Cybersecurity systems released for small businesses

29th April 2016 By: Schalk Burger - Creamer Media Senior Deputy Editor

Cybersecurity systems released for small businesses

DOROS HADJIZENONOS The 700-series devices provide network security monitoring, app control, URL filtering, VPN security, antivirus, antispam, antibot, and advanced intrusion prevention and detection functionality

Cybersecurity multinational Check Point has released its latest 700-series cybersecurity systems for small businesses, which draw on its international threat intelligence to provide up-to-date cybersecurity, says Check Point South Africa country manager Doros Hadjizenonos.

The cybersecurity devices are easy to install and use. The Web-based security management portal enables users to set general security preferences, as well as more advanced and technical security settings. The devices can process up to 200 Mb/s of traffic with all filters active.

The 700-series machines draw on Check Point’s international threat intelligence centres, which provide small companies with cyber- security that is on a par with large enterprises. The appliances provide network security monitoring, application (app) control, uniform resource locator (URL, or Web address) filtering, virtual private network security, antivirus, antispam and antibot functionality, as well as advanced intrusion prevention and detection.

The appliances are also designed to be managed from Check Point’s cloud – providing an enterprise-class security solution managed by experts, and enabling the small business to focus on its operations.

“The Check Point 700-series of appliances provide threat-prevention security to protect small-business employees, networks and data. The appliances’ performance has been verified in live production environments, and 200 Mb/s is sufficient to protect the majority of small and medium-sized businesses across Africa.”

This new range of cybersecurity devices is necessary, as small businesses are increasingly being targeted through more sophisticated cyberattacks. Smaller businesses are often viewed as vulnerable because they might not have the specialist in-house skills to deal with such attacks, with cybercriminals diversifying their strategies from targeting mainly large firms to smaller firms as well, he says.

If cybercriminals can breach smaller businesses’ networks, they can use these networks to attack other companies with which businesses interact.

“One of the breaches of a smaller company occurred through its online food portal used by employees to order food from the canteen. This Internet system was hacked and used to infiltrate the network and carry out further attacks for a long time before being detected,” explains Hadjizenonos.