Welcome!

News Feed Item

Check Point Pioneers Revolutionary Cyber Intelligence Marketplace: ThreatCloud IntelliStore

The Only Platform That Transforms Threat Intelligence From Multiple Sources Into Attack Prevention; Launches Today With Industry-Leading Partners

BARCELONA, SPAIN -- (Marketwired) -- 05/20/14 -- Check Point Experience 2014 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the launch and immediate availability of ThreatCloud IntelliStore, a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks. This new offering builds on Check Point's core security intelligence infrastructure: ThreatCloud™, the industry's largest real-time big data security infrastructure, which delivers threat data from a worldwide network of threat sensors.

Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring. Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals. Check Point's exciting advancement in security architecture, Software-defined Protection (SDP), makes threat prevention simple and flexible, quickly converting threat intelligence into real-time protections.

ThreatCloud IntelliStore launches with several industry-leading partners -- iSIGHT Partners, CrowdStrike, IID, NetClean, PhishLabs, SenseCy, and ThreatGRID to offer actionable threat intelligence to customers worldwide. Customers can select and customize intelligence feeds from a variety of sources according to their organizations' needs in specific geographies, vertical industries, and protection types. It establishes a single source for the most relevant feeds that can automatically be translated into security protections to stop threats on Check Point gateways, leveraging the existing infrastructure and policies already established by an enterprise.

"We are extremely excited to launch the ThreatCloud IntelliStore. It's a groundbreaking collaboration that seeks to eliminate the current fragmentation of the threat intelligence market and is the first platform to automatically aggregate threat intelligence feeds for real prevention," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the only provider of customizable intelligence from various sources, we are proud and excited to offer ThreatCloud IntelliStore as an innovative solution and service that no other vendors offer."

ThreatCloud IntelliStore launches today with a number of best-of-breed intelligence partners, with more to follow:

ThreatCloud IntelliStore Partner Quotes:

iSIGHT Partners

  • Adversary-focused intelligence based on advanced cyber security research.

"Check Point is changing the security landscape with ThreatCloud IntelliStore. This endeavor will provide organizations with the tools they need to build next generation intelligence-led security programs and it will shape the cyber security market as a whole," said John P. Watters, chief executive officer, iSIGHT Partners. "We are excited to make our high-fidelity intelligence available as the premium offering in ThreatCloud IntelliStore."

CrowdStrike

  • Global provider of security technologies and services focused on identifying advanced threats and targeted attacks.

"We are thrilled to bring CrowdStrike's Intelligence Exchange (CSIX) into Check Point's innovative and market-leading arsenal of security technology," says George Kurtz, president/CEO & co-founder of CrowdStrike. "With CSIX, organizations can now leverage a real-time adversary attribution engine to maximize the value of existing security investments, gain immediate insight into targeted attacks, and prioritize and focus resources on the most critical threats."

IID

  • Global intelligence on Advanced Persistent Threats (APTs), malware, exploit drops and Distributed Denial-of-Service (DDoS).

"The unfortunate reality of today's advanced cybercrime attacks is that they are always evolving faster than organizations can keep up with them," said Rod Rasmussen, president and chief technology officer at IID. "ThreatCloud IntelliStore infrastructure provides a great platform to harness the power of IID's unique, high value, actionable and real-time threat intelligence to alert to new threats as they occur."

NetClean

  • Global intelligence developer of technical solutions to fight child sexual abuse material.

"The NetClean CSA Data Feed provides the world's largest list of signatures of known Child Sexual Abuse (CSA) images and videos identified by law enforcement working together with NetClean. Partnering with Check Point gives us a new and global reach that is vital to our strategy," said Christian Berg, chief executive officer of NetClean. "This is a ground breaking partnership as it's the first time we are offering access to our data base outside NetClean. Solving child sexual abuse is a collective responsibility and our partnership with Check Point is a perfect example of the collaboration needed."

PhishLabs

  • Finance-related intelligence on cybercrime threats such as fraud, phishing and DDoS.

"We're excited to be an inaugural provider in Check Point's ThreatCloud IntelliStore because it solves two big threat intelligence issues. First, every organization has different intelligence needs. ThreatCloud IntelliStore gives customers the flexibility to choose the feeds that best meet their needs," said John LaCour, founder and chief executive officer of PhishLabs. "Second, threat intelligence alone doesn't stop attacks. It needs to be applied. Via ThreatCloud IntelliStore, our high-fidelity cybercrime threat intelligence can be automatically applied to proactively block phishing, malware, DDoS, and other cyber-attacks."

SenseCy

  • Human-validated intelligence for financial, government, and critical infrastructure companies.

"We are excited to be an initial cyber intelligence provider for Check Point's ThreatCloud IntelliStore. We believe our premium cyber intelligence feeds -- based on information collected from deep-web and darknet sources -- will offer great added benefit to Check Point customers and are very glad to be partners in this marketplace," said Assaf Keren, chief technology officer at SenseCy. "We are looking forward to a long and fruitful relationship between our two companies."

ThreatGRID

  • Unified malware analysis and threat intelligence solution for accurate and context-rich intelligence.

"We are delighted to join Check Point's ThreatCloud IntelliStore initiative," said Dov Yoran, chief executive officer and co-founder at ThreatGRID. "Our premium content feeds, generated exclusively from our proprietary cloud-based malware analysis platform, empower customers to deploy context-rich, actionable threat intelligence to proactively defend against advanced and targeted attacks."

"By bringing together the best sources for threat intelligence, ThreatCloud IntelliStore provides organizations the flexibility to select the most appropriate data feeds through a singular system. This data in turn is fed into ThreatCloud™ and provides the protections organizations need across all of their security gateways," concluded Dor.

ThreatCloud IntelliStore is immediately available for all Check Point security gateways from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/.

For more information on ThreatCloud IntelliStore, visit: http://www.checkpoint.com/products/threatcloud/index.html.

Follow Check Point via
Twitter: www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago. All major researchers estimate there will be tens of billions devices - comp...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
“We're a global managed hosting provider. Our core customer set is a U.S.-based customer that is looking to go global,” explained Adam Rogers, Managing Director at ANEXIA, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...