Check Point Software Technologies Ltd, a provider of cybersecurity solutions globally, announces the results of an independently commissioned study conducted by Forrester Consulting which analyses the Total Economic Impact (TEI) and benefits that enterprises deploying Check Point’s CloudGuard Cloud Network Security solution can realize. The study found that CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years through higher staff productivity, reduced breach costs, timesaving for developers, and reduced compliance and audit costs. Hybrid cloud deployments Forrester interviewed a CloudGuard user, a large US-based healthcare company To understand the business benefits and cost savings possible with CloudGuard, Forrester interviewed a CloudGuard user, a large US-based healthcare company with annual revenues of over $10 billion. The company chose CloudGuard to protect its hybrid cloud deployments because it was concerned the native services available from its cloud providers are insufficient to secure the protected health information (PHI) which the organization stores and processes. The study found that in addition to CloudGuard delivering agile, seamless security across the customers' hybrid cloud assets, the cost savings, and benefits compared to cloud providers security tools included: Increased hybrid cloud security: The study states that the frequency and costs associated with cloud data breaches are lower with CloudGuard than with native security provided by cloud vendors. The [customer] is confident that Check Point Security meets the company’s needs, now and into the future. Rapid payback and ongoing ROI: CloudGuard repaid its initial investment in under 3 months, with a 169% ROI over 3 years and a net present value of $1.25M. Quantified benefits were higher staff productivity, reduced breach costs, timesaving for developers, and reduced compliance and audit costs. Simplified security management: CloudGuard gives single-console visibility and control across the organization's multi-cloud This enables the creation of a consistent centralized security policy, eliminating duplication errors, reducing maintenance work and training needs. Flexible protection for workloads across multiple clouds: The organization can automatically secure workloads, with auto-provisioning, auto-scaling, and automated policy updates. CloudGuard gives continuous visibility, analysis, and control of the customers’ cloud security posture from CI/CD to production. Real-time security compliance: A key concern for the customer was compliance with regulatory mandates such as HIPAA. CloudGuard provides real-time compliance monitoring, improving quality and automating report production, which dramatically reduces auditing work. Multiple cloud services With CloudGuard, they use the same set of tags across multiple clouds After investing in CloudGuard and shifting multiple workloads to the cloud, the customer is now reaping the benefits of utilizing multiple cloud services while not only achieving the same level of security but also reducing the security management costs and providing productivities to developers, stated Forrester TEI study. CloudGuard has enabled the customer to better control the developers’ application of security rules without hindering them. Getting the security right at the beginning has eliminated rework later. The study also stated that confidence in Check Point security leads to more rapid movement to the cloud. Each cloud [service] has its own language. With CloudGuard, they use the same set of tags across multiple clouds and across different accounts and subscriptions. They would have had to manage everything separately if they had done it natively, stated the customer in the study. The customer also stated: “We don’t need to manage 27 different things across three different clouds to accomplish the same task. We have a single management solution in CloudGuard.” Enterprise cloud deployments “Security is often seen as a barrier to enterprise cloud deployments because managing multiple cloud providers’ security controls adds cost and complexity, and traditional security is not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of product management at Check Point Software. “We believe Forrester’s analysis is consistent with what we hear from our CloudGuard customers: it gives them the most secure threat prevention with industry-leading security effectiveness for their hybrid cloud estates, with easy, automated single-console policy management and enforcement. This strengthens their security posture, boosts efficiency, and delivers a rapid, ongoing ROI. This increased cloud confidence allows our customers to migrate more workloads to the cloud, and faster.”
