Access "Profile: Gil Shwed, Check Point co-founder, CEO "
This article is part of the May 2003 issue of Buying spree: 2003 product survey results
Gil Shwed won't divulge his age. Or his middle name, even an initial. His girlfriend? Motto in life? Oh, puh-leeze. The cofounder, CEO and chairman of Check Point Software Technologies is one of network security's most successful, influential and enigmatic leaders, a casually dressed billionaire who ranks among Israel's richest men. He runs a publicly traded company that managed a decade of exceptional profit margins despite producing only two core products: FireWall-1 and VPN-1. That software has been installed at more than 300,000 sites globally, including almost every Fortune 500 company--a feat done with a mere 1,200 employees worldwide. And he's done all this without making much of a name for himself. This spring marks the 10-year anniversary of Check Point, the software firm on which Shwed and two partners staked their careers and a $350,000 loan. When it first hit the market, critics shunned Shwed's firewall for being all flash and no substance. Who needs a fancy GUI? What's with all these icons and colors? And this so-called "stateful inspection"--... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Shrinking IT security budgets may affect product rollouts
by Andrew Briney and Frank Prince
IT professionals are planning massive security rollouts over the next three years. But shrinking IT security budgets may throw a wrench in the works.
-
Enterprise Inspector: A must-have for Microsoft vulnerability scanning
by Mike Bobbitt
Shavlik Technologies enhances its freeware to create Enterprise Inspector.
-
Buying IT security products? Learn to recognize vendor hype
by Linda Wise, Contributor
Some vendors will do or say just about anything to get you to buy their products. Whether the products work as advertised is another story.
-
Shrinking IT security budgets may affect product rollouts
by Andrew Briney and Frank Prince
-
-
Using identity management tools to manage user accounts, populations
by Neil Roiter
For four organizations, identity management means getting a grip on their user populations...and that's just the beginning.
-
Profile: Gil Shwed, Check Point co-founder, CEO
by Anne Saita
Check Point's co-founder and CEO needs to pick another winner if he's to maintain the company's strong market presence.
-
Using identity management tools to manage user accounts, populations
by Neil Roiter
-
Columns
-
Shiny-blinky things: Security of IT security products often overlooked
by Andrew Briney
When buying IT security products, enterprises often neglect to consider whether the products themselves are secure.
-
Kevin Mitnick security conference shrouded in secrecy
by Lawrence Walsh
The famed ex-con hacker's "super-secret" security conference shields executives from public view.
-
IT security career advice: Landing an information security job
by Jay Heiser, Contributor
The information security job market is tough. Jay Heiser offers IT security career advice for smart job-hunting.
-
Identifying which type of firewall is right for you
by Fred Avolio, Contributor
Packet filters, proxies, stateful inspection--which type of firewall is right for your enterprise? Here's how to decide.
-
Shiny-blinky things: Security of IT security products often overlooked
by Andrew Briney
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO