Microware Group Ltd.

10/18/2022 | Press release | Archived content

Check Point and Microware Collaborate to Drive Harmony and Transform the New Normal of Hybrid Work

With the continuous changes in the pandemic and related policies, many companies have transitioned from the previously implemented remote or work-from-home arrangements to a hybrid work model, in order to adapt to the new normal in the post-pandemic era. Under the hybrid work model, a large amount of sensitive data is stored in SaaS applications and even hybrid cloud environments, meaning that while employees have greater flexibility, the attack surface for enterprises has significantly increased - extending from the corporate network to employees' home Wi-Fi and personal devices. Misconfigured SaaS settings or vulnerabilities on personal devices often pose a serious threat to the security of the enterprise network.

According to a recent global market research report released by the independent research firm Harris Poll, over 77% of surveyed enterprises have already adopted a hybrid cloud architecture. However, most of the surveyed enterprises also struggle with the complexity of collaborative work in a multi-cloud environment. The report further noted that due to skill gaps, insufficient security capabilities, and compliance constraints, most enterprises may have blind spots that expose their data to risks due to these challenges.

Microware's Senior Consultant, Ma Kwok-fai, stated: "It is relatively simple to follow company policies for traditional deployments, but extending security policies to public locations poses many obstacles. How to provide an enterprise-grade environment for employees on untrusted networks is a pain point for many local companies. Facing the post-pandemic hybrid work model, SMEs may not have sufficient technical expertise and manpower to handle this transition and struggle to keep up with the rapid market changes. This is why Microware and Check Point have partnered to provide new solutions specifically tailored for hybrid environments, to help SMEs quickly deploy their transformations."

▲Microware's Senior Consultant, Ma Kwok-fai, frankly stated that with the widespread adoption of the hybrid work model in the new normal, it has become much easier to drive enterprises to implement Zero Trust.

Zero Trust Ensures Secure Remote Work for Employees

Ma Kwok-fai acknowledged that in the past, when employees were seated in the office, small and medium-sized enterprises rarely considered changing their security deployments, making it quite difficult to promote the best practices of Zero Trust. However, as the second wave of the pandemic became increasingly severe, enterprises began to encounter various problems, such as which applications must be exposed to remote users and how to configure user permissions in a hybrid work model. As a result, it has become increasingly evident that more and more enterprises are adopting Zero Trust.

▲Check Point's Cybersecurity Engineering Director for Hong Kong and Taiwan, Hau Ka-chun, emphasized that a unified security policy is crucial for a hybrid work environment spanning different platforms.

Check Point's Cybersecurity Engineering Director for Hong Kong and Taiwan, Hau Ka-chun, believes that many local enterprises have recognized the importance of Zero Trust, and even have plans to implement it, but face numerous challenges in the actual execution.

"In Hong Kong, everyone has the concept of Zero Trust, but the deployment rate is not as high as expected. After all, whether the enterprise's infrastructure can support Zero Trust, as well as the investment required to move towards a Zero Trust architecture, are big issues. Moreover, the shortage of manpower is also a major problem. Even if small and medium-sized enterprises have relevant plans, they often have to postpone them due to the lack of personnel," Hau Ka-chun continued.

"The pandemic is an opportunity to drive enterprises towards Zero Trust. In the past, the general practice was to divide the internal and external networks into 'Trust' and 'Untrust' zones, but after the pandemic, there is no longer such a clear boundary, as users have already left the trust zone. This has led enterprises to have a greater demand for Zero Trust, so that employees can work remotely securely from anywhere."

However, he also mentioned that after the pandemic, as Security-as-a-Service has become more prevalent, implementing Zero Trust has become easier for enterprises compared to before. Not only is the pressure on resources significantly reduced, but the process is also much faster.

▲HARMONY CONNECT enables enterprise users to securely access the corporate network and all applications remotely.

Harmony's Six Key Solutions Safeguard Enterprise Security

Ma Kwok-fai revealed that Microware had already partnered with Check Point a year ago, with the latter providing product technology, while Microware is responsible for the full sales, deployment, and support services, deploying the Check Point Harmony solution for enterprises as needed.

