SonicWall, a pioneer in physical, virtual and cloud-focused cybersecurity solutions, is emphasizing the return of customer choice for securing and scaling a mix of cloud, hybrid and traditional environments. “Too many times organizations have been forced to change the way they operate in order to secure access to their networks, data, devices and people,” said SonicWall President and CEO Bill Conner. “We’ve been busy innovating cloud and virtual solutions that help organizations secure complex blends of networks, including virtual, hybrid, cloud and on-premises deployments.” Core cloud solution SonicWall’s growing virtual, cloud and hybrid offerings leverage the best of the company’s boundless cybersecurity approach to return deployment choices to the customer while solving real-world use cases faced by SMBs, enterprises, governments and MSSPs. SonicWall’s core cloud solution offerings: Solve security and connectivity challenges for cloud-native and hybrid environments. Secure access to cloud and on-premises applications and virtualized workloads through modern zero-trust capabilities. Protect increasingly distributed and remote workforces through powerful virtualized security layers and zero-touch capabilities. Simplify threat detection and response by unifying security events and analytics in a single cloud-based dashboard, allowing easy visualization and management of high-risk alerts. Robust hybrid networks SonicWall’s cloud innovation is driven by the need to solve complex security challenges “The modern IT environment is rife with complexity that drives security and connectivity challenges, which can be further complicated when organizations require hybrid environments comprised of physical, virtual and SaaS offerings, and private and public cloud solutions,” said IDC Research Director Chris Rodriguez. “Cybersecurity vendors that support these deployment options add tremendous financial and operational flexibility for their customers, and are also well suited for organizations that are in different stages of their cloud journey.” SonicWall’s cloud innovation is driven by the need to solve complex security and connectivity challenges by delivering power, flexibility and choice to customers and partners. SonicWall has collaborated with organizations worldwide to build some of the most secure and robust hybrid networks. Adopting cloud transformation “The University of Pisa connects and secures a wide and distributed network of systems, users, applications and services to ensure our institution can provide the highest levels of on-campus and remote learning,” said University of Pisa CIO Antonio Cisternino. “It’s imperative that we’re able to use the same trusted security controls, regardless of how we deploy them. Through their growing range of virtual, cloud and hybrid offerings, SonicWall gives us that choice and flexibility without sacrificing the security standards we require to protect and enable students, faculty and staff.” SonicWall ensures organizations are able to set their own deployment paths SonicWall ensures organizations are able to set their own deployment paths and cloud migration timelines — not forcing them into a rigid vendor-first approach. By providing cloud-based (e.g., virtual firewall and VPN), as-a-service (e.g., ZTNA, FWaaS) and on-premises (e.g., firewalls, VPN) options, SonicWall empowers customers to deploy what works for their architecture — and adopt cloud transformation at their pace. Cloud-Hosted applications These real-world hybrid environments are secured using a cohesive mix of virtual, cloud and on-premises offerings, including SonicWall NSv virtual firewalls, Cloud Edge Secure Access zero-trust security, appliance-free SMA virtual private networks (VPN), and Cloud App Security to protect SaaS applications. Organizations are able to further scale and extend distributed environments by simultaneously deploying security across multiple locations — with minimal IT support — using Zero-Touch Deployment capabilities. With the influx of work-from-home access, companies require a simple and secure way of connecting their workforce to resources they need — wherever they’re located. SonicWall embraces zero-trust security as a tenet of cybersecurity in a perimeter-less, cloud-first reality. SonicWall helps organizations easily and quickly connect remote users to on-premises resources, cloud-hosted applications, branch offices and public clouds. Wireless access points SonicWall Cloud Edge Secure Access — the company’s zero-trust network access (ZTNA) offering In as few as 15 minutes, SonicWall Cloud Edge Secure Access — the company’s zero-trust network access (ZTNA) offering — quickly scales security beyond the perimeter through modern zero-trust principles. This results in logical trust zones that authenticate every user, device and location for secure access to only the specific services and resources they require. New in SonicWall Capture Security Center 3.0, Unified Insights brings analytics from across SonicWall products, including physical and virtual firewalls, wireless access points, switches and endpoint security products into a single, customizable dashboard. This provides a central, easy-to-use location for monitoring environments and troubleshooting incidents, eliminating the need to multi-task across different consoles. Private cloud infrastructure Paired with SonicWall Analytics, Capture Security Center 3.0 can transform large volumes of data (spanning tens of thousands of firewall nodes) into actionable insights and defensive actions against hidden risks across networks, applications and users — all with the visibility, precision, speed and scale of the cloud. Regardless of deployment strategy, SonicWall ensures organizations can identify and block both known and unknown cyberattacks across traditional networks, public and private cloud infrastructure, and virtual environments by seamlessly integrating SonicWall physical and virtual firewalls when and where it makes sense for your business. The foundation of this ecosystem integrates with SonicWall’s cloud-based Advanced Threat Protection (ATP) multi-engine sandbox service to stop advanced cyberattacks, including never-before-seen malware and ransomware.