Check Point Software Technologies Ltd., a renowned provider of cybersecurity solutions globally, has announced the availability of its complete Quantum Spark series of security gateways for small and medium size businesses (SMBs). The range of six gateways sets new standards of protection against the most advanced cyber attacks for SMBs, giving unrivalled ease of deployment and management, and delivering optimum security without needing specialist skills. The 2020 Verizon Data Breach Investigations Report showed that 28% of all breach victims were SMBs, with 54% of attempted attacks on SMBs being successful, compared to a 7% success rate at larger companies. 62% of SMBs say they lack the skills to deal with cybersecurity issues. With the FBI stating that cyber crime reports have quadrupled during the COVID-19 pandemic, SMBs urgently need integrated and automated security to prevent cyber threats from damaging their business. Optimized internet connectivity “Security threats are increasing in frequency and sophistication, but SMBs lack the expertise, manpower and IT budget to adequately address them. They need security solutions that evolve with the threat landscape, are easy to use, and combine communications and security,” said Chris Rodriguez, IDC’s Network Security Research Manager. Quantum Spark is also optimized for delivery by managed service providers as a monthly subscription" “Check Point’s Quantum Spark family of next generation firewalls are specifically designed to protect SMBs from the latest security threats, are easy to manage from the cloud or on the go with a cellphone app, and provide optimized internet connectivity including Wi-Fi, fiber, GbE, VDSL and 4G LTE wireless in an “all in one” solution. Quantum Spark is also optimized for delivery by managed service providers as a monthly subscription, so SMBs can be secure regardless of their budget.” Automated threat prevention Check Point’s Quantum Spark Gateways 1500 four-model series is now being expanded with two new models, 1600 and 1800.The full line of gateways allows supporting businesses ranging from one employee all the way to 500. Quantum Spark Gateway users benefit from: Highest levels of security with automated threat prevention: All models include Check Point’s award-winning SandBlast Zero Day Protection with up to 2Gb of threat prevention performance and over 60 security services focused on threat prevention. Automatic set-up in 60 seconds: All models feature zero-touch provisioning, which means they deliver full protection out-of-the-box inside one minute. Flexible connectivity: Quantum Spark Gateways include Gigabit Ethernet, Wi-Fi and integrated cellular LTE modems, giving users the widest range of connectivity options. Quantum Spark gateways also support multiple internet service providers and performance-based routing, delivering the best bandwidth and quality of service for applications. Easy, intuitive management: Check Point’s WatchTower cellphone application enables staff to monitor their security status and quickly mitigate any threats directly from the mobile device. Security can also be managed from any bowser, using a cloud-based portal with intuitive web UI. Complete protection for remote employees and cloud applications: In addition to the network protection Quantum Spark gateways provide, businesses can protect all laptops and PCs against threats such as malware, ransomware and phishing with Check Point endpoint protection, and secure employees’ smartphones with Check Point cellphone protection. Email and docs can be protected with Check Point email security. Advanced cyber threats Small businesses are experiencing the same types of advanced, stealthy cyber threats as large enterprises" “Check Point’s Quantum Spark gateways simply do their job of automatically protecting against all types of threat, without needing management attention or manual updates. This gives us peace of mind and enables us to focus on our business,” said Trevor Rowley, Managing Director, Optix Business Management Software. “Small businesses are experiencing the same types of advanced, stealthy cyber threats as large enterprises, but SMBs often don’t have the resources or security knowledge to fully protect themselves against today’s advanced cyber threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. Advanced network protection “The new Quantum Spark gateways give small and medium-size businesses the most advanced protection for their networks and employees’ devices, so they benefit from enterprise-grade automated security, together with easy intuitive management.” For full details and specifications of the six models in the Quantum Spark Gateway range, one can visit the company’s official website. As part of the expansion of the new Quantum Spark gateways, the 910 Security Gateway model is now discontinued and won’t be able to be ordered after July 2021. Check Point’s Quantum Spark Gateways 1500 four-model series and the two new models, 1600 and 1800 are currently available to order.
Check Point has introduced its next-generation unified cybersecurity platform, Check Point R81. The new platform is one of industry’s first to deliver autonomous threat prevention designed for the entire distributed enterprise, enabling IT staff to manage the most complex and dynamic network environments easily and efficiently. Enterprises have accelerated their digital transformation programs and changed IT priorities in response to the COVID-19 pandemic, which has increased their cyber risk exposure and risen the complexity of managing employees remotely. 