Check Point® Software Technologies Ltd., a provider of cybersecurity solutions globally, has introduced its Internet of Things (IoT) Protect solution to secure both IoT devices and networks in smart building, smart city, healthcare, industrial and critical infrastructure environments against all types of advanced Gen VI cyber-threats. The solution delivers threat prevention and security management capabilities to block even unknown cyber-attacks at both IoT network and IoT device level, using threat intelligence and innovative IoT-specific security services. The majority of organisations across the commercial, industrial, healthcare and utility sectors have deployed IoT and operational technology (OT) solutions, but this has significantly increased their cyber-risk. Many IoT devices have vulnerabilities and cannot be patched, or use insecure communications protocols. In addition, organisations have diverse estates of devices from multiple vendors, with many shadow devices that are unmanaged and connected to networks without authorisation, so organisations have limited visibility and control of devices and their associated risks. A recent Check Point survey highlighted these issues: 90% of respondents reported their organisations have shadow IoT devices on their networks, with 44% stating that at least half of their IoT devices were connected without the IT or security teams’ knowledge. Just 11% of respondents stated they had fully implemented an IoT security solution, and 52% have no IoT security deployed at all. Growing attacks against IoT devices and networks As a result, 67% of enterprises and 82% of healthcare firms have experienced IoT-related incidents. These growing attacks against IoT devices and networks, combined with the rapid move to remote working enforced by the COVID-19 pandemic, demand the most advanced, comprehensive security fabric that can identify vulnerable IoT devices, apply protection, and stop evasive cyber-threats. IoT devices can be ‘virtually patched’ to fix security flaws, even those with unpatchable firmware “The number of IoT devices connected to the Internet continues to accelerate and will be 41.6 billion by 2025. Cyber criminals are targeting IoT devices across all industries including medical, industrial, smart building, smart office, so enterprises are making security a high priority. Given the huge volume and variety of IoT devices, organisations need an easy way to deploy security,” said Robyn Westervelt, IDC’s Research Director, Security & Trust. “Check Point’s comprehensive IoT Protect Security solution uses automation and threat intelligence to provide device risk assessment, network segmentation, and threat prevention from the most sophisticated cyber-attacks.” Check Point’s IoT Protect gives network-level security and policy management together with Check Point security gateways, and IoT Protect Nano-Agents, which enable on-device runtime protection. IoT Protect integrates with the industry’s IoT asset discovery platforms across the healthcare, industrial, smart office and smart building sectors to secure hundreds of thousands of IoT devices. IoT protect solution Complete IoT device visibility and risk analysis: it identifies and classifies IoT devices on any network through integrations with the discovery engines, to expose risks such as weak passwords, outdated firmware and known vulnerabilities. Vulnerability mitigation and zero-day threat prevention even on unpatchable devices: IoT devices can be ‘virtually patched’ to fix security flaws, even those with unpatchable firmware or legacy operating systems. IoT Protect features 60 IoT-specific security services to identify and stop unauthorised access and traffic to and from devices and servers, and to prevent IoT-targeted malware attacks. The unique IoT Defence Nano-Agent can also be embedded on devices to give built-in zero-day prevention. Intuitive Zero Trust network segmentation and management: the solution applies and enforces granular security rules across the entire IoT network fabric based on device attributes, risks and protocols, and supports holistic security policy management in a single pane of glass for both IT and IoT networks. “We wanted to ensure that we had complete visibility and control over security across our IT network, and all of the devices on our operational technology (OT) networks in our manufacturing facilities,” said Kalpesh Shah, Digital Risk Offer and CISO, CIPLA Limited, a multinational pharmaceutical and Biotechnology Company. “With Check Point’s IoT Protect solution, we were able to discover all devices on the OT network identify vulnerabilities in them and apply virtual patches to eliminate security threats to these systems. We were also able to block all unnecessary communications to devices, which has enhanced OT performance.” IoT devices vulnerable IoT Protect is unique in giving organisation a complete, end-to-end security fabric" “From IP cameras to smart elevators, medical devices and industrial controllers, many IoT devices are inherently vulnerable and easy to hack. But securing these growing networks of devices is extremely challenging because of their diversity - which means organisations themselves are extremely vulnerable to attacks,” said Itai Greenberg, VP, Product Management of Check Point. “IoT Protect is unique in giving organisation a complete, end-to-end security fabric that protects at both the network and device level, and is easy to set-up and manage. This enables even legacy, unpatchable devices to be protected against various types of attack or exploitation, preventing disruption and damage to critical processes.” IoT Protect offers the industry’s IoT discovery ecosystem to secure hundreds of thousands of IoT devices. Check Point maintains an open framework of technology partners specialising in the discovery and classification of IoT devices in a variety of verticals. With some of which agreements were signed that allow Check Point’s customers to get an end-to-end solution. These partners include as of today Armis, MediGate, Claroty and Ordr. IoT Protect supports over 1,600 IoT and operational technology (OT) protocols, applications and commands out of the box, and enables compliance best practices for regulations including HIPAA, NERC CIP, GDPR and many others. Its threat prevention capabilities are powered by Check Point ThreatCloud, a powerful threat intelligence database. IoT Protect is available immediately.
