|By Marketwired .||
|May 20, 2014 04:17 AM EDT||
BARCELONA, SPAIN -- (Marketwired) -- 05/20/14 -- Check Point Experience 2014 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the launch and immediate availability of ThreatCloud IntelliStore, a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks. This new offering builds on Check Point's core security intelligence infrastructure: ThreatCloud, the industry's largest real-time big data security infrastructure, which delivers threat data from a worldwide network of threat sensors.
Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring. Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals. Check Point's exciting advancement in security architecture, Software-defined Protection (SDP), makes threat prevention simple and flexible, quickly converting threat intelligence into real-time protections.
ThreatCloud IntelliStore launches with several industry-leading partners -- iSIGHT Partners, CrowdStrike, IID, NetClean, PhishLabs, SenseCy, and ThreatGRID to offer actionable threat intelligence to customers worldwide. Customers can select and customize intelligence feeds from a variety of sources according to their organizations' needs in specific geographies, vertical industries, and protection types. It establishes a single source for the most relevant feeds that can automatically be translated into security protections to stop threats on Check Point gateways, leveraging the existing infrastructure and policies already established by an enterprise.
"We are extremely excited to launch the ThreatCloud IntelliStore. It's a groundbreaking collaboration that seeks to eliminate the current fragmentation of the threat intelligence market and is the first platform to automatically aggregate threat intelligence feeds for real prevention," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the only provider of customizable intelligence from various sources, we are proud and excited to offer ThreatCloud IntelliStore as an innovative solution and service that no other vendors offer."
ThreatCloud IntelliStore launches today with a number of best-of-breed intelligence partners, with more to follow:
ThreatCloud IntelliStore Partner Quotes:
- Adversary-focused intelligence based on advanced cyber security research.
"Check Point is changing the security landscape with ThreatCloud IntelliStore. This endeavor will provide organizations with the tools they need to build next generation intelligence-led security programs and it will shape the cyber security market as a whole," said John P. Watters, chief executive officer, iSIGHT Partners. "We are excited to make our high-fidelity intelligence available as the premium offering in ThreatCloud IntelliStore."
- Global provider of security technologies and services focused on identifying advanced threats and targeted attacks.
"We are thrilled to bring CrowdStrike's Intelligence Exchange (CSIX) into Check Point's innovative and market-leading arsenal of security technology," says George Kurtz, president/CEO & co-founder of CrowdStrike. "With CSIX, organizations can now leverage a real-time adversary attribution engine to maximize the value of existing security investments, gain immediate insight into targeted attacks, and prioritize and focus resources on the most critical threats."
- Global intelligence on Advanced Persistent Threats (APTs), malware, exploit drops and Distributed Denial-of-Service (DDoS).
"The unfortunate reality of today's advanced cybercrime attacks is that they are always evolving faster than organizations can keep up with them," said Rod Rasmussen, president and chief technology officer at IID. "ThreatCloud IntelliStore infrastructure provides a great platform to harness the power of IID's unique, high value, actionable and real-time threat intelligence to alert to new threats as they occur."
- Global intelligence developer of technical solutions to fight child sexual abuse material.
"The NetClean CSA Data Feed provides the world's largest list of signatures of known Child Sexual Abuse (CSA) images and videos identified by law enforcement working together with NetClean. Partnering with Check Point gives us a new and global reach that is vital to our strategy," said Christian Berg, chief executive officer of NetClean. "This is a ground breaking partnership as it's the first time we are offering access to our data base outside NetClean. Solving child sexual abuse is a collective responsibility and our partnership with Check Point is a perfect example of the collaboration needed."
- Finance-related intelligence on cybercrime threats such as fraud, phishing and DDoS.
"We're excited to be an inaugural provider in Check Point's ThreatCloud IntelliStore because it solves two big threat intelligence issues. First, every organization has different intelligence needs. ThreatCloud IntelliStore gives customers the flexibility to choose the feeds that best meet their needs," said John LaCour, founder and chief executive officer of PhishLabs. "Second, threat intelligence alone doesn't stop attacks. It needs to be applied. Via ThreatCloud IntelliStore, our high-fidelity cybercrime threat intelligence can be automatically applied to proactively block phishing, malware, DDoS, and other cyber-attacks."
- Human-validated intelligence for financial, government, and critical infrastructure companies.