71% of security professionals reported an increase in cyber threats since the beginning of the pandemic. Unified threat management Addressing the need for better security and less complexity, demands consolidation and automation of threat prevention technologies, processes, and policies to make protection smarter and more efficient across organizations’ complex, distributed networks. Enterprises need a consistent security policy, unified threat management, and automation" “Managing IT security today is hard because of more devices, more threats, and more applications spread across the datacenter, network and multiple clouds. To keep up, enterprises need a consistent security policy, unified threat management, and automation to prevent the latest security threats,” said Chris Rodriguez, IDC's Network Security Research Manager. AI based threat prevention “Check Point’s R81 security management platform unifies and simplifies threat management through rapid security policy installation, zero touch gateway software upgrades, security profiles, and AI based threat prevention.” Check Point R81 cybersecurity platform delivers: Highest levels of security with autonomous threat prevention: R81 has the industry’s first autonomous Threat Prevention system, which eliminates labor-intensive manual threat classification and updates. All gateways are updated automatically by AI based threat prevention for complete protection against even zero-day threats. R81’s new Infinity threat prevention policy enables security teams to implement in a single click, security best practices that then continuously update automatically. Rapid response to changing security needs with fastest policy installation: Reducing policy installation time by up to 90%, from minutes to seconds. Moreover, security admins can upgrade hundreds of remote gateways to the new release in a click of a button. Automatic security performance optimization: R81 uses dynamic allocation of gateway resources across the enterprise to deliver automatically the best hardware performance and security. Optimal security for encrypted network traffic (SSL): R81 utilizes the latest standards for secure connectivity including TLS 1.3 and HTTP/2, and ensures threats cannot hide in encrypted traffic. A dedicated policy layer allows the admin to control easily the decision to inspect or bypass network traffic. Automatic policy deployment feature Our new R81 platform gives IT and security teams holistic visibility, automated threat prevention and granular control" “Check Point R81 gives us accelerated policy installation, one-click upgrades, and the power to simultaneously upgrade our security gateways. We had already been using Check Point Infinity Threat Prevention, so the new automatic policy deployment feature in R81 will save us time, reduce the risk of configuration error, and enable continuous updates,” said Todd Ponto, CTO at AESI-US, Inc. “Today’s fast-paced changes to business applications and deployments to the cloud require organizations to be more agile than ever before - but this also exposes them to greater security risks and advanced threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies at Check Point. Automated threat prevention “Our new R81 platform gives IT and security teams holistic visibility, automated threat prevention and granular control over their entire network environment, making it easier to plan, check and quickly deploy changes to serve business need while strengthening their security and compliance postures.” R81 is now available as a free upgrade to existing Check Point customers. For full details, one can visit the support center.
Check Point® Software Technologies Ltd., a provider of cybersecurity solutions globally, has introduced its Internet of Things (IoT) Protect solution to secure both IoT devices and networks in smart building, smart city, healthcare, industrial and critical infrastructure environments against all types of advanced Gen VI cyber-threats. The solution delivers threat prevention and security management capabilities to block even unknown cyber-attacks at both IoT network and IoT device level, using threat intelligence and innovative IoT-specific security services. The majority of organizations across the commercial, industrial, healthcare and utility sectors have deployed IoT and operational technology (OT) solutions, but this has significantly increased their cyber-risk. Many IoT devices have vulnerabilities and cannot be patched, or use insecure communications protocols. In addition, organizations have diverse estates of devices from multiple vendors, with many shadow devices that are unmanaged and connected to networks without authorization, so organizations have limited visibility and control of devices and their associated risks. A recent Check Point survey highlighted these issues: 90% of respondents reported their organizations have shadow IoT devices on their networks, with 44% stating that at least half of their IoT devices were connected without the IT or security teams’ knowledge. Just 11% of respondents stated they had fully implemented an IoT security solution, and 52% have no IoT security deployed at all. Growing attacks against IoT devices and networks As a result, 67% of enterprises and 82% of healthcare firms have experienced IoT-related incidents. These growing attacks against IoT devices and networks, combined with the rapid move to remote working enforced by the COVID-19 pandemic, demand the most advanced, comprehensive security fabric that can identify vulnerable IoT devices, apply protection, and stop evasive cyber-threats. IoT devices can be ‘virtually patched’ to fix security flaws, even those with unpatchable firmware “The number of IoT devices connected to the Internet continues to accelerate and will be 41.6 billion by 2025. Cyber criminals are targeting IoT devices across all industries including medical, industrial, smart building, smart office, so enterprises are making security a high priority. Given the huge volume and variety of IoT devices, organizations need an easy way to deploy security,” said Robyn Westervelt, IDC’s Research Director, Security & Trust. “Check Point’s comprehensive IoT Protect Security solution uses automation and threat intelligence to provide device risk assessment, network segmentation, and threat prevention from the most sophisticated cyber-attacks.” Check Point’s IoT Protect gives network-level security