<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Securing the “thing” is not the answer ... in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-the-thing-is-not-the-answer/m-p/3517#M14150</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 18px;"&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;According to Statista, by 2020, the number of connected devices in the Internet of Things (IoT) will grow to 31 billion. IoT includes embedded systems in retail, automotive, home automation and entertainment devices, as well as operational technology in the manufacturing and energy sectors. There are already proven hacks of these technologies, and as the population grows, it's hard to imagine how any service pack program or standards body can keep up. As a result, IoT will likely contribute significantly to security vulnerabilities.&lt;/EM&gt;&lt;/SPAN&gt;" &amp;nbsp;- SC magazine article, &lt;A href="https://www.scmagazine.com/endpoint-security-and-the-internet-of-things/article/665345/"&gt;Endpoint Security and Internet of Things&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 18px;"&gt;&lt;SPAN style="color: #000000; font-size: 18px;"&gt;The article states&amp;nbsp;that securing the "things" is not the answer. It further suggests to increase visibility by focusing on observation and patrolling&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 18px;"&gt;, coupled with analysis and tactical action&amp;nbsp;&lt;SPAN style="background-color: #ffffff;"&gt;when problems are spotted&lt;EM&gt;,&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 18px;"&gt;&amp;nbsp;because n&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 18px;"&gt;on-traditional endpoints share a common characteristic - a predictable behavior. Check Point SandBlast Agent&amp;nbsp;is the answer to this challenge. Forensics, an integral part of SandBlast Agent, constantly monitors the system, while anti-ransomware searches for ransomware-specific behaviors. Check Point SandBlast Agent also kept our customers protected by&amp;nbsp;detecting and quarantining the recent wannacry ransomware attack - &lt;A href="http://blog.checkpoint.com/2017/05/16/crying-futile-sandblast-forensic-analysis-wannacry/"&gt;CRYING IS FUTILE&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 18px;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/43544"&gt;Jony Fischbein&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/43123"&gt;Eytan Segal&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/45534"&gt;Yossi Hasson&lt;/A&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 02 Jun 2017 20:48:24 GMT</pubDate>
    <dc:creator>Kaushal_Varshne</dc:creator>
    <dc:date>2017-06-02T20:48:24Z</dc:date>
    <item>
      <title>Securing the “thing” is not the answer ...</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-the-thing-is-not-the-answer/m-p/3517#M14150</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 18px;"&gt;&lt;SPAN style="font-size: 15px;"&gt;&lt;EM&gt;According to Statista, by 2020, the number of connected devices in the Internet of Things (IoT) will grow to 31 billion. IoT includes embedded systems in retail, automotive, home automation and entertainment devices, as well as operational technology in the manufacturing and energy sectors. There are already proven hacks of these technologies, and as the population grows, it's hard to imagine how any service pack program or standards body can keep up. As a result, IoT will likely contribute significantly to security vulnerabilities.&lt;/EM&gt;&lt;/SPAN&gt;" &amp;nbsp;- SC magazine article, &lt;A href="https://www.scmagazine.com/endpoint-security-and-the-internet-of-things/article/665345/"&gt;Endpoint Security and Internet of Things&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 18px;"&gt;&lt;SPAN style="color: #000000; font-size: 18px;"&gt;The article states&amp;nbsp;that securing the "things" is not the answer. It further suggests to increase visibility by focusing on observation and patrolling&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 18px;"&gt;, coupled with analysis and tactical action&amp;nbsp;&lt;SPAN style="background-color: #ffffff;"&gt;when problems are spotted&lt;EM&gt;,&lt;/EM&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-size: 18px;"&gt;&amp;nbsp;because n&lt;/SPAN&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 18px;"&gt;on-traditional endpoints share a common characteristic - a predictable behavior. Check Point SandBlast Agent&amp;nbsp;is the answer to this challenge. Forensics, an integral part of SandBlast Agent, constantly monitors the system, while anti-ransomware searches for ransomware-specific behaviors. Check Point SandBlast Agent also kept our customers protected by&amp;nbsp;detecting and quarantining the recent wannacry ransomware attack - &lt;A href="http://blog.checkpoint.com/2017/05/16/crying-futile-sandblast-forensic-analysis-wannacry/"&gt;CRYING IS FUTILE&lt;/A&gt;.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="background-color: #ffffff; color: #000000; font-size: 18px;"&gt;&lt;A href="https://community.checkpoint.com/migrated-users/43544"&gt;Jony Fischbein&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/43123"&gt;Eytan Segal&lt;/A&gt;‌ &lt;A href="https://community.checkpoint.com/migrated-users/45534"&gt;Yossi Hasson&lt;/A&gt;‌&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Jun 2017 20:48:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Securing-the-thing-is-not-the-answer/m-p/3517#M14150</guid>
      <dc:creator>Kaushal_Varshne</dc:creator>
      <dc:date>2017-06-02T20:48:24Z</dc:date>
    </item>
  </channel>
</rss>