Check Point Software Technologies Ltd., a renowned provider of cybersecurity solutions globally, has announced the availability of its complete Quantum Spark series of security gateways for small and medium size businesses (SMBs). The range of six gateways sets new standards of protection against the most advanced cyber attacks for SMBs, giving unrivalled ease of deployment and management, and delivering optimum security without needing specialist skills. The 2020 Verizon Data Breach Investigations Report showed that 28% of all breach victims were SMBs, with 54% of attempted attacks on SMBs being successful, compared to a 7% success rate at larger companies. 62% of SMBs say they lack the skills to deal with cybersecurity issues. With the FBI stating that cyber crime reports have quadrupled during the COVID-19 pandemic, SMBs urgently need integrated and automated security to prevent cyber threats from damaging their business. Optimized internet connectivity “Security threats are increasing in frequency and sophistication, but SMBs lack the expertise, manpower and IT budget to adequately address them. They need security solutions that evolve with the threat landscape, are easy to use, and combine communications and security,” said Chris Rodriguez, IDC’s Network Security Research Manager. Quantum Spark is also optimized for delivery by managed service providers as a monthly subscription" “Check Point’s Quantum Spark family of next generation firewalls are specifically designed to protect SMBs from the latest security threats, are easy to manage from the cloud or on the go with a cellphone app, and provide optimized internet connectivity including Wi-Fi, fiber, GbE, VDSL and 4G LTE wireless in an “all in one” solution. Quantum Spark is also optimized for delivery by managed service providers as a monthly subscription, so SMBs can be secure regardless of their budget.” Automated threat prevention Check Point’s Quantum Spark Gateways 1500 four-model series is now being expanded with two new models, 1600 and 1800.The full line of gateways allows supporting businesses ranging from one employee all the way to 500. Quantum Spark Gateway users benefit from: Highest levels of security with automated threat prevention: All models include Check Point’s award-winning SandBlast Zero Day Protection with up to 2Gb of threat prevention performance and over 60 security services focused on threat prevention. Automatic set-up in 60 seconds: All models feature zero-touch provisioning, which means they deliver full protection out-of-the-box inside one minute. Flexible connectivity: Quantum Spark Gateways include Gigabit Ethernet, Wi-Fi and integrated cellular LTE modems, giving users the widest range of connectivity options. Quantum Spark gateways also support multiple internet service providers and performance-based routing, delivering the best bandwidth and quality of service for applications. Easy, intuitive management: Check Point’s WatchTower cellphone application enables staff to monitor their security status and quickly mitigate any threats directly from the mobile device. Security can also be managed from any bowser, using a cloud-based portal with intuitive web UI. Complete protection for remote employees and cloud applications: In addition to the network protection Quantum Spark gateways provide, businesses can protect all laptops and PCs against threats such as malware, ransomware and phishing with Check Point endpoint protection, and secure employees’ smartphones with Check Point cellphone protection. Email and docs can be protected with Check Point email security. Advanced cyber threats Small businesses are experiencing the same types of advanced, stealthy cyber threats as large enterprises" “Check Point’s Quantum Spark gateways simply do their job of automatically protecting against all types of threat, without needing management attention or manual updates. This gives us peace of mind and enables us to focus on our business,” said Trevor Rowley, Managing Director, Optix Business Management Software. “Small businesses are experiencing the same types of advanced, stealthy cyber threats as large enterprises, but SMBs often don’t have the resources or security knowledge to fully protect themselves against today’s advanced cyber threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. Advanced network protection “The new Quantum Spark gateways give small and medium-size businesses the most advanced protection for their networks and employees’ devices, so they benefit from enterprise-grade automated security, together with easy intuitive management.” For full details and specifications of the six models in the Quantum Spark Gateway range, one can visit the company’s official website. As part of the expansion of the new Quantum Spark gateways, the 910 Security Gateway model is now discontinued and won’t be able to be ordered after July 2021. Check Point’s Quantum Spark Gateways 1500 four-model series and the two new models, 1600 and 1800 are currently available to order.