and policy management together with Check Point security gateways, and IoT Protect Nano-Agents, which enable on-device runtime protection. IoT Protect integrates with the industry’s IoT asset discovery platforms across the healthcare, industrial, smart office and smart building sectors to secure hundreds of thousands of IoT devices. IoT protect solution Complete IoT device visibility and risk analysis: it identifies and classifies IoT devices on any network through integrations with the discovery engines, to expose risks such as weak passwords, outdated firmware and known vulnerabilities. Vulnerability mitigation and zero-day threat prevention even on unpatchable devices: IoT devices can be ‘virtually patched’ to fix security flaws, even those with unpatchable firmware or legacy operating systems. IoT Protect features 60 IoT-specific security services to identify and stop unauthorized access and traffic to and from devices and servers, and to prevent IoT-targeted malware attacks. The unique IoT Defense Nano-Agent can also be embedded on devices to give built-in zero-day prevention. Intuitive Zero Trust network segmentation and management: the solution applies and enforces granular security rules across the entire IoT network fabric based on device attributes, risks and protocols, and supports holistic security policy management in a single pane of glass for both IT and IoT networks. “We wanted to ensure that we had complete visibility and control over security across our IT network, and all of the devices on our operational technology (OT) networks in our manufacturing facilities,” said Kalpesh Shah, Digital Risk Offer and CISO, CIPLA Limited, a multinational pharmaceutical and Biotechnology Company. “With Check Point’s IoT Protect solution, we were able to discover all devices on the OT network identify vulnerabilities in them and apply virtual patches to eliminate security threats to these systems. We were also able to block all unnecessary communications to devices, which has enhanced OT performance.” IoT devices vulnerable IoT Protect is unique in giving organization a complete, end-to-end security fabric" “From IP cameras to smart elevators, medical devices and industrial controllers, many IoT devices are inherently vulnerable and easy to hack. But securing these growing networks of devices is extremely challenging because of their diversity - which means organizations themselves are extremely vulnerable to attacks,” said Itai Greenberg, VP, Product Management of Check Point. “IoT Protect is unique in giving organization a complete, end-to-end security fabric that protects at both the network and device level, and is easy to set-up and manage. This enables even legacy, unpatchable devices to be protected against various types of attack or exploitation, preventing disruption and damage to critical processes.” IoT Protect offers the industry’s IoT discovery ecosystem to secure hundreds of thousands of IoT devices. Check Point maintains an open framework of technology partners specializing in the discovery and classification of IoT devices in a variety of verticals. With some of which agreements were signed that allow Check Point’s customers to get an end-to-end solution. These partners include as of today Armis, MediGate, Claroty and Ordr. IoT Protect supports over 1,600 IoT and operational technology (OT) protocols, applications and commands out of the box, and enables compliance best practices for regulations including HIPAA, NERC CIP, GDPR and many others. Its threat prevention capabilities are powered by Check Point ThreatCloud, a powerful threat intelligence database. IoT Protect is available immediately.
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organizations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organizations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organizations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organizations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organizations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organizations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organizations embrace cloud-based protections.”
Check Point announces the availability of its complete Quantum Security Gateways series, which deliver unprecedented protection, scalability, and ease of deployment and control for enterprises, from their branch offices to corporate data centers. The coronavirus (COVID-19) pandemic has forced enterprises to quickly expand support for remote connectivity and home working at an unprecedented scale. Recent research by Check Point showed that 71% of enterprise IT and security professionals globally reported an increase in security threats and attacks since the pandemic started, as criminals seek to exploit the remote working explosion, and 95% of respondents said they are facing added IT security challenges related to these changes. Advanced security protections Organizations are focused on three key network and security requirements: Preventing even advanced, zero-day cyber-attacks before they impact the organization The ability to secure any type of network expansion or changes on demand Unified solutions that speed up operations and automate protection Check Point’s range of new Quantum Security Gateways deliver a combination of advanced security protections, with over 2x the performance and half the energy consumption of rival high-end appliances. All of the Quantum Security Gateway models are now bundled with Check Point’s award-winning SandBlast Zero Day Protection with more than 60 security services focused on threat prevention, out of the box. SSL-encrypted traffic inspection This includes a 100% block score for malware prevention for email and web, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test. They also feature lightning-fast SSL-encrypted traffic inspection for maximum security. Key highlights of the Quantum Security Gateway range include: Hyperscale-ready with up to 1.5 Tera-bps of Threat Prevention Performance