Check Point’s Global Channel Chief Plans to ‘Mechanize’ Channel

Mechanical Gears

CHECK POINT CPX360 — Check Point Software Technologies‘ new global channel chief is anxious to get started working with partners and improving the company’s channel program.

Frank Rauch, global head of worldwide channel sales, spoke with Channel Partners Wednesday at Check Point’s CPX360 conference in Las Vegas. He joined the company last month and previously was vice president of VMware‘s Americas partner organization.

Thursday will be partner day at the conference.

“I’ve known Check Point over the last three-and-a-half to four years as we developed our security and networking over at VMware, running an $8 billion channel for HP and running a $3 billion channel for VMware,” Rauch said. “I think I can do a couple of different things. I think I can improve the channel program, not that it’s bad at all right now, but I think we can make it better. And I believe that some of the relationships that I have worldwide — we can be able to leverage [those].”

Check Point's Frank Rauch

Check Point’s Frank Rauch

Rauch said he’s been meeting partners that have been with Check Point for 20 years, “and they’ve been doing a great job,” but he wants to “mechanize the channel to be able to evolve our current channel into the cloud, into mobility, and to be able to talk about things like Infinity, which is a much more comprehensive solution.”

“And then eventually … to be able to recruit born-in-the-cloud partners and to be able to recruit mobility partners to be able to serve markets that we’re not serving right now,” he said. “And finally to be able to form great alliances, like I was able to do over at VMware with AWS, with Azure, with some of the mobility partners. It’s just a great opportunity.”

Also Wednesday, Check Point released new research titled, “Under the Hood of Cyber Crime: the Rise of Stealthy and Targeted Cyber Attacks.” It examines the continuous rise of the underground malware-as-a-service industry.

Maya Horowitz, Check Point’s director of threat intelligence and research, said malware attacks now comprise entire organizations as opposed to rogue individuals.

“It no longer means just being the script kiddie who writes his or her own malicious code and uses it against some targets,” she said. “There’s the person who would code the malware, another person who would create the attack vector and a whole different person who would use these tools for the actual attack, and of course other people who would take the money out of the bank account. It means there are more people involved in this industry and more types of people. So not only the very, very technical people, but others as well, and everyone can utilize these tools to create their own tailor-made attacks without being a techie at all.”

And cybercriminals no longer are limiting their communication to the dark web, but using the clear web and messaging apps, Horowitz said.

“There are groups over Telegram where they communicate and share tools, sell tools – and not just the malware – but also, for example, there are ads for people looking for insiders, so ‘I’m looking for an insider based in that bank who can install my malware on a computer from within,'” she said. “For me that’s surprising because you would think they prefer to hide on the dark web, but actually Telegram [offers] anonymity so you can stay anonymous on there as well. It all goes back to how easy it is to be a threat actor today.”

These cybercriminal organizations work like any other company and communicate like regular people, Horowitz said. One group, for example, is specifically for …

Pages:  1 2 Next

Leave a comment

Your email address will not be published. Required fields are marked *

The ID is: 116362