Gary Kavafes

Senior Solution Architect

Gary Kavafes, SHIGary Kavafes is a Senior Solution Architect in the Enterprise Solutions Group at SHI, and has more than 32 years of IT experience. In his position, Gary provides security solution design, implementation, consulting, and assessment services to SHI’s enterprise customers.

Gary has a strong technical background and has earned numerous technical certifications, including:

  • Certified Information Systems Security Professional (CISSP)
  • Information Systems Security Architecture Professional (ISSAP)
  • NSA Information Assessment (IAM) and Information Evaluation (IEM)
  • Global Information Assurance Certification (GIAC)
  • Certified Ethical Hacker (CEH)
  • Check Point Certified Security Administrator (CCSA)
  • Check Point Security Expert (CCSE)
  • Check Point Certified Systems Instructor (CCSI)
  • Certified Network Security Engineer (CNSE)
  • Palo Alto Networks Certified Network Engineer (PCNSE)
  •  McAfee Accredited Channel Engineer- Network Security Platform (ACE-NSP)
  • McAfee Accredited Channel Engineer- Data Loss Prevention (ACE-DLP)
  • Sophos UTM/Safeguard Encryption

Before joining SHI, Gary worked for Mellio Consulting, Net Direct Systems, CompuCom, and Memorex Telex.

To contact Gary, please email

3 perimeter security challenges, and how organizations can fix them

perimeter securityIT administrators have plenty of perimeter security tools at their disposal, from firewalls to spam filters to intrusion detection solutions. But despite all the preventative measures, most organizations still have gaps in their security controls or processes, which could lead to cracks in their system. A coordinated attack from an outside threat could penetrate these seemingly thick walls of perimeter security due to poor security management and overlooked system vulnerabilities.

Securing a network’s perimeter, defined as the demarcation point for exchanges among data, assets, employees, and partners, is a struggle for many organizations because of its complexity. IT departments can be easily overwhelmed by operating a complete perimeter security system because individual solutions are often stitched together, and therefore require multiple management controls, protocols, and licenses.

Companies with fewer than 2,000 users experience the most significant challenges, because the laundry list of best practices that includes firewalls, VPNs, web and mail proxies, and intrusion prevention systems (IPSs) is typically expensive and arduous. In response to individual threats, the piecemeal approach of perimeter security is often deployed over many years.

The threats don’t stop, and with infrastructure constantly under attack, the risk of a breach remains high. Here are three common challenges mid-size businesses are facing with regard to perimeter security, and how organizations are solving them. (more…)

You may also be interested in:

The biggest security mistake you can make (and how to avoid it) No organization is immune to security risks. Between malware, viruses, network attacks, and data breaches, organizations must keep a watchful eye on t...
One of the biggest security flaws in your network is one of the most unexpected Data breaches seem to make headlines every week. And as of late 2014, 43 percent of 567 U.S. executives surveyed said their companies experienced a da...
Tackling security vulnerabilities in health care Network security is critical for any organization, but in the health care space, with the personal and medical details of millions of individuals in t...