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organisations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organisations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organisations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organisations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organisations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organisations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organisations embrace cloud-based protections.”
Check Point announces the availability of its complete Quantum Security Gateways series, which deliver unprecedented protection, scalability, and ease of deployment and control for enterprises, from their branch offices to corporate data centers. The coronavirus (COVID-19) pandemic has forced enterprises to quickly expand support for remote connectivity and home working at an unprecedented scale. Recent research by Check Point showed that 71% of enterprise IT and security professionals globally reported an increase in security threats and attacks since the pandemic started, as criminals seek to exploit the remote working explosion, and 95% of respondents said they are facing added IT security challenges related to these changes. Advanced security protections Organisations are focused on three key network and security requirements: Preventing even advanced, zero-day cyber-attacks before they impact the organisation The ability to secure any type of network expansion or changes on demand Unified solutions that speed up operations and automate protection Check Point’s range of new Quantum Security Gateways deliver a combination of advanced security protections, with over 2x the performance and half the energy consumption of rival high-end appliances. All of the Quantum Security Gateway models are now bundled with Check Point’s award-winning SandBlast Zero Day Protection with more than 60 security services focused on threat prevention, out of the box. SSL-encrypted traffic inspection This includes a 100% block score for malware prevention for email and web, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test. They also feature lightning-fast SSL-encrypted traffic inspection for maximum security. Key highlights of the Quantum Security Gateway range include: Hyperscale-ready with up to 1.5 Tera-bps of Threat Prevention Performance Latest CPU models Modularity and easy customisation through multiple expansion slots 100% Enterprise Solid State Drives (SSD), second power supply unit, and lights-out management for optimum reliability and availability. Reducing complexity and improve efficiency Enterprises today require cybersecurity solutions that provide strong threat prevention" “Enterprises today require cybersecurity solutions that provide strong threat prevention to stop sophisticated multi-vector attacks, on-demand scalability to keep pace with changing network traffic requirements including an increase in remote workers, and centralised management to reduce complexity and improve efficiency,” said John Grady Analyst at Enterprise Strategy Group (ESG). “Check Point’s new Quantum Security Gateways ™ address these IT challenges through high performance SandBlast Network threat prevention, security capacity expansion on-demand, and a unified security management platform that can reduce operational costs. These innovations enable enterprises to stay ahead of the attack landscape while meeting the changing needs of the business.” Critical network security challenges “Addressing our customers’ critical network security challenges is what we do at Check Point every day, and today, enterprises need industry-leading threat prevention capabilities at all points of their infrastructure, and the ability to quickly adapt and scale their security almost infinitely,” said Itai Greenberg, VP Product Management and Product Marketing at Check Point. “With the new Quantum Security Gateway series we are uniquely delivering to market uncompromised security and performance with the most advanced threat prevention. This enables enterprises of all sizes to achieve the highest calibre of protection and resiliency while cutting their operational costs by up to 80%.” Quantum Security Gateway range The Quantum Security Gateway range: supporting enterprises of all sizes Quantum 3600 and 3800 Gateways secure branch offices with up to 1.5 Gbps performance against zero-day attacks, in a desktop form factor with power supply redundancy and enterprise grade SSDs. Quantum 6200 and 6400 Gateways secure small enterprises with up to 2.5 Gbps performance against zero-day attacks. Quantum 6600 and 6700 Gateways secure mid-sized enterprises with up to 7.6 Gbps performance against zero-day attacks. These models offer modular customisable connectivity options with up to 40 GbE fiber interfaces. Quantum 7000 and 16200 Gateways secure large enterprises with up to 15 Gbps performance against zero-day attacks. These models deliver modular customisable connectivity options with up to 100 GbE fiber interfaces. Quantum 26000 and 28000 Gateways secure data centres against zero-day attacks, with up to 30 Gbps of threat prevention These models deliver the industry’s highest port density with up to 16 100 GbE fibre interfaces. Quantum 16600 Quantum Hyperscale Gateway is purpose built for Maestro, in a condensed 1RU form factor enabling customers to create cloud-grade security systems with up to 850 Gbps performance against zero-day attacks.
