Cloud computing inherently dangerous, says Check Point

Check Point explains the dangers of cloud computing and says how technology can help prevent data leaks.

Cloud computing

The chief executive of leading security company Check Point Gil Shwed has warned enterprises from plunging too quickly into cloud computing, telling IT PRO at a briefing that the technology is inherently dangerous.

"The basic fact that you're sharing data with others is a huge security risk. If I have my server with my data at least I know that I can protect my data, but if I mix hundreds of these [servers] there might be one bug, in one application, that will allow a virus to move to the others. A bug, a configuration error, anything."

Advertisement - Article continues below

Shwed did not wish to discourage the move towards the cloud, however.

"I am definitely a supporter of cloud computing, but I don't think it will take over from traditional computing it will have some portion of the market. One of the things the enterprises want is control, and once you outsource ... you lose a big portion of that control, so companies will only do this if there is a very, very, good reason," he said.

"There is a clear and interesting challenge there, the move from controlling things to letting other people control it for you."

Despite all the hype over smartphones, such as the iPhone and the associated security concerns that companies have, Shwed said that it hasn't proved to be a significant business driver for the security industry up to this point.

Advertisement
Advertisement - Article continues below

"Mobile is there, but it hasn't been huge into terms of revenue for anyone yet."

Advertisement - Article continues below

Shwed also addressed the key issue facing corporations over Data Loss Prevention (DLP). He said that while data loss was often down to human factors, technology could play an important role in solving the problem. He also hinted that his company would have a product to address this issue coming later in the year.

"I think that computers can do a lot... I don't think technology can outsmart people, but technology can lead people the right way and we'll show out concept later in the year."

Acquisitions

Shwed also revealed why his company was not that acquisitive compared to other companies its size, although it did purchase Nokia's security appliance portfolio last year.

He said that while there were many interesting security technologies out there, most were not ready for prime time.

"It's about finding the right technology, he said. "We need something relatively simple that every enterprise can use without spending six months investing time and money."

Advertisement - Article continues below

"If you actually look at the technologies in the market... many of them are good ideas and good technologies, but most of them are not ready for that kind of productisation. Most of them are not that scalable."

Scwed admitted that its acquisition of ZoneAlarm fell into that category.

"I can say that on the consumer side it's definitely large scale but on the enterprise side it wasn't ready... and it took us [several] years to turn it into something. Now we can take it to thousands of customers round the world.

Featured Resources

Navigating the new normal: A fast guide to remote working

A smooth transition will support operations for years to come

Download now

Putting a spotlight on cyber security

An examination of the current cyber security landscape

Download now

The economics of infrastructure scalability

Find the most cost-effective and least risky way to scale

Download now

IT operations overload hinders digital transformation

Clearing the path towards a modernised system of agreement

Download now
Advertisement

Recommended

Visit/security/ransomware/356292/university-of-california-gets-fleeced-by-hackers-for-114-million
ransomware

University of California gets fleeced by hackers for $1.14 million

30 Jun 2020
Visit/security/cyber-security/356289/australia-announces-135b-investment-in-cybersecurity
cyber security

Australia announces $1.35 billion investment in cyber security

30 Jun 2020
Visit/cloud/cloud-security/356288/csa-and-issa-form-cybersecurity-partnership
cloud security

CSA and ISSA form cyber security partnership

30 Jun 2020
Visit/business/policy-legislation/356215/senators-propose-a-bill-aimed-at-ending-warrant-proof-encryption
Policy & legislation

Senators propose a bill aimed at ending warrant-proof encryption

24 Jun 2020

Most Popular

Visit/laptops/29190/how-to-find-ram-speed-size-and-type
Laptops

How to find RAM speed, size and type

24 Jun 2020
Visit/policy-legislation/data-protection/356344/eu-institutions-warned-against-purchasing-any-further
data protection

EU institutions told to avoid Microsoft software after licence spat

3 Jul 2020
Visit/mobile/mobile-phones/356335/the-man-has-ruined-my-huawei-p40
Mobile Phones

The Man has ruined my Huawei P40

3 Jul 2020