where data is stored, strong defense mechanism like encryption and tokenization need to be placed at the source of the data. Companies need to realize a cyber-attack is inevitable and key stakeholders, partners and their customers, expect them to take reasonable measures to prevent attacks in the first place, and when that fails, to ensure that their personal data is stored and of no use to unauthorized users. Loss of sensitive and confidential could cost you industrial edge, loss of clients or cause reputational harm.

How are you addressing the issue of data security in a developing country like India where people and enterprises do not generally pay any heed to security?

In 2018-19, the awareness about the cybercrimes among digital users has certainly heightened. As both enterprises and consumers started consuming more technology, their data and identities are becoming vulnerable to the kind of attacks that we are unable to anticipate. Addressing an anti-virus no longer serves the purpose. To address the issues of cyber security in India, it requires a robust cyber security structure that mandates the adopted of best security practices for all organizations dealing with sensitive data. Companies like us are closely working with government bodies to secure the digital ecosystem across Indian region.

We’ve seen some serious frauds especially in financial sector in which millions of people were duped. How can we make it more secure and what has been the role of Check Point so far in it?

While we have witnessed high profile cyber-attacks in financial sector, Indian financial firms have already rolled out safety features such as two factor authentication, passwords and OTPs in order to safeguard consumers’ interests. However, the need is for mandating the basic security features that need to be deployed within every big or small financial system to prevent fraudulent transactions. For the past many years, Check Point has been dedicated itself to providing customers with uncompromised protection against all types of cyber threats while reducing security complexity and lowered total cost of ownership. To stop getting the data into wrong hands, Check Point security solutions encompasses all facet of protecting content, from data loss prevention (DLP), encryption, rules based safe data handling and more.

What are your offerings for Indian market and how would you be able to bridge the gap?

Security continues to be the key concern for enterprise across the globe and with changing technology, data is no longer restricted to just traditional IT and has moved to cloud storage. As cloud storage continues to grow, the attacks also continue to sky rocket and traditional security tactics don’t align with the constant growing adoption. Swift adoption of AI, ML has also created a challenge of control, management and visibility for enterprises. Check Point offers the largest security technology portfolio in the industry to combat such concerns. Check Point CloudGuard is a comprehensive suite of products that deliver proactive protections for cloud data, workloads, networks and applications:

  • CloudGuard IaaS that provides advanced threat prevention for enterprise network in public and private clouds. It protects assets in the cloud from the most sophisticated Gen V cyber-threats with dynamic scalability, intelligent provisioning and consistent control across physical and virtual networks.
  • CloudGuard Dome9 that provides native security and compliance automation across the public cloud, delivered as a service. The solution allows enterprises to easily manage the security and compliance of their public cloud environments at any scale across various cloud platforms.
  • CloudGuard SaaS that prevents targeted attacks on SaaS applications and cloud-based email, also delivered as a service. The solution blocks attacks on SaaS applications and cloud-based email.

We are facing 5th generation attacks, whereas enterprises are protected with only 2nd or 3rd generation security. It is very important to educate enterprise on the rising concerns and ways to prevent it. Check point Ethos is “Prevention Not Detection “once Malware is inside, it’s already too late. Our philosophy has always been to work closely with the channel partner community and our market strategy is consciously aligned to making customers more security aware and make them proactively deploy the latest in security and enabling them to proactively secure themselves.

Cyber-crime is still not very well defined in India? Do you believe in this statement? Does it require few modifications?

Cyber-crime cannot have a fixed definition as it will keep evolving with the changing threats. However, it can be explained as any unlawful activity on the cyberspace where any individual or enterprise’s space has been breached without their knowledge to attack/ tamper their data.

How much Check Point would be investing in India and who will be your prime targets, individual, companies, MNC or Government?

The company philosophy has always been to work closely with the channel partner community. Today, Check Point is uniquely positioned to address a whole lot of cyber security related complexities due to rich expertise and skill sets. We have a wide array of consumer base including companies, MNCs and government bodies.

What are the new threats that can come with AI, ML or Blockchain?

Machine learning, artificial intelligence and big data technologies have seen major breakthrough in the past few years. As these technologies get more integrated in our lives, new threats will be discovered. AI generated phishing e-mails have come into play with the aim to trick people into handing over passwords and other personal and sensitive data. As technology continues to evolve, so will the number threats. It also offers an array of potential vulnerabilities, including malicious corruption or manipulation of the training data, implementation.

Check Point’s algorithms can analyze millions of known indicators of compromise and hunt for additional similar ones. As a result, we’re able to produce an additional threat intelligence feed that offers first-time prevention of attacks that we’ve never seen before.

How Check Point is involved in making smartphones more secure?

It is common knowledge that mobile devices are integral to both our personal and professional lives. With cyberattacks against individuals, businesses, and government entities increasing in frequency and sophistication, it is no surprise that mobile devices are considered by threat and one of the weakest links in the IT infrastructure of most enterprises. Check Point enterprise mobile security solutions provide the widest range of products to help secure the smartphone eco system. Check Point’s SandBlast Mobile is the leading Android and iPhone mobile security and mobile threat defense (MTD) solution because it protects business from advanced, fifth-generation cyber-attacks.

TAGS:
Haider is an active writer in technology who loves to dwell deeper into new innovations. He holds a degree in English Journalism from the prestigious Indian Institute of Mass Communication (IIMC). Besides that he likes to travel and explore new places.

Leave a reply

Your email address will not be published. Required fields are marked *