Check Point has announced that its R80 unified security software is now available as a cloud service. This gives customers the quickest route to deploying Check Point’s unified security management solution across their entire network fabric from their web browser, with no deployment time needed, and no need for ongoing maintenance or manual updates. R80 Security MaaS solution The new R80 Security Management-as-a-Service (MaaS) solution extends Check Point’s Fast Track Network Security suite of solutions to deliver unprecedented protection, scalability, and ease of deployment and control for enterprises. R80 Security MaaS gives visibility of security across organisations’ entire infrastructures R80 Security MaaS gives holistic visibility of security across organisations’ entire infrastructures in a customisable visual dashboard, enabling the most complex environments to be managed more efficiently, cutting operational time by up to 60% compared with other solutions. Unified security software for cloud R80 is the industry’s most advanced unified security software for on-premise and cloud environments, with over 160 technology integrations. The latest version, R80.40 has over 100 new features to extend protection, streamline operational processes and enhance productivity. R80 Security MaaS delivers: Management of all Check Point products from the cloud, directly from a web browser Fully-automated updates to ensure the latest protections are always applied On-demand expansion to seamlessly onboard more gateways with no physical limits Zero maintenance makes your environments more secure, manageable and compliant The ability to store and access logs indefinitely “R80 Management-as-a-Service further accelerates and simplifies enterprise security management processes, by eliminating manual maintenance and updates and supporting on-demand scalability,” said Itai Greenberg, VP Product Management at Check Point, further adding “Together with the Fast Track Network Security suite of advanced gateways, it gives customers the quickest route to hyperscale, high-performance network security while improving the efficiency of their operations.” Fast Track Network Security Fast Track Network Security comprises five new Quantum Security Gateways which feature Check Point’s ThreatCloud and award-winning SandBlast Zero-Day Protection. The new range starts with the 3600 model for branch offices and extends to the large enterprise with the 16000 Turbo Hyperscale gateway, which delivers 17.6 Gbps of Gen V Threat Prevention throughput – over 2x faster than rival high-end gateways, while using less than half the energy. Fast Track Network Security’s combination of new Security Gateways, the enhanced R80.40 software and its availability as a cloud service offering enables organisations to deploy the most advanced, fully scalable and easy-to-manage protections against evolving fifth-generation threats.
Check Point announces the release of the new 1500 series security gateways for SMBs. The two new SMB appliances set new standards of protection against the most advanced fifth-generation cyberattacks, and offer unrivalled ease of deployment and management. According to the 2019 Verizon Data Breach Investigations Report, 43% of all breach victims were small businesses, and 63% of attack attempts against SMBs were successful. The cost of disruption from cyber-attacks against SMBs can exceed $1M, according to a Ponemon Institute report, which can have a devastating effect on an organisation. Multi-layered next-generation protection The 1550 and 1590 gateways are powered by Check Point’s R80 release. R80 is the industry’s most advanced security management software, and includes multi-layered next-generation protection from both known threats and zero-day attacks using the award-winning SandBlast™ Zero-Day Protection, plus antivirus, anti-bot, IPS, app control, URL filtering and identity awareness. The new 1500 series empowers Small and Midsize businesses with Enterprise Grade Security: 100% block score for malware prevention for email and web, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test Up to 2 times more performance from previous generations. The 1550 Gateway offers 450Mbps of threat prevention performance, and the 1590 Gateway offers 660Mbps The 1550 provides maximum firewall throughput of 2Gbps and the 1590 provides maximum firewall throughput of 4Gbps The 1550 features six 1GbE ports and the 1590 features ten 1GbE ports both have Wi-Fi and integrated cellular modem architected for LTE and 5G Check Point WatchTower mobile application, enables IT staff to monitor their networks and quickly mitigate security threats on the go from their mobile device Out-of-the-box zero-touch provisioning allows for under 1-minute setup IoT devices discovery and recognition for accurate security policy definition. Truly enterprise-grade security "Small businesses play a critical role in economic growth and innovation across the globe, but often lack the resources to fully protect themselves against today’s advanced cyber-threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Now, small and midsize businesses can enjoy truly enterprise-grade security with industry-leading threat prevention capabilities, coupled with easy and intuitive management.”
