Click here to close now.




















Welcome!

News Feed Item

Check Point Pioneers Revolutionary Cyber Intelligence Marketplace: ThreatCloud IntelliStore

The Only Platform That Transforms Threat Intelligence From Multiple Sources Into Attack Prevention; Launches Today With Industry-Leading Partners

BARCELONA, SPAIN -- (Marketwired) -- 05/20/14 -- Check Point Experience 2014 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the launch and immediate availability of ThreatCloud IntelliStore, a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks. This new offering builds on Check Point's core security intelligence infrastructure: ThreatCloud™, the industry's largest real-time big data security infrastructure, which delivers threat data from a worldwide network of threat sensors.

Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring. Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals. Check Point's exciting advancement in security architecture, Software-defined Protection (SDP), makes threat prevention simple and flexible, quickly converting threat intelligence into real-time protections.

ThreatCloud IntelliStore launches with several industry-leading partners -- iSIGHT Partners, CrowdStrike, IID, NetClean, PhishLabs, SenseCy, and ThreatGRID to offer actionable threat intelligence to customers worldwide. Customers can select and customize intelligence feeds from a variety of sources according to their organizations' needs in specific geographies, vertical industries, and protection types. It establishes a single source for the most relevant feeds that can automatically be translated into security protections to stop threats on Check Point gateways, leveraging the existing infrastructure and policies already established by an enterprise.

"We are extremely excited to launch the ThreatCloud IntelliStore. It's a groundbreaking collaboration that seeks to eliminate the current fragmentation of the threat intelligence market and is the first platform to automatically aggregate threat intelligence feeds for real prevention," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the only provider of customizable intelligence from various sources, we are proud and excited to offer ThreatCloud IntelliStore as an innovative solution and service that no other vendors offer."

ThreatCloud IntelliStore launches today with a number of best-of-breed intelligence partners, with more to follow:

ThreatCloud IntelliStore Partner Quotes:

iSIGHT Partners

  • Adversary-focused intelligence based on advanced cyber security research.

"Check Point is changing the security landscape with ThreatCloud IntelliStore. This endeavor will provide organizations with the tools they need to build next generation intelligence-led security programs and it will shape the cyber security market as a whole," said John P. Watters, chief executive officer, iSIGHT Partners. "We are excited to make our high-fidelity intelligence available as the premium offering in ThreatCloud IntelliStore."

CrowdStrike

  • Global provider of security technologies and services focused on identifying advanced threats and targeted attacks.

"We are thrilled to bring CrowdStrike's Intelligence Exchange (CSIX) into Check Point's innovative and market-leading arsenal of security technology," says George Kurtz, president/CEO & co-founder of CrowdStrike. "With CSIX, organizations can now leverage a real-time adversary attribution engine to maximize the value of existing security investments, gain immediate insight into targeted attacks, and prioritize and focus resources on the most critical threats."

IID

  • Global intelligence on Advanced Persistent Threats (APTs), malware, exploit drops and Distributed Denial-of-Service (DDoS).

"The unfortunate reality of today's advanced cybercrime attacks is that they are always evolving faster than organizations can keep up with them," said Rod Rasmussen, president and chief technology officer at IID. "ThreatCloud IntelliStore infrastructure provides a great platform to harness the power of IID's unique, high value, actionable and real-time threat intelligence to alert to new threats as they occur."

NetClean

  • Global intelligence developer of technical solutions to fight child sexual abuse material.

"The NetClean CSA Data Feed provides the world's largest list of signatures of known Child Sexual Abuse (CSA) images and videos identified by law enforcement working together with NetClean. Partnering with Check Point gives us a new and global reach that is vital to our strategy," said Christian Berg, chief executive officer of NetClean. "This is a ground breaking partnership as it's the first time we are offering access to our data base outside NetClean. Solving child sexual abuse is a collective responsibility and our partnership with Check Point is a perfect example of the collaboration needed."

PhishLabs

  • Finance-related intelligence on cybercrime threats such as fraud, phishing and DDoS.

