Welcome on GURU advisor

Professional reviews for the IT market

GURU advisor is the reference point for IT managers, System Integrators, Managed Service Providers and all the sys admins or companies that offer consuelling services in the Information Technology field and seek information on technologies, selling modalities and hardware.

Image not available

A tool for all IT professionals

Image not available

To stay informed and understand the evolution of the cloud and the IT world

Benchmark and analysis

To help you in the choice

From server to cloud services

Reviews and evaluations

How to

We'll explain how to do it

At your disposal

Contact us for advertising or to request info

Image not available
Image not available
Image not available
Image not available
Image not available

Interview with Michael Shaulov – Head of Mobility Product Management at Check Point Software

During last Mobile World Congress we had a brief chat with Michael Shaulov, responsible for the Mobile section at Check Point and founder at Lacoon, the company -now owned by Check Point- that developed the attack prevention technologies now integrated in the Mobile Threat Protection packet.

Good day Michael, we are here at the MWC and everybody talks about mobile, but a recurring theme in our interviews is security. Which is the natural habit of Check Point…

Sure, Check Point with its products covers all possible needs in terms of security, from endpoint protection to messaging, up to mobile, naturally. Our products offer an integrated experience for whichever device you work with and in particular mobile device protection -which is more and more difficult and actual, also given the context we are talking about- is one of our points of strength.

How was the integration of the product developed by Lacoon, where you come from, and the world of Check Point?

Very well, actually. Today the package called Mobile Threat Protection is perfectly integrated with the Check Point offer and in particular with the products of the Check Point Capsule family, which offer an integrated and completely separated user experience also in a BYOD context.

cover

How does your Mobile Threat Prevention protect the user?


First of all, it analyzes in an advanced manner each app to identify known and unknown threats. Then it monitors network activity to identify suspect behaviours and reduces the attack surface by identifying weak points and unpatched bugs of the Operating System. It’s available both for iOS and Android and leverages cloud services to identify, for instance, 0-day attacks, in addition to menaces coming from WiFi networks.

According to your point of view, do attacks to companies come from the mobile world?

According to our statistics, in the last trimester of 2015 60% of security problems have been orchestrated outside of the company perimeter. And in this sense mobile devices are naturally the main cause of the problem.

Is your solution suitable only for enterprise environments or can it be adopted by SMBs, too?

Our Mobile Threat Prevention app starts with a minimum of 30 users, so it can be implemented in small companies too. It can be licensed per user or per device, and it’s sold as a SaaS, therefore with a monthly fee. The same holds for the products of the Capsule family, like the vastly appreciated Workspace.

About the Author

Filippo Moriggia

After more than 10 years of experience in the technical journalism with PC Professionale (the italian version of PC Magazine) and other newspapers of Mondadori group, Filippo Moriggia founded GURU advisor, the reference website for IT professionals, system integrators, cloud providers and MSPs. He has a Master of Science in Telecommunications Engineering and works as a independent consultant and contractor for different firms. His main focuses are software, virtualization, servers, cloud, networking and security. He's certified VMware VCA for Data Center Virtualization.

banner eng

fb icon evo twitter icon evo

Word of the Day

The term Edge Computing refers, when used in the cloud-based infrastructure sphere, the set of devices and technologies that allows...

>

The acronym SoC (System on Chip) describes particular integrated circuit that contain a whole system inside a single physical chip:...

>

The acronym PtP (Point-to-Point) indicates point-to-point radio links realized with wireless technologies. Differently, PtMP links connects a single source to...

>

Hold Down Timer is a technique used by network routers. When a node receives notification that another router is offline...

>

In the field of Information Technology, the term piggybacking refers to situations where an unauthorized third party gains access to...

>
Read also the others...

Download of the Day

Netcat

Netcat is a command line tool that can be used in both Linux and Windows environments, capable of...

>

Fiddler

Fiddler is a proxy server that can run locally to allow application debugging and control of data in...

>

Adapter Watch

Adapter Watch is a tool that shows a complete and detailed report about network cards. Download it here.

>

DNS DataView

DNS DataView is a graphical-interface software to perform DNS lookup queries from your PC using system-defined DNS, or...

>

SolarWinds Traceroute NG

SolarWinds Traceroute NG is a command line tool to perform advanced traceroute in Windows environment, compared to the...

>
All Download...

Issues Archive

  •  GURU advisor: issue 21 - May 2019

    GURU advisor: issue 21 - May 2019

  • GURU advisor: issue 20 - December 2018

    GURU advisor: issue 20 - December 2018

  • GURU advisor: issue 19 - July 2018

    GURU advisor: issue 19 - July 2018

  • GURU advisor: issue 18 - April 2018

    GURU advisor: issue 18 - April 2018

  • GURU advisor: issue 17 - January 2018

    GURU advisor: issue 17 - January 2018

  • GURU advisor: issue 16 - october 2017

    GURU advisor: issue 16 - october 2017

  • GURU advisor: issue 15 - July 2017

    GURU advisor: issue 15 - July 2017

  • GURU advisor: issue 14 - May 2017

    GURU advisor: issue 14 - May 2017

  • 1
  • 2
  • 3
  • BYOD: your devices for your firm

    The quick evolution of informatics and technologies, together with the crisis that mined financial mines, has brought to a tendency inversion: users that prefer to work with their own devices as they’re often more advanced and modern than those the companies would provide. Read More
  • A switch for datacenters: Quanta LB4M

    You don’t always have to invest thousands of euros to build an enterprise-level networking: here’s our test of the Quanta LB4M switch Read More
  • Mobile World Congress in Barcelona

    GURU advisor will be at the Mobile World Congress in Barcelona from February 22nd to 25th 2016!

    MWC is one of the biggest conventions about the worldwide mobile market, we'll be present for the whole event and we'll keep you posted with news and previews from the congress.

    Read More
  • 1