Check Point received the highest possible scores in the malware prevention, exploit prevention, secure configuration management, data security, mobile and zero-trust framework alignment criteria Cyber security solutions Check Point Software Technologies, global provider of cyber security solutions, announced that it has been recognised as a ‘Leader’ in Forrester’s newly-published report, ‘The Forrester Wave: Endpoint Security Suites, Q3 2019’. For this report, Forrester’s assessment evaluated 15 endpoint security providers and their products, including Check Point’s SandBlast Agent Advanced Endpoint Protection. Forrester’s assessment evaluated 15 endpoint security providers and their products Vendors were evaluated over 25 weighted criteria, and Check Point received the highest possible scores in the malware prevention, exploit prevention, secure configuration management, data security, mobile and zero-trust framework alignment criteria. Cyber security firm The Forrester Wave is a trusted resource for technology buyers to learn about more ways they can protect their business against attacks, and find the providers that best meet their needs. A select group of vendors in the market are evaluated based on the strengths and weaknesses of their current offering, strategy, and market presence. With capabilities to reduce the attack surface of the endpoint and provide a series of behavioral protection measures to detect and remediate threat activities, SandBlast Agent Advanced Endpoint Protection was developed with network integration in mind. Core endpoint security Check Point’s portfolio consists of a number of core endpoint security capabilities, including over 11 innovative engines and a ground breaking industry leading anti-ransom ware technology, as well as next generation firewall capabilities. States the report, “Check Point’s focus on integrating the endpoint security capabilities with its network security portfolio has led to one of the tightest integrations between the two layers in this study, helping customers to enforce a Zero Trust approach on their endpoint devices.” SandBlast Agent Advanced Endpoint Protection At Check Point, we help organisations go beyond just detection to adopt a prevention approach towards attacks" “We believe being recognised as a Leader in the prestigious Forrester Wave is a validation of Check Point’s commitment to helping organisations remain one step ahead in the fight against increasingly sophisticated cyber threats,” said Itai Greenberg, Vice President, Product Management and Product Marketing, Check Point Software Technologies. “At Check Point, we help organisations go beyond just detection to adopt a prevention approach towards attacks while leveraging our strong portfolio of security technologies that have been developed to meet a variety of customer needs.” SandBlast Agent Advanced Endpoint Protection is an integral component of Check Point’s fully consolidated cyber security architecture, infinity, which protects the network, endpoints, cloud, and mobile. It leverages real-time threat intelligence from Check Point’s central ThreatCloud knowledge database to continually monitor for threats across all platforms through a single pane of glass.