Latest CPU models Modularity and easy customization through multiple expansion slots 100% Enterprise Solid State Drives (SSD), second power supply unit, and lights-out management for optimum reliability and availability. Reducing complexity and improve efficiency Enterprises today require cybersecurity solutions that provide strong threat prevention" “Enterprises today require cybersecurity solutions that provide strong threat prevention to stop sophisticated multi-vector attacks, on-demand scalability to keep pace with changing network traffic requirements including an increase in remote workers, and centralized management to reduce complexity and improve efficiency,” said John Grady Analyst at Enterprise Strategy Group (ESG). “Check Point’s new Quantum Security Gateways ™ address these IT challenges through high performance SandBlast Network threat prevention, security capacity expansion on-demand, and a unified security management platform that can reduce operational costs. These innovations enable enterprises to stay ahead of the attack landscape while meeting the changing needs of the business.” Critical network security challenges “Addressing our customers’ critical network security challenges is what we do at Check Point every day, and today, enterprises need industry-leading threat prevention capabilities at all points of their infrastructure, and the ability to quickly adapt and scale their security almost infinitely,” said Itai Greenberg, VP Product Management and Product Marketing at Check Point. “With the new Quantum Security Gateway series we are uniquely delivering to market uncompromised security and performance with the most advanced threat prevention. This enables enterprises of all sizes to achieve the highest caliber of protection and resiliency while cutting their operational costs by up to 80%.” Quantum Security Gateway range The Quantum Security Gateway range: supporting enterprises of all sizes Quantum 3600 and 3800 Gateways secure branch offices with up to 1.5 Gbps performance against zero-day attacks, in a desktop form factor with power supply redundancy and enterprise grade SSDs. Quantum 6200 and 6400 Gateways secure small enterprises with up to 2.5 Gbps performance against zero-day attacks. Quantum 6600 and 6700 Gateways secure mid-sized enterprises with up to 7.6 Gbps performance against zero-day attacks. These models offer modular customizable connectivity options with up to 40 GbE fiber interfaces. Quantum 7000 and 16200 Gateways secure large enterprises with up to 15 Gbps performance against zero-day attacks. These models deliver modular customizable connectivity options with up to 100 GbE fiber interfaces. Quantum 26000 and 28000 Gateways secure data centers against zero-day attacks, with up to 30 Gbps of threat prevention These models deliver the industry’s highest port density with up to 16 100 GbE fiber interfaces. Quantum 16600 Quantum Hyperscale Gateway is purpose built for Maestro, in a condensed 1RU form factor enabling customers to create cloud-grade security systems with up to 850 Gbps performance against zero-day attacks.
Check Point has announced that its R80 unified security software is now available as a cloud service. This gives customers the quickest route to deploying Check Point’s unified security management solution across their entire network fabric from their web browser, with no deployment time needed, and no need for ongoing maintenance or manual updates. R80 Security MaaS Solution The new R80 Security Management-as-a-Service (MaaS) solution extends Check Point’s Fast Track Network Security suite of solutions to deliver unprecedented protection, scalability, and ease of deployment and control for enterprises. R80 Security MaaS gives visibility of security across organizations’ entire infrastructures R80 Security MaaS gives holistic visibility of security across organizations’ entire infrastructures in a customizable visual dashboard, enabling the most complex environments to be managed more efficiently, cutting operational time by up to 60% compared with other solutions. Unified security software for cloud R80 is the industry’s most advanced unified security software for on-premise and cloud environments, with over 160 technology integrations. The latest version, R80.40 has over 100 new features to extend protection, streamline operational processes and enhance productivity. R80 Security MaaS delivers: Management of all Check Point products from the cloud, directly from a web browser Fully-automated updates to ensure the latest protections are always applied On-demand expansion to seamlessly onboard more gateways with no physical limits Zero maintenance makes your environments more secure, manageable and compliant The ability to store and access logs indefinitely “R80 Management-as-a-Service further accelerates and simplifies enterprise security management processes, by eliminating manual maintenance and updates and supporting on-demand scalability,” said Itai Greenberg, VP Product Management at Check Point, further adding “Together with the Fast Track Network Security suite of advanced gateways, it gives customers the quickest route to hyperscale, high-performance network security while improving the efficiency of their operations.” Fast Track Network Security Fast Track Network Security comprises five new Quantum Security Gateways which feature Check Point’s ThreatCloud and award-winning SandBlast Zero-Day Protection. The new range starts with the 3600 model for branch offices and extends to the large enterprise with the 16000 Turbo Hyperscale gateway, which delivers 17.6 Gbps of Gen V Threat Prevention throughput – over 2x faster than rival high-end gateways, while using less than half the energy. Fast Track Network Security’s combination of new Security Gateways, the enhanced R80.40 software and its availability as a cloud service offering enables organizations to deploy the most advanced, fully scalable and easy-to-manage protections against evolving fifth-generation threats.
