Network Firewalls, Network Access Control , Next-Generation Technologies & Secure Development

Security Quest: Reducing Complexity

Check Point's Darrell Burkey Outlines Security Management Imperatives

As the volume and complexity of online attacks continue to grow and employees rely on an ever-larger number of mobile devices, information security managers face a serious challenge: They must secure environments that only continue to increase in complexity, says Darrell Burkey, director of product management for Check Point Software Technologies.

See Also: Are Security Tools Slowing Your Response?

In this video interview at RSA Conference 2016, Burkey discusses:

  • Trends in the cybersecurity space;
  • The need for enterprises to minimize security and manage complexity while also reducing costs;
  • How Check Point has grown from being a software firewall vendor to tracking many more aspects of enterprise information security.

Before joining Check Point, Burkey was vice president of marketing and product management for intrusion detection system vendor NFR Security, vice president of research and development for CatchFIRE Systems and senior director of research and development for SAGA Software.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe, ISMG

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the executive editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, among other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.