Check Point® Software Technologies Ltd., a provider of cyber security solutions globally, has announced the launch of Check Point CloudGuard Connect to transform enterprise branch office connectivity with cloud-delivered security services. Check Point CloudGuard Connect delivers top-rated Threat Prevention updated in real-time with the latest ThreatCloud intelligence, flexibility to deploy branch office security in minutes from the cloud or on-premise, seamless integration with leading SD-WAN providers like VMware and Silver Peak, and a unified threat and access management platform that can reduce operational expense by up to 40%. As enterprises increasingly move their on-premise branch office workloads and applications to SaaS applications, they are adopting Software-Defined Wide Area Networking (SD-WAN) to intelligently route traffic to cloud services. However, connecting branch offices directly to the cloud significantly increase their security risk and security management costs. Branches are no longer protected by centralised data centre security, which exposes them and the enterprise WAN to sophisticated multi-vector Gen V attacks. Protection from Gen V security threats For flexibility, CloudGuard Connect is integrated with SD-WAN providers like VMware and Silver Peak "The movement to SD-WAN requires integrated security to protect enterprises from from Gen V security threats. Enterprises expect top-rated security even at the branch office," said Itai Greenberg, Vice President of Product Marketing and Management at Check Point. "With CloudGuard Connect enterprises can now deploy Check Point's top-rated threat prevention and intelligence to protect their branch offices against the latest Zero Day and Gen V security threats. "Securing SD-WAN connections to the cloud is essential given today's advanced cyber threats," says Sanjay Uppal, VMware Vice President and GM of VeloCloud™. "We're excited to partner with Check Point to help drive the transformation in connecting branches to the cloud." "Through the Silver Peak and Check Point partnership, enterprise IT organisations can confidently embrace a cloud-centric security model, centrally configuring and enforcing uniform security policies across the WAN with just a few mouse clicks," said Chris Helfer, senior vice president of strategic alliances at Silver Peak. "The Silver Peak® Unity EdgeConnect™ SD-WAN edge platform managed by the Silver Peak Unity Orchestrator™, automatically services chain applications to Check Point CloudGuard Connect and CloudGuard ConnectEdge." Cloud guard Check Point provides organisations of all sizes with integrated, advanced threat prevention, reducing complexity and lowering the total cost of ownership. With CloudGuard Connect, Check Point protects branch office connections to the cloud from sophisticated threats with dynamic scalability, intelligent provisioning and consistent control. Unlike other solutions that only detect, Check Point prevents threats with: Top-rated Threat Prevention with 100% Catch Rate Innovative solutions that combine cloud-hosted patented CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous zero-day and sophisticated Gen V attacks Check Point CloudGuard Connect threat prevention stays up to date on the latest Zero-Day and Gen V cyber-attacks through ThreatCloud. ThreatCloud is a cloud-driven knowledge base that delivers real-time dynamic security intelligence. ThreatClould gathers threat intelligence from 86 billion security decisions, 4 million file emulations, and 7000 Zero-Day attacks every day. SD-WAN vendors in Cloud Check Point CloudGuard Connect secures SD-WAN connections to the cloud. Check Point CloudGuard Connect seamlessly implements branch security across thousands of branches where space is limited and there are no local IT resources. For enterprises that require on-premise security for data privacy or data-location requirements, CloudGuard ConnectEdge can be deployed using a virtual security gateway running on existing branch office IT equipment including dedicated SD-WAN or universal Customer Premise Equipment (uCPE) devices. To provide enterprises with the ultimate flexibility, Check Point CloudGuard Connect is seamlessly integrated with leading SD-WAN providers including VMware and Silver Peak. Reducing OpEx costs up to 40% Both Check Point CloudGuard Connect and CloudGuard ConnectEdge are integrated into Check Point's R80 threat prevention and management platform and Infinity Architecture. This enables enterprises to have a unified view of their threat landscape and security policy from one single console, no matter which form of the CloudGuard service they choose to utilise. They get real-time updates on security threats through the cyberattack dashboard. The unified security platform is integrated with Check Point's Infinity architecture increasing security productivity enabling enterprises to reduce operating costs up to 40%.
Check Point announces the general availability of CloudGuard SaaS, an industry-first cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including Office 365, GSuite and OneDrive), and prevents targeted attacks intended to steal sensitive data. Addressing advanced SaaS threats, CloudGuard SaaS provides 360-degree protection against malware and zero-days, phishing attacks, as well as employee account takeovers. Additionally, it can discover unsanctioned use of SaaS applications and prevent data leakage, while providing instant threat visibility. Data leakage protection CIOs should work with security and risk managers to create and follow a comprehensive and continuous approach for the controlled use of SaaS" “In today’s fifth-generation cyber-attack landscape, it’s crucial to implement technology equipped to take on more threats on business cloud applications,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Businesses generally turn to solutions in the Cloud Access Security Broker domain, which offer visibility and data leakage protection. CloudGuard SaaS goes beyond CASB capabilities. It’s designed to prevent the most common attacks on SaaS applications, providing peace of mind to enterprises.” According to