Check Point announces the release of the new 1500 series security gateways for SMBs. The two new SMB appliances set new standards of protection against the most advanced fifth-generation cyberattacks, and offer unrivaled ease of deployment and management. According to the 2019 Verizon Data Breach Investigations Report, 43% of all breach victims were small businesses, and 63% of attack attempts against SMBs were successful. The cost of disruption from cyber-attacks against SMBs can exceed $1M, according to a Ponemon Institute report, which can have a devastating effect on an organization. Multi-Layered next-Generation protection The 1550 and 1590 gateways are powered by Check Point’s R80 release. R80 is the industry’s most advanced security management software, and includes multi-layered next-generation protection from both known threats and zero-day attacks using the award-winning SandBlast™ Zero-Day Protection, plus antivirus, anti-bot, IPS, app control, URL filtering and identity awareness. The new 1500 series empowers Small and Midsize businesses with Enterprise Grade Security: 100% block score for malware prevention for email and web, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test Up to 2 times more performance from previous generations. The 1550 Gateway offers 450Mbps of threat prevention performance, and the 1590 Gateway offers 660Mbps The 1550 provides maximum firewall throughput of 2Gbps and the 1590 provides maximum firewall throughput of 4Gbps The 1550 features six 1GbE ports and the 1590 features ten 1GbE ports both have Wi-Fi and integrated cellular modem architected for LTE and 5G Check Point WatchTower mobile application, enables IT staff to monitor their networks and quickly mitigate security threats on the go from their mobile device Out-of-the-box zero-touch provisioning allows for under 1-minute setup IoT devices discovery and recognition for accurate security policy definition. Truly enterprise-Grade security "Small businesses play a critical role in economic growth and innovation across the globe, but often lack the resources to fully protect themselves against today’s advanced cyber-threats,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Now, small and midsize businesses can enjoy truly enterprise-grade security with industry-leading threat prevention capabilities, coupled with easy and intuitive management.”
Check Point received the highest possible scores in the malware prevention, exploit prevention, secure configuration management, data security, mobile and zero-trust framework alignment criteria cyber security solutions Check Point Software Technologies, global provider of cyber security solutions, announced that it has been recognized as a ‘Leader’ in Forrester’s newly-published report, ‘The Forrester Wave: Endpoint Security Suites, Q3 2019’. For this report, Forrester’s assessment evaluated 15 endpoint security providers and their products, including Check Point’s SandBlast Agent Advanced Endpoint Protection. Forrester’s assessment evaluated 15 endpoint security providers and their products Vendors were evaluated over 25 weighted criteria, and Check Point received the highest possible scores in the malware prevention, exploit prevention, secure configuration management, data security, mobile and zero-trust framework alignment criteria. Cyber security firm The Forrester Wave is a trusted resource for technology buyers to learn about more ways they can protect their business against attacks, and find the providers that best meet their needs. A select group of vendors in the market are evaluated based on the strengths and weaknesses of their current offering, strategy, and market presence. With capabilities to reduce the attack surface of the endpoint and provide a series of behavioral protection measures to detect and remediate threat activities, SandBlast Agent Advanced Endpoint Protection was developed with network integration in mind. Core endpoint security Check Point’s portfolio consists of a number of core endpoint security capabilities, including over 11 innovative engines and a ground breaking industry leading anti-ransom ware technology, as well as next generation firewall capabilities. States the report, “Check Point’s focus on integrating the endpoint security capabilities with its network security portfolio has led to one of the tightest integrations between the two layers in this study, helping customers to enforce a Zero Trust approach on their endpoint devices.” SandBlast Agent Advanced Endpoint Protection At Check Point, we help organisations go beyond just detection to adopt a prevention approach towards attacks" “We believe being recognized as a Leader in the prestigious Forrester Wave is a validation of Check Point’s commitment to helping organizations remain one step ahead in the fight against increasingly sophisticated cyber threats,” said Itai Greenberg, Vice President, Product Management and Product Marketing, Check Point Software Technologies. “At Check Point, we help organizations go beyond just detection to adopt a prevention approach towards attacks while leveraging our strong portfolio of security technologies that have been developed to meet a variety of customer needs.” SandBlast Agent Advanced Endpoint Protection is an integral component of Check Point’s fully consolidated cyber security architecture, infinity, which protects the network, endpoints, cloud, and mobile. It leverages real-time threat intelligence from Check Point’s central ThreatCloud knowledge database to continually monitor for threats across all platforms through a single pane of glass.