The solution covers six areas and can effectively provide comprehensive network security for enterprises:

  • Check Point Harmony Email & Collaboration - Fully protects Microsoft 365, G-Suite, and enterprise collaboration tools such as file sharing, enterprise communications, and Microsoft Teams. It adopts the industry's most advanced sandbox technology and activity content analysis to check each file for malicious content, ensuring that enterprise emails are protected from phishing attacks; it isolates files containing security threats before users download them; through context-aware policies, it effectively identifies and restricts the circulation of sensitive information to only specific institutions or departments.
  • Harmony Browse - Through the deployment of Browser plug-in and Check Point's self-developed nano agent proxy software, Threat Prevention technology can block users from accidentally downloading malware, accessing zero-day attack phishing websites, using restricted websites, or reusing company passwords, allowing enterprise employees to safely browse the Internet from anywhere without being exposed to web-related threats.
  • Harmony Endpoint - Using advanced behavioral analysis and machine learning algorithms, it blocks malware before it can cause damage, preventing threats to endpoint devices such as ransomware, phishing, or drive-by malware. At the same time, through automatic detection and response, it minimizes the impact of system infections.
  • HARMONY CONNECT (Internet Access and VPN-as-a-Service solution) - Tailored for the new normal of distributed IT environments and hybrid work models, this SASE solution allows enterprise employees or branch offices to easily connect remotely to enterprise applications using any device. Through a user-centric configuration with different permissions for different users, it provides comprehensive protection from the device layer to the user's internet activities, access to internal company resources, and cloud applications like email and collaboration tools (Microsoft Teams). Its cloud-native unified solution not only allows enterprises to maintain consistent network security across different platforms but can also deploy Zero Trust policies within minutes, providing employees with a seamless user experience.
  • Harmony Mobile - This Mobile Threat Defense solution ensures comprehensive protection for employees' mobile devices against various attack vectors such as applications, networks, and operating systems. In addition to blocking malware, it also prevents infected mobile devices from accessing the company's applications and detects advanced technical and operational system vulnerabilities on mobile devices.

Hau Ka-chun further explained that if an enterprise is unfortunately breached, the End point solution can also provide Runtime Protection to minimize the impact on infected devices. For example, if an employee accidentally enters a password on a phishing site, the entire malicious activity can be intercepted at different stages. It also provides complete transparency for the enterprise to clearly understand what happened during the attack.

Flexible Deployment Options Starting with Email

Traditional enterprises often choose security products from different vendors, such as using one vendor for email and another for endpoint security. While this can achieve the same level of security, it presents challenges in daily management, especially when trying to establish a unified security policy. For example, if an AI is used to define phishing website patterns, it can be difficult to ensure consistency across different platforms. In the event of a security incident, investigating across multiple platforms can also be complex and time-consuming.

"For SMEs, their infrastructure is relatively simple, and they hope to undergo a large-scale transformation. However, due to limited manpower and budgets, they generally tend to take a gradual approach from on-premises to the cloud. We chose to partner with Check Point because they can cater to the entire platform, from user, infrastructure, to endpoint, to implement a Zero Trust approach," revealed Ma Kwok-fai. For local SMEs, the entry point is often Harmony Email, as email is the most commonly used application in any company. Next is VPN, as the increasing demand for work-from-home has driven SMEs to deploy it. Since the cost of deploying these three items is not much different from a full solution, enterprises often choose to gradually expand the deployment after trying it out or as their business needs grow.

According to Check Point's "Cyber Attack Trends: 2022 Mid-Year Report", ransomware has had the biggest impact on enterprises. In recent years, as many companies have implemented backups, they can simply restore from backups when hit by ransomware and refuse to pay the ransom. As a result, new ransomware strains no longer simply lock systems, but also aim to steal sensitive data to extort companies.

To address ransomware, Check Point Harmony not only analyzes and blocks malware upfront but also immediately isolates infected data and restores all Snapshot backups if a user is locked by ransomware. It also provides a comprehensive forensic report to help users understand how the security incident occurred.