Gartner Jay Heiser, Research VP, Analyst at Gartner: “CIOs should work with security and risk managers to create and follow a comprehensive and continuous approach for the controlled use of SaaS, or they will fail to meet business goals, resulting in unnecessary losses or incidents.” Breach prevention solution CloudGuard SaaS is an essential solution that equips businesses with the necessary preventive security for a multitude of enterprise SaaS applications within minutes. “Businesses today face potential cyberattacks occurring from multiple vectors, including SaaS-based applications. Products like Check Point CloudGuard SaaS can help enterprises looking to protect themselves from attacks of different levels – from phishing to zero-day compromises,” said Jon Oltsik, senior principal analyst at the analyst firm ESG. Superior threat prevention against malware and zero-days: CloudGuard SaaS is the most effective breach prevention solution for malware and zero-day attacks on SaaS applications, leveraging Check Point’s SandBlast technology. SandBlast scored a 100% block rate and highest evasion testing with NSS Labs, a globally recognised trusted source for independent, fact-based cybersecurity testing. Sophisticated phishing attacks CloudGuard SaaS blocks SaaS account takeovers by preventing unauthorised users from logging in, even if the device is already compromised By leveraging these capabilities, CloudGuard SaaS protects email attachments and file downloads on file hosting services and collaboration tools. CloudGuard SaaS blocks zero-day threats before they reach users and delivers safe content in seconds, using advanced threat emulation and extraction technology. Innovative technology stops account takeovers: CloudGuard SaaS blocks SaaS account takeovers by preventing unauthorised users from logging in, even if the device is already compromised. Using its new ID-Guard technology, CloudGuard SaaS identifies fraudulent access by finding bad logins and centralising multi-factor authentication. In addition, CloudGuard SaaS can authenticate users in any SaaS application on any device—mobile or PC. Total phishing protection: CloudGuard SaaS prevents more phishing attacks than standard email services by leveraging artificial intelligence engines. It can stop sophisticated phishing attacks, spear-phishing, and email spoofing that may bypass other solutions. Malicious email content can also be blocked with high-precision certainty.
Check Point announces a technology integration with Amazon Web Services (AWS) Security Hub, a unified security service, which centralises view and management for security alerts. This integration, together with the addition of Dome9 to the CloudGuard portfolio, following its recent acquisition by Check Point, allows enterprises to access multi-layered security and nearly continuous compliance capabilities from the central console of AWS Security Hub. By leveraging AWS Security Hub, Check Point can provide a nearly seamless experience to customers in providing additional protection to their AWS environments against advanced cyber-threats in real time and mitigating compliance risks at any scale. Enhanced threat prevention CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies AWS Security Hub provides users with a comprehensive view of their high-priority security alerts and compliance status by aggregating, organising, and prioritising alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie as well as from AWS Partner Network (APN) security solutions. The findings are then visually summarised on integrated dashboards with actionable graphs and tables. The Check Point CloudGuard solution natively integrates with AWS Security Hub to provide customers with better visibility into gaps in their security and compliance posture, and context-rich security intelligence for enhanced threat prevention. CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies and provide AWS Security Hub with visibility into threat alerts based on deep event correlation and rule-based cloud intrusion detection. To complete the picture, customers leveraging the CloudGuard Dome9 solution can analyse and respond to events triggered by its sophisticated nearly continuous compliance and governance framework. Continuous network monitoring Enterprises using it benefit from powerful features that prevent 5th generation cyber-attacks in their hybrid environments. These features include: Threat prevention of both North-South and East-West cyber-attacks based on contextual awareness and attribution of network traffic to cloud-native ephemeral services Real-time alerts on network vulnerabilities, with nearly continuous network monitoring and alerting based on easily customisable policies Comprehensive visibility into cloud assets and security configurations Nearly continuous compliance monitoring and enforcement of security posture Fully integrated security capabilities, including firewall, IPS, application control, IPsec VPN, antivirus, anti-bot and more Unified management of security policies across hybrid environments (datacenter, private and public clouds) Manage cloud environments Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services" “AWS is a leader among cloud services providers, delivering powerful security capabilities that help enterprises deploy and manage cloud environments with enhanced security features at scale,” says Itai Greenberg, Vice President of Product Management at Check Point Security. “Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services. We are privileged to offer integration with AWS Security Hub to deliver comprehensive visibility into ongoing security and compliance risks, and end-to-end workflows to mitigate risks.” “We are happy to have Check Point as a launch APN Partner integrating the CloudGuard IaaS solution with AWS Security Hub,” said Dan Plastina, Vice President, Security Services, Amazon Web Services, Inc. “Check Point offers advanced threat prevention capabilities to AWS customers. The integration with support for AWS Security Hub makes it even easier for our shared customers to access and act on their cloud security insights.”