"We are excited to be an initial cyber intelligence provider for Check Point's ThreatCloud IntelliStore. We believe our premium cyber intelligence feeds -- based on information collected from deep-web and darknet sources -- will offer great added benefit to Check Point customers and are very glad to be partners in this marketplace," said Assaf Keren, chief technology officer at SenseCy. "We are looking forward to a long and fruitful relationship between our two companies."
- Unified malware analysis and threat intelligence solution for accurate and context-rich intelligence.
"We are delighted to join Check Point's ThreatCloud IntelliStore initiative," said Dov Yoran, chief executive officer and co-founder at ThreatGRID. "Our premium content feeds, generated exclusively from our proprietary cloud-based malware analysis platform, empower customers to deploy context-rich, actionable threat intelligence to proactively defend against advanced and targeted attacks."
"By bringing together the best sources for threat intelligence, ThreatCloud IntelliStore provides organizations the flexibility to select the most appropriate data feeds through a singular system. This data in turn is fed into ThreatCloud and provides the protections organizations need across all of their security gateways," concluded Dor.
ThreatCloud IntelliStore is immediately available for all Check Point security gateways from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/.
For more information on ThreatCloud IntelliStore, visit: http://www.checkpoint.com/products/threatcloud/index.html.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations might...
Mar. 29, 2017 06:30 AM EDT Reads: 6,244
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem" ...
Mar. 29, 2017 06:00 AM EDT Reads: 9,030
In his session at 20th Cloud Expo, Scott Davis, CTO of Embotics, will discuss how automation can provide the dynamic management required to cost-effectively deliver microservices and container solutions at scale. He will discuss how flexible automation is the key to effectively bridging and seamlessly coordinating both IT and developer needs for component orchestration across disparate clouds – an increasingly important requirement at today’s multi-cloud enterprise.
Mar. 29, 2017 06:00 AM EDT Reads: 2,809
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, demonstrated the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He discussed from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transi...
Mar. 29, 2017 05:00 AM EDT Reads: 6,403
All organizations that did not originate this moment have a pre-existing culture as well as legacy technology and processes that can be more or less amenable to DevOps implementation. That organizational culture is influenced by the personalities and management styles of Executive Management, the wider culture in which the organization is situated, and the personalities of key team members at all levels of the organization. This culture and entrenched interests usually throw a wrench in the work...
Mar. 29, 2017 04:00 AM EDT Reads: 3,175
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Mar. 29, 2017 04:00 AM EDT Reads: 15,078
Keeping pace with advancements in software delivery processes and tooling is taxing even for the most proficient organizations. Point tools, platforms, open source and the increasing adoption of private and public cloud services requires strong engineering rigor - all in the face of developer demands to use the tools of choice. As Agile has settled in as a mainstream practice, now DevOps has emerged as the next wave to improve software delivery speed and output. To make DevOps work, organization...
Mar. 29, 2017 03:45 AM EDT Reads: 2,130
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Mar. 29, 2017 03:30 AM EDT Reads: 3,349
Virtualization over the past years has become a key strategy for IT to acquire multi-tenancy, increase utilization, develop elasticity and improve security. And virtual machines (VMs) are quickly becoming a main vehicle for developing and deploying applications. The introduction of containers seems to be bringing another and perhaps overlapped solution for achieving the same above-mentioned benefits. Are a container and a virtual machine fundamentally the same or different? And how? Is one techn...
Mar. 29, 2017 03:30 AM EDT Reads: 3,209
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Mar. 29, 2017 03:30 AM EDT Reads: 11,751
My team embarked on building a data lake for our sales and marketing data to better understand customer journeys. This required building a hybrid data pipeline to connect our cloud CRM with the new Hadoop Data Lake. One challenge is that IT was not in a position to provide support until we proved value and marketing did not have the experience, so we embarked on the journey ourselves within the product marketing team for our line of business within Progress. In his session at @BigDataExpo, Sum...
Mar. 29, 2017 03:30 AM EDT Reads: 3,212
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Mar. 29, 2017 03:00 AM EDT Reads: 6,068
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
Mar. 29, 2017 01:45 AM EDT Reads: 5,440
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Mar. 29, 2017 01:15 AM EDT Reads: 9,281
DevOps is often described as a combination of technology and culture. Without both, DevOps isn't complete. However, applying the culture to outdated technology is a recipe for disaster; as response times grow and connections between teams are delayed by technology, the culture will die. A Nutanix Enterprise Cloud has many benefits that provide the needed base for a true DevOps paradigm.
Mar. 29, 2017 01:15 AM EDT Reads: 2,486