Check Point® Software Technologies Ltd., one of the leading providers of cybersecurity solutions globally, has announced the launch of Check Point CloudGuard Connect to transform enterprise branch office connectivity with cloud-delivered security services. Check Point CloudGuard Connect delivers top-rated Threat Prevention updated in real-time with the latest ThreatCloud intelligence, flexibility to deploy branch office security in minutes from the cloud or on-premise, seamless integration with leading SD-WAN providers like VMware and Silver Peak, and a unified threat and access management platform that can reduce operational expense by up to 40%. As enterprises increasingly move their on-premise branch office workloads and applications to SaaS applications, they are adopting Software-Defined Wide Area Networking (SD-WAN) to intelligently route traffic to cloud services. However, connecting branch offices directly to the cloud significantly increase their security risk and security management costs. Branches are no longer protected by centralized data center security, which exposes them and the enterprise WAN to sophisticated multi-vector Gen V attacks. Protection from Gen V security threats For flexibility, CloudGuard Connect is integrated with SD-WAN providers like VMware and Silver Peak "The movement to SD-WAN requires integrated security to protect enterprises from from Gen V security threats. Enterprises expect top-rated security even at the branch office," said Itai Greenberg, Vice President of Product Marketing and Management at Check Point."With CloudGuard Connect enterprises can now deploy Check Point's top-rated threat prevention and intelligence to protect their branch offices against the latest Zero Day and Gen V security threats." "Securing SD-WAN connections to the cloud is essential given today's advanced cyber threats," says Sanjay Uppal, VMware Vice President and GM of VeloCloud™. "We're excited to partner with Check Point to help drive the transformation in connecting branches to the cloud." "Through the Silver Peak and Check Point partnership, enterprise IT organizations can confidently embrace a cloud-centric security model, centrally configuring and enforcing uniform security policies across the WAN with just a few mouse clicks," said Chris Helfer, senior vice president of strategic alliances at Silver Peak. "The Silver Peak® Unity EdgeConnect™ SD-WAN edge platform managed by the Silver Peak Unity Orchestrator™, automatically services chain applications to Check Point CloudGuard Connect and CloudGuard ConnectEdge." Cloud guard Check Point provides organizations of all sizes with integrated, advanced threat prevention, reducing complexity and lowering the total cost of ownership. With CloudGuard Connect, Check Point protects branch office connections to the cloud from sophisticated threats with dynamic scalability, intelligent provisioning and consistent control. Unlike other solutions that only detect, Check Point prevents threats with: Top-rated Threat Prevention with 100% Catch Rate Innovative solutions that combine cloud-hosted patented CPU-level inspection and OS-level sandboxing to prevent infection from the most dangerous zero-day and sophisticated Gen V attacks Check Point CloudGuard Connect threat prevention stays up to date on the latest Zero-Day and Gen V cyber-attacks through ThreatCloud. ThreatCloud is a cloud-driven knowledge base that delivers real-time dynamic security intelligence. ThreatClould gathers threat intelligence from 86 billion security decisions, 4 million file emulations, and 7000 Zero-Day attacks every day. SD-WAN vendors in Cloud Check Point CloudGuard Connect secures SD-WAN connections to the cloud. Check Point CloudGuard Connect seamlessly implements branch security across thousands of branches where space is limited and there are no local IT resources. For enterprises that require on-premise security for data privacy or data-location requirements, CloudGuard ConnectEdge can be deployed using a virtual security gateway running on existing branch office IT equipment including dedicated SD-WAN or universal Customer Premise Equipment (uCPE) devices. To provide enterprises with the ultimate flexibility, Check Point CloudGuard Connect is seamlessly integrated with leading SD-WAN providers including VMware and Silver Peak. Reducing OpEx costs up to 40% Both Check Point CloudGuard Connect and CloudGuard ConnectEdge are integrated into Check Point's R80 threat prevention and management platform and Infinity Architecture. This enables enterprises to have a unified view of their threat landscape and security policy from one single console, no matter which form of the CloudGuard service they choose to utilize. They get real-time updates on security threats through the cyberattack dashboard. The unified security platform is integrated with Check Point's Infinity architecture increasing security productivity enabling enterprises to reduce operating costs up to 40%.