"We're excited to be an inaugural provider in Check Point's ThreatCloud IntelliStore because it solves two big threat intelligence issues. First, every organization has different intelligence needs. ThreatCloud IntelliStore gives customers the flexibility to choose the feeds that best meet their needs," said John LaCour, founder and chief executive officer of PhishLabs. "Second, threat intelligence alone doesn't stop attacks. It needs to be applied. Via ThreatCloud IntelliStore, our high-fidelity cybercrime threat intelligence can be automatically applied to proactively block phishing, malware, DDoS, and other cyber-attacks."

SenseCy

  • Human-validated intelligence for financial, government, and critical infrastructure companies.

"We are excited to be an initial cyber intelligence provider for Check Point's ThreatCloud IntelliStore. We believe our premium cyber intelligence feeds -- based on information collected from deep-web and darknet sources -- will offer great added benefit to Check Point customers and are very glad to be partners in this marketplace," said Assaf Keren, chief technology officer at SenseCy. "We are looking forward to a long and fruitful relationship between our two companies."

ThreatGRID

  • Unified malware analysis and threat intelligence solution for accurate and context-rich intelligence.

"We are delighted to join Check Point's ThreatCloud IntelliStore initiative," said Dov Yoran, chief executive officer and co-founder at ThreatGRID. "Our premium content feeds, generated exclusively from our proprietary cloud-based malware analysis platform, empower customers to deploy context-rich, actionable threat intelligence to proactively defend against advanced and targeted attacks."

"By bringing together the best sources for threat intelligence, ThreatCloud IntelliStore provides organizations the flexibility to select the most appropriate data feeds through a singular system. This data in turn is fed into ThreatCloud™ and provides the protections organizations need across all of their security gateways," concluded Dor.

ThreatCloud IntelliStore is immediately available for all Check Point security gateways from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/.

For more information on ThreatCloud IntelliStore, visit: http://www.checkpoint.com/products/threatcloud/index.html.

Follow Check Point via
Twitter: www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Learn how to solve the problem of keeping files in sync between multiple Docker containers. In his session at 16th Cloud Expo, Aaron Brongersma, Senior Infrastructure Engineer at Modulus, discussed using rsync, GlusterFS, EBS and Bit Torrent Sync. He broke down the tools that are needed to help create a seamless user experience. In the end, can we have an environment where we can easily move Docker containers, servers, and volumes without impacting our applications? He shared his results so yo...
Palerra, the cloud security automation company, announced enhanced support for Amazon AWS, allowing IT security and DevOps teams to automate activity and configuration monitoring, anomaly detection, and orchestrated remediation, thereby meeting compliance mandates within complex infrastructure deployments. "Monitoring and threat detection for AWS is a non-trivial task. While Amazon's flexible environment facilitates successful DevOps implementations, it adds another layer, which can become a ...
With SaaS use rampant across organizations, how can IT departments track company data and maintain security? More and more departments are commissioning their own solutions and bypassing IT. A cloud environment is amorphous and powerful, allowing you to set up solutions for all of your user needs: document sharing and collaboration, mobile access, e-mail, even industry-specific applications. In his session at 16th Cloud Expo, Shawn Mills, President and a founder of Green House Data, discussed h...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobi...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, analyzed a range of cloud offerings (IaaS, PaaS, SaaS) and discussed the benefits/challenges of migrating to each offe...
Chuck Piluso presented a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. Prior to Secure Infrastructure and Services, Mr. Piluso founded North American Telecommunication Corporation, a facilities-based Competitive Local Exchange Carrier licensed by the Public Service Commission in 10 states, serving as the company's chairman and president from 1997 to 2000. Between 1990 and 1997, Mr. Piluso served as chairman & founder of International Te...
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Providing the needed data for application development and testing is a huge headache for most organizations. The problems are often the same across companies - speed, quality, cost, and control. Provisioning data can take days or weeks, every time a refresh is required. Using dummy data leads to quality problems. Creating physical copies of large data sets and sending them to distributed teams of developers eats up expensive storage and bandwidth resources. And, all of these copies proliferating...