Towards 2019: Nigeria should take cyber security challenges seriously -Andrew Vogues

“During election time, you need to secure infrastructure and the best way to do that is through a Zero-Day protection, because the attackers are not going to use known type of attacks to get that data, they are going to use social media, vulnerabilities to try and get inside. If there is a campaign running, two different parties running, one party is going to try and put words in the other party’s mouth, if it allows them to do that, they will try it or if it is state owned, a different country trying to get someone else in power that can also happen.”

Andrew Vogues

Those were the words of Andrew Vogues, the Threat Prevention Sales Leader, Middle East amd Africa, Checkpoint.

CheckPoint is a multinational provider of combined hardware and software products for IT Secuity and Mr Vogues gave this insight while answering questions in an interview with technology correspondent, Oluwatosin Areo.

Here is the Interview.

Cyber security is the buzz world around the world because of the devastating attacks. I don’t know if you can share with us an over view of what Checkpoint is doing in that space?
This is a very wide question. Cyber security is on the up-rise and it has been for the last few years. What we focus on at Checkpoint is prevention particularly from cyber security perspective. Traditional security was only at the perimeter. If you look at the different generations of cyber security, generation 1 was the Anti-virus, which was in the mid 90s; 100 per cent of customers globally have some sort of antivirus. Next is generation 2, which is the internet coming into the perimeter, that was the firewalls and gateways and also globally, 100 per cent of customers have some sort of protection around that. Generation three deals with applications, which is Intrusion Prevention System IPS type of attacks, and globally we have seen about 7-15 per cent of customers using IPS. So there is still a lack of security with regards to applications and how to protect applications. In generation 4, we are dealing with attacks that are evasive and polymorphic. With our solutions, you can actually take a file put in the sandbox and inspect the elements of the file, and determine if they are malicious or not. Again seven per cent of customers are using sandboxes today. So there is a big gap with regards to how customers actually secure their current environment. If you look at the various endpoints – mobile, network, cloud, and surfaces, we can contain all attacks on these fronts. At Checkpoint, we have got the Infinity Architecture, which means we can offer the same multilayered security architecture plus all of those services which prevent against all those attacks.

The nature of attacks differ from economies to economies, depending on what the attackers are looking for. Can you share how you synergize solutions to ensure that whatever issue arises here can be resolved as well as in any other economy the issue may arise 
Infinity Architecture means that you get the multilayered security approach, if it is an email, an official link, these are different victims and it differs from region to region. But the solutions we provide from the infinity perspective allows for all of those protection across the board-different surfaces, different victims so we protect against all of that. For email region for instance, you get phishing campaigns and you just want to protect against that, that is a point solution and we do not believe in point solutions. Security is a holistic approach; we have to look at the holistic view of security – what is happening at the endpoint, the network, mobile and cloud. If something happens on the network and it is something related to what is happening on mobile you will want to know that these two attacks are related because that is a campaign attack. If you do not have intelligence between your technologies, it will also lack in security posture. This is what Infinity Architecture also provides.

Can you tell us more about fake apps because it comes through Whatsapp in the emerging economy and if we do not do something about it can ravage the whole economy because almost everyone, even the government are on whatsapp?  Read More


Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top