Check Point announces the general availability of CloudGuard SaaS, an industry-first cloud suite designed to prevent sophisticated security threats that target SaaS applications. One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including Office 365, GSuite and OneDrive), and prevents targeted attacks intended to steal sensitive data. Addressing advanced SaaS threats, CloudGuard SaaS provides 360-degree protection against malware and zero-days, phishing attacks, as well as employee account takeovers. Additionally, it can discover unsanctioned use of SaaS applications and prevent data leakage, while providing instant threat visibility. Data Leakage Protection CIOs should work with security and risk managers to create and follow a comprehensive and continuous approach for the controlled use of SaaS" “In today’s fifth-generation cyber-attack landscape, it’s crucial to implement technology equipped to take on more threats on business cloud applications,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Businesses generally turn to solutions in the Cloud Access Security Broker domain, which offer visibility and data leakage protection. CloudGuard SaaS goes beyond CASB capabilities. It’s designed to prevent the most common attacks on SaaS applications, providing peace of mind to enterprises.” According to Gartner Jay Heiser, Research VP, Analyst at Gartner: “CIOs should work with security and risk managers to create and follow a comprehensive and continuous approach for the controlled use of SaaS, or they will fail to meet business goals, resulting in unnecessary losses or incidents.” Breach Prevention Solution CloudGuard SaaS is an essential solution that equips businesses with the necessary preventive security for a multitude of enterprise SaaS applications within minutes. “Businesses today face potential cyberattacks occurring from multiple vectors, including SaaS-based applications. Products like Check Point CloudGuard SaaS can help enterprises looking to protect themselves from attacks of different levels – from phishing to zero-day compromises,” said Jon Oltsik, senior principal analyst at the analyst firm ESG. Superior threat prevention against malware and zero-days: CloudGuard SaaS is the most effective breach prevention solution for malware and zero-day attacks on SaaS applications, leveraging Check Point’s SandBlast technology. SandBlast scored a 100% block rate and highest evasion testing with NSS Labs, a globally recognized trusted source for independent, fact-based cybersecurity testing. Sophisticated Phishing Attacks CloudGuard SaaS blocks SaaS account takeovers by preventing unauthorized users from logging in, even if the device is already compromised By leveraging these capabilities, CloudGuard SaaS protects email attachments and file downloads on file hosting services and collaboration tools. CloudGuard SaaS blocks zero-day threats before they reach users and delivers safe content in seconds, using advanced threat emulation and extraction technology. Innovative technology stops account takeovers: CloudGuard SaaS blocks SaaS account takeovers by preventing unauthorized users from logging in, even if the device is already compromised. Using its new ID-Guard technology, CloudGuard SaaS identifies fraudulent access by finding bad logins and centralizing multi-factor authentication. In addition, CloudGuard SaaS can authenticate users in any SaaS application on any device—mobile or PC. Total phishing protection: CloudGuard SaaS prevents more phishing attacks than standard email services by leveraging artificial intelligence engines. It can stop sophisticated phishing attacks, spear-phishing, and email spoofing that may bypass other solutions. Malicious email content can also be blocked with high-precision certainty.
Check Point announces a technology integration with Amazon Web Services (AWS) Security Hub, a unified security service, which centralises view and management for security alerts. This integration, together with the addition of Dome9 to the CloudGuard portfolio, following its recent acquisition by Check Point, allows enterprises to access multi-layered security and nearly continuous compliance capabilities from the central console of AWS Security Hub. By leveraging AWS Security Hub, Check Point can provide a nearly seamless experience to customers in providing additional protection to their AWS environments against advanced cyber-threats in real time and mitigating compliance risks at any scale. Enhanced Threat Prevention CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies AWS Security Hub provides users with a comprehensive view of their high-priority security alerts and compliance status by aggregating, organizing, and prioritising alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie as well as from AWS Partner Network (APN) security solutions. The findings are then visually summarised on integrated dashboards with actionable graphs and tables. The Check Point CloudGuard solution natively integrates with AWS Security Hub to provide customers with better visibility into gaps in their security and compliance posture, and context-rich security intelligence for enhanced threat prevention. CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies and provide AWS Security Hub with visibility into threat alerts based on deep event correlation and rule-based cloud intrusion detection. To complete the picture, customers leveraging the CloudGuard Dome9 solution can analyze and respond to events triggered by its sophisticated nearly continuous compliance and governance framework. Continuous Network Monitoring Enterprises using it benefit from powerful features that prevent 5th generation cyber-attacks in their hybrid environments. These features include: Threat prevention of both North-South and East-West cyber-attacks based on contextual awareness and attribution of network traffic to cloud-native ephemeral services Real-time alerts on network vulnerabilities, with nearly continuous network monitoring and alerting based on easily customisable policies Comprehensive visibility into cloud assets and security configurations Nearly continuous compliance monitoring and enforcement of security posture Fully integrated security capabilities, including firewall, IPS, application control, IPsec VPN, antivirus, anti-bot and more Unified management of security policies across hybrid environments (datacenter, private and public clouds) Manage Cloud Environments Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services" “AWS is a leader among cloud services providers, delivering powerful security capabilities that help enterprises deploy and manage cloud environments with enhanced security features at scale,” says Itai Greenberg, Vice President of Product Management at Check Point Security. “Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services. We are privileged to offer integration with AWS Security Hub to deliver comprehensive visibility into ongoing security and compliance risks, and end-to-end workflows to mitigate risks.” “We are happy to have Check Point as a launch APN Partner integrating the CloudGuard IaaS solution with AWS Security Hub,” said Dan Plastina, Vice President, Security Services, Amazon Web Services, Inc. “Check Point offers advanced threat prevention capabilities to AWS customers. The integration with support for AWS Security Hub makes it even easier for our shared customers to access and act on their cloud security insights.”
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download