|By Marketwired .||
|May 20, 2014 04:17 AM EDT||
BARCELONA, SPAIN -- (Marketwired) -- 05/20/14 -- Check Point Experience 2014 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the launch and immediate availability of ThreatCloud IntelliStore, a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks. This new offering builds on Check Point's core security intelligence infrastructure: ThreatCloud, the industry's largest real-time big data security infrastructure, which delivers threat data from a worldwide network of threat sensors.
Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring. Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals. Check Point's exciting advancement in security architecture, Software-defined Protection (SDP), makes threat prevention simple and flexible, quickly converting threat intelligence into real-time protections.
ThreatCloud IntelliStore launches with several industry-leading partners -- iSIGHT Partners, CrowdStrike, IID, NetClean, PhishLabs, SenseCy, and ThreatGRID to offer actionable threat intelligence to customers worldwide. Customers can select and customize intelligence feeds from a variety of sources according to their organizations' needs in specific geographies, vertical industries, and protection types. It establishes a single source for the most relevant feeds that can automatically be translated into security protections to stop threats on Check Point gateways, leveraging the existing infrastructure and policies already established by an enterprise.
"We are extremely excited to launch the ThreatCloud IntelliStore. It's a groundbreaking collaboration that seeks to eliminate the current fragmentation of the threat intelligence market and is the first platform to automatically aggregate threat intelligence feeds for real prevention," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the only provider of customizable intelligence from various sources, we are proud and excited to offer ThreatCloud IntelliStore as an innovative solution and service that no other vendors offer."
ThreatCloud IntelliStore launches today with a number of best-of-breed intelligence partners, with more to follow:
ThreatCloud IntelliStore Partner Quotes:
- Adversary-focused intelligence based on advanced cyber security research.
"Check Point is changing the security landscape with ThreatCloud IntelliStore. This endeavor will provide organizations with the tools they need to build next generation intelligence-led security programs and it will shape the cyber security market as a whole," said John P. Watters, chief executive officer, iSIGHT Partners. "We are excited to make our high-fidelity intelligence available as the premium offering in ThreatCloud IntelliStore."
- Global provider of security technologies and services focused on identifying advanced threats and targeted attacks.
"We are thrilled to bring CrowdStrike's Intelligence Exchange (CSIX) into Check Point's innovative and market-leading arsenal of security technology," says George Kurtz, president/CEO & co-founder of CrowdStrike. "With CSIX, organizations can now leverage a real-time adversary attribution engine to maximize the value of existing security investments, gain immediate insight into targeted attacks, and prioritize and focus resources on the most critical threats."
- Global intelligence on Advanced Persistent Threats (APTs), malware, exploit drops and Distributed Denial-of-Service (DDoS).
"The unfortunate reality of today's advanced cybercrime attacks is that they are always evolving faster than organizations can keep up with them," said Rod Rasmussen, president and chief technology officer at IID. "ThreatCloud IntelliStore infrastructure provides a great platform to harness the power of IID's unique, high value, actionable and real-time threat intelligence to alert to new threats as they occur."
- Global intelligence developer of technical solutions to fight child sexual abuse material.
"The NetClean CSA Data Feed provides the world's largest list of signatures of known Child Sexual Abuse (CSA) images and videos identified by law enforcement working together with NetClean. Partnering with Check Point gives us a new and global reach that is vital to our strategy," said Christian Berg, chief executive officer of NetClean. "This is a ground breaking partnership as it's the first time we are offering access to our data base outside NetClean. Solving child sexual abuse is a collective responsibility and our partnership with Check Point is a perfect example of the collaboration needed."
- Finance-related intelligence on cybercrime threats such as fraud, phishing and DDoS.
"We're excited to be an inaugural provider in Check Point's ThreatCloud IntelliStore because it solves two big threat intelligence issues. First, every organization has different intelligence needs. ThreatCloud IntelliStore gives customers the flexibility to choose the feeds that best meet their needs," said John LaCour, founder and chief executive officer of PhishLabs. "Second, threat intelligence alone doesn't stop attacks. It needs to be applied. Via ThreatCloud IntelliStore, our high-fidelity cybercrime threat intelligence can be automatically applied to proactively block phishing, malware, DDoS, and other cyber-attacks."
- Human-validated intelligence for financial, government, and critical infrastructure companies.
"We are excited to be an initial cyber intelligence provider for Check Point's ThreatCloud IntelliStore. We believe our premium cyber intelligence feeds -- based on information collected from deep-web and darknet sources -- will offer great added benefit to Check Point customers and are very glad to be partners in this marketplace," said Assaf Keren, chief technology officer at SenseCy. "We are looking forward to a long and fruitful relationship between our two companies."
- Unified malware analysis and threat intelligence solution for accurate and context-rich intelligence.
"We are delighted to join Check Point's ThreatCloud IntelliStore initiative," said Dov Yoran, chief executive officer and co-founder at ThreatGRID. "Our premium content feeds, generated exclusively from our proprietary cloud-based malware analysis platform, empower customers to deploy context-rich, actionable threat intelligence to proactively defend against advanced and targeted attacks."
"By bringing together the best sources for threat intelligence, ThreatCloud IntelliStore provides organizations the flexibility to select the most appropriate data feeds through a singular system. This data in turn is fed into ThreatCloud and provides the protections organizations need across all of their security gateways," concluded Dor.
ThreatCloud IntelliStore is immediately available for all Check Point security gateways from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/.
For more information on ThreatCloud IntelliStore, visit: http://www.checkpoint.com/products/threatcloud/index.html.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 4, 2016 07:45 AM EDT Reads: 1,174
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 4, 2016 07:30 AM EDT Reads: 389
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 4, 2016 07:00 AM EDT Reads: 1,031
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 4, 2016 07:00 AM EDT Reads: 814
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 4, 2016 06:00 AM EDT Reads: 1,243
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 4, 2016 05:30 AM EDT Reads: 391
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 4, 2016 05:00 AM EDT Reads: 1,232
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 4, 2016 04:45 AM EDT Reads: 1,333
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 4, 2016 12:45 AM EDT Reads: 1,184
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 3, 2016 11:00 PM EDT Reads: 1,278
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 10:00 PM EDT Reads: 1,364
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 3, 2016 09:45 PM EDT Reads: 389
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
May. 3, 2016 08:45 PM EDT Reads: 1,294
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 3, 2016 08:45 PM EDT Reads: 996