Check Point has introduced its next-generation unified cybersecurity platform, Check Point R81. The new platform is one of industry’s first to deliver autonomous threat prevention designed for the entire distributed enterprise, enabling IT staff to manage the most complex and dynamic network environments easily and efficiently. Enterprises have accelerated their digital transformation programs and changed IT priorities in response to the COVID-19 pandemic, which has increased their cyber risk exposure and risen the complexity of managing employees remotely. 71% of security professionals reported an increase in cyber threats since the beginning of the pandemic. Unified threat management Addressing the need for better security and less complexity, demands consolidation and automation of threat prevention technologies, processes, and policies to make protection smarter and more efficient across organizations’ complex, distributed networks. Enterprises need a consistent security policy, unified threat management, and automation" “Managing IT security today is hard because of more devices, more threats, and more applications spread across the datacenter, network and multiple clouds. To keep up, enterprises need a consistent security policy, unified threat management, and automation to prevent the latest security threats,” said Chris Rodriguez, IDC's Network Security Research Manager. AI based threat prevention “Check Point’s R81 security management platform unifies and simplifies threat management through rapid security policy installation, zero touch gateway software upgrades, security profiles, and AI based threat prevention.” Check Point R81 cybersecurity platform delivers: Highest levels of security with autonomous threat prevention: R81 has the industry’s first autonomous Threat Prevention system, which eliminates labor-intensive manual threat classification and updates. All gateways are updated automatically by AI based threat prevention for complete protection against even zero-day threats. R81’s new Infinity threat prevention policy enables security teams to implement in a single click, security best practices that then continuously update automatically. Rapid response to changing security needs with fastest policy installation: Reducing policy installation time by up to 90%, from minutes to seconds. Moreover, security admins can upgrade hundreds of remote gateways to the new release in a click of a button. Automatic security performance optimization: R81 uses dynamic allocation of gateway resources across the enterprise to deliver automatically the best hardware performance and security. Optimal security for encrypted network traffic (SSL): R81 utilizes the latest standards for secure connectivity including TLS 1.3 and HTTP/2, and ensures threats cannot hide in encrypted traffic. A dedicated policy layer allows the admin to control easily the decision to inspect or bypass network traffic. Automatic policy deployment feature Our new R81 platform gives IT and security teams holistic visibility, automated threat prevention and granular control" “Check Point R81 gives us accelerated policy installation, one-click upgrades, and the power to simultaneously upgrade our security gateways. We had already been using Check Point Infinity Threat Prevention, so the new automatic policy deployment feature in R81 will save us time, reduce the risk of configuration error, and enable continuous updates,” said Todd Ponto, CTO at AESI-US, Inc. “Today’s fast-paced changes to business applications and deployments to the cloud require organizations to be more agile than ever before - but this also exposes them to greater security risks and advanced threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies at Check Point. Automated threat prevention “Our new R81 platform gives IT and security teams holistic visibility, automated threat prevention and granular control over their entire network environment, making it easier to plan, check and quickly deploy changes to serve business need while strengthening their security and compliance postures.” R81 is now available as a free upgrade to existing Check Point customers. For full details, one can visit the support center.
Protecting Dormitory Residents and AssetsDownload
Protecting Critical Infrastructure Through Facial RecognitionDownload
12 Questions To Ask Your Access Control ProviderDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download