Gary Kavafes

Senior Solution Architect

Gary Kavafes, SHIGary Kavafes is a Senior Solution Architect in the Enterprise Solutions Group at SHI, and has more than 32 years of IT experience. In his position, Gary provides security solution design, implementation, consulting, and assessment services to SHI’s enterprise customers.

Gary has a strong technical background and has earned numerous technical certifications, including:

  • Certified Information Systems Security Professional (CISSP)
  • Information Systems Security Architecture Professional (ISSAP)
  • NSA Information Assessment (IAM) and Information Evaluation (IEM)
  • Global Information Assurance Certification (GIAC)
  • Certified Ethical Hacker (CEH)
  • Check Point Certified Security Administrator (CCSA)
  • Check Point Security Expert (CCSE)
  • Check Point Certified Systems Instructor (CCSI)
  • Certified Network Security Engineer (CNSE)
  • Palo Alto Networks Certified Network Engineer (PCNSE)
  •  McAfee Accredited Channel Engineer- Network Security Platform (ACE-NSP)
  • McAfee Accredited Channel Engineer- Data Loss Prevention (ACE-DLP)
  • Sophos UTM/Safeguard Encryption

Before joining SHI, Gary worked for Mellio Consulting, Net Direct Systems, CompuCom, and Memorex Telex.

To contact Gary, please email

3 perimeter security challenges, and how organizations can fix them

perimeter securityIT administrators have plenty of perimeter security tools at their disposal, from firewalls to spam filters to intrusion detection solutions. But despite all the preventative measures, most organizations still have gaps in their security controls or processes, which could lead to cracks in their system. A coordinated attack from an outside threat could penetrate these seemingly thick walls of perimeter security due to poor security management and overlooked system vulnerabilities.

Securing a network’s perimeter, defined as the demarcation point for exchanges among data, assets, employees, and partners, is a struggle for many organizations because of its complexity. IT departments can be easily overwhelmed by operating a complete perimeter security system because individual solutions are often stitched together, and therefore require multiple management controls, protocols, and licenses.

Companies with fewer than 2,000 users experience the most significant challenges, because the laundry list of best practices that includes firewalls, VPNs, web and mail proxies, and intrusion prevention systems (IPSs) is typically expensive and arduous. In response to individual threats, the piecemeal approach of perimeter security is often deployed over many years.

The threats don’t stop, and with infrastructure constantly under attack, the risk of a breach remains high. Here are three common challenges mid-size businesses are facing with regard to perimeter security, and how organizations are solving them. (more…)

You may also be interested in:

Improving IT security: Why you need to consider Next-Generation Firewalls Firewalls can be the star performer in your inventory of security controls. A good firewall not only provides ways to manage user, application, an...
Clearer vision: How to keep an eye on IT security After discussions with hundreds of IT and security professionals, one concern rises above the rest in the modern IT environment: visibility. How often...
One of the biggest security flaws in your network is one of the most unexpected Data breaches seem to make headlines every week. And as of late 2014, 43 percent of 567 U.S. executives surveyed said their companies experienced a da...