Science and Technology Science and Technology
Wed, November 14, 2012

Check Point Taps ThreatCloud(TM) to Revolutionize Attack Response and Mitigation With New Security Services


Published on 2012-11-14 05:47:10 - Market Wire
  Print publication without navigation


November 14, 2012 08:30 ET

Check Point Taps ThreatCloud™ to Revolutionize Attack Response and Mitigation With New Security Services

Security Services Stop Attacks With Award-Wining Technology and Expert Analysis; Dedicated 24/7 Security Teams Help Customers Keep up With the Surge of Potential Security Incidents

SAN CARLOS, CA--(Marketwire - Nov 14, 2012) - [ Check Point® Software Technologies Ltd ]. (NASDAQ: [ CHKP ]), the worldwide leader in securing the Internet, announces [ Check Point ThreatCloud Security Services ], a set of new security service offerings to assist our customers in protecting their organization's networks from the most sophisticated threats and provide expert 24/7 resources to help during any attack. These new services monitor events directly on customer security gateways, and are powered by Check Point's revolutionary [ ThreatCloud ] security intelligence infrastructure, the industry's largest collaborative network to fight cybercrime and deliver real-time threat data from a worldwide network of threat sensors.

ThreatCloud Security Services integrate this global collaborative intelligence and offer our customers several new services; [ ThreatCloud Managed Security Service ] and [ ThreatCloud Incident Response ]. ThreatCloud Managed Security Service continuously monitors customer networks and gateways for security events, and provides easy to understand, actionable alerts based on this specific data. The managed security service also optimizes security by recommending and fine tuning the organization's Threat Prevention policies. ThreatCloud Incident Response provides customers with expert assistance in real-time during critical security incidents to help businesses respond and recover quickly.

Modern networks are overwhelmed by an unprecedented level of technical complexity as a result of the explosion in data, applications and connected mobile devices. Furthermore, attacks are becoming more advanced in nature and continue to threaten organizations' infrastructure as IT departments struggle to keep up with an ever-changing security environment. Security services can be a crucial addition to help alleviate resource strapped departments, increase the level of security expertise and assist in keeping up with compliance demands. As a trusted security leader, Check Point has global visibility to provide our customers with the insight and expertise to optimize security operations and deliver the most proactive security for these advanced threats. 

"With the increasing level of threat sophistication and greater frequency, it can be challenging for even the best equipped security teams to stay ahead of the curve. These new service offerings provide customers with critical security resources," said Dorit Dor, vice president of products at Check Point Software Technologies. "Check Point ThreatCloud Security Services are valuable, extended resources that provide around the clock monitoring of customer gateways, proactive mitigation of threats, and real-time incident response from industry-leading experts."

Check Point ThreatCloud Security Services identify the most important threats and advise organizations so they can effectively prevent serious damage to their network. These services include:

  • Check Point ThreatCloud Managed Security Service stops attacks with award-winning technology and expert analysis. This security service provides our customers with security monitoring, visibility and compliance support. It monitors logs from their network and gateways to turn the overwhelming flood of security events into manageable, actionable alerts. Check Point experts monitor and uncover stealthy attacks before they are able to do serious damage. It also fine tunes policies for Check Point's Threat Prevention Software Blades: [ IPS ], [ Anti-Bot ] and [ Antivirus ].
  • Check Point ThreatCloud Incident Response provides customers with expert assistance during critical security incidents. Check Point certified security professionals are readily available to recommend controls, practical remediation and implement security best practices. The service helps speed recovery times after an event, to quickly get businesses back up and running. It also provides on-call experts to keep the network protected when an attack may be in the works or has been successfully executed and discovered. The service mitigates future security events with post-incident advisement.

"Having a security service that can analyze security events, provide live alerts and offer immediate mitigation gives us peace of mind. Best of all, going with Check Point ThreatCloud Managed Services saved us a whopping 75 percent in annual cost versus other service providers we've used," Luis Rivas, network security analyst at Banesco. "We feel much more comfortable having Check Point monitor our IPS rather than a third-party -- since the product and service are both directly from a trusted leader in security."

Pricing and Availability
Pricing for Check Point ThreatCloud Security Services depend on the size and scope of the deployment. 
For more information, please visit [ Check Point ThreatCloud Security Services ].

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. ([ www.checkpoint.com ]), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. 

©2012 Check Point Software Technologies Ltd. All rights reserved.


Contributing Sources