Breach Preparedness , Cybersecurity , Data Breach

Enterprise Cybersecurity: The Fifth Generation

Check Point's Avi Rembaum Charts the Evolution of Information Security
Avi Rembaum, vice president of security solutions, Check Point

All organizations should ensure that they are using the most appropriate tools, technologies, practices and procedures to safeguard their information against today's top threats, says Avi Rembaum of Check Point.

See Also: 12 Ways to Defeat Two-Factor Authentication

In a video interview at Information Security Media Group's recent New York Security Summit, Rembaum discusses the evolution in information security, including where organizations stand, versus where they need to be. He addresses:

  • How enterprise information security evolved;
  • Check Point's assessment that the most mature information security programs are now in their fifth generation;
  • What the future holds.

Rembaum serves as vice president of security solutions for Check Point. In this role, he is responsible for the company's solution center, incident response team, strategic alliance program and security architecture function. Previously, Rembaum was responsible for the company's business relationships with the Tier-1 Telcos in North America. Rembaum first began working in the information and network security industry in 1997, when he joined RADGUARD's marketing team. He also held product management positions at RedCreek and SonicWALL and practice manager roles at RedCreek and Getronics, now CompuCom.


About the Author

Mathew J. Schwartz

Mathew J. Schwartz

Executive Editor, DataBreachToday & Europe

Schwartz is an award-winning journalist with two decades of experience in magazines, newspapers and electronic media. He has covered the information security and privacy sector throughout his career. Before joining Information Security Media Group in 2014, where he now serves as the Executive Editor, DataBreachToday and for European news coverage, Schwartz was the information security beat reporter for InformationWeek and a frequent contributor to DarkReading, amongst other publications. He lives in Scotland.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.