The Singapore Government is cutting off Internet connections from work computers used officially by public servants from May 2017, in an effort to plug potential leaks from work emails and shared documents – amidst today’s advanced security threats.
I invited Tony Jarvis from Check Point Software Technologies to share his opinion on how best to secure an organisation’s network and IT assets. This guest blog is written by him.

Tony Jarvis is the Chief Strategist (Asia, Middle East and Africa) for Check Point Software Technologies.
With every detection of a new threat, the security landscape evolves and attackers are no longer just looking at inventive ways to infiltrate a network but also innovative evasion techniques and the damage it will inflict.
“To say the security landscape is constantly changing would be an understatement,” says Tony Jarvis, Chief Strategist (Asia, Middle East and Africa) for Check Point Software Technologies.
What really matters is how vendors respond to the ever-evolving landscape and not just make incremental enhancements to existing solutions that still predominantly focus on detection, rather than prevention.
With the numerous acquisitions and layoffs being announced, the real question that CIOs and CISOs need to ask is: “Is my security vendor in for the long run?”
Central to any effective security strategy is the ability to stop threats before the initial compromise.
The only way to do this is with prevention.
Many vendors simply can’t do it, which is why they talk about detection.
Tapping an expert’s views
I also asked Tony specifically for his take on the Singapore Government’s move to cut Internet access from work computers used by civil servants from May next year.
Here are more of his opinions in a Q&A format.
The majority of solutions being deployed today rely on a detection capability, with some requiring users to choose whether infected files should be quarantined or allowed to pass through.
Not only is this intrusive to the user experience, it’s also prone to human error.
Inflexible deployment models calling for an all or nothing use of cloud or private malware analysis fail to meet many customers’ requirements.
To make matters worse, the sandboxing process often takes too long, giving malware plenty of time to get to work before its presence becomes known.



