Cyber Security Industry Alliance Newsletter • Volume 1, Number 11 • July/August 2005

CSIA Member Spotlight


About Check Point


Name: Check Point Software Technologies Ltd.

Chairman/CEO/President: Gil Shwed

Vice Chairman and CSIA Board Member: Jerry Ungerman

Founded: 1993

Headquarters: Redwood City, CA

Worldwide Offices: International Headquarters in Ramat Gan, Israel with offices worldwide

Number of Employees: 1,400

Total Revenue: $515.4 million (FY 2004)

About Check Point: Check Point Software Technologies Ltd. (www.checkpoint.com) is the worldwide leader in securing the Internet. It is the market leader in the worldwide enterprise firewall, personal firewall and VPN markets. Through its NGX platform, the company delivers a unified security architecture for a broad range of perimeter, internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company’s ZoneAlarm product line is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry’s framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,200 Check Point partners in 88 countries.

Areas of Specialization: Check Point provides Intelligent Security Solutions in the areas of Perimeter, Internal and Web Security. Check Point customers have told us that as their network security needs have changed; they now worry about new types of threats such as worms and denial-of-service attacks, penetrating their networks or spreading from a trusted source inside their networks. They worry about how they can securely provide access to employees and external constituents (suppliers, partners, customers) cost effectively, but with a high level of certainty that the constituents will access only what they are entitled to access.

To help our customers overcome these technology challenges and achieve their business objectives, Check Point will increasingly focus on Internal and Web security while also continuing to deliver Perimeter security solutions.

 

Mid-sized Business Security: Protecting Your VoIP Investment

As Voice over IP (VoIP) solutions drop in price and complexity, many mid-sized businesses are reaping the rewards and cost savings of a VoIP solution. However, with the benefits of a VoIP network come an array of security considerations that are inherent with bringing voice communications into the IP based domain.

Mid-sized business typically range anywhere between 100-500 employees. Unlike an Enterprise organization, mid-sized businesses usually lack the security resources and security infrastructure to properly protect their VoIP solution. Despite this, mid-sized businesses can provide a good level of security to their VoIP network by following some basic VoIP deployment rules and security guidelines. These techniques better prepare mid-sized businesses for the myriad of threats that come with their VoIP deployment.

The Threats are Real
The same characteristics that make VoIP a great value for companies expose them to security risks. By its very nature as an IP based communications infrastructure, it requires the same degree of network security as other IP based services.

Currently hackers are exploiting VoIP deployments in a variety of ways, some of which include the following:

  • Denial of Service (DoS)
    This attack is targeted at dramatically slowing network performance and can potentially shut down both voice AND data communications. In addition, DoS attacks can create buffer overflows that compromise systems and network security in general.

  • Voice Services Theft
    Hackers use a variety of techniques to obtain free unauthorized telephone calls that many times end up getting billed as company VoIP usage. These attacks can potentially go unnoticed but directly impact an organization's bottom line.

  • Voice System Hijacking
    Malicious users remotely manage devices, change settings, and even eavesdrop on phone conversations. Besides the havoc this attack wreaks on the actual VoIP system and voice communications, it presents a significant security risk for companies in terms of confidential data loss.

  • Securing your VoIP Deployment
    There are a number of ways a mid-sized business can better secure their VoIP network that greatly protects their investment and infrastructure from the threats listed above. A couple of basic security strategies and solutions include:

    • VoIP Placement
      Companies should consider placing a portion or the entirety of their VoIP infrastructure outside their internal network. This "divide and conquer" approach increases protection for the internal network in the event that a VoIP system is compromised.

    • Utilize a Gateway Security Solution that Understands VoIP Traffic
      A good gateway-based security solution should be able to secure all VoIP communications and applications while allowing maximum VoIP network performance. In general, the solution should be able to understand VoIP signaling and data protocols, as well as when unknown or improper data or commands are being sent across the network.

    • Utilize a VPN Security Solution for an Added Layer of VoIP Security
      A quality VPN solution provides an additional layer of authentication and encryption capabilities to your VoIP deployment. A good VPN security solution should include VPN functionality including Quality of Service (QoS) capabilities to address things like packet latency, VPN transversal, and authentication.

A Successful VoIP Deployment Begins with Security
By including security planning as part of a VoIP deployment, mid-sized businesses can greatly decrease the risk factors that can come with the benefits of a VoIP solution. Basic deployment decisions combined with a sound gateway security solution can ensure that the benefits and cost savings from their newly deployed VoIP solution are fully realized.