Story image

Check Point expands portfolio to continue fight against Gen V cyber attacks

13 Mar 2018

Check Point has been busy crafting a number of security solutions for its global market in recent months, as the company moves to create a comprehensive portfolio spanning Security Operations Centres to Gen V cyber attack prevention.

Its latest partnership brings a 24x7 Security Operations Centre (SOC) to IT system monitoring in partnership with Australian-based firm IPSec.  Together, IPSec Guard and Check Point’s global Incident Response team will provide SOC services for all businesses after an incident occurs.

The partnership also gives customers access to LogRhythm’s SIEM log management and correlation engine.

“The difference between a minor inconvenience and a catastrophic failure of an organisations’ infrastructure can fall down to a matter of seconds if a breach goes undetected”, comments Check Point’s regional manager of Australia and New Zealand, Scott McKinnel.

Last month Check Point also doubled down on its efforts to provide what it calls ‘Gen V’ cyber protection. Its CloudGuard product family was released to the enterprise market to protect against attacks on Software-as-a-Service applications such as Microsoft Office 365, Google G-Suite, Slack, Dropbox and others.

Check Point defines ‘Gen V’ cyber attacks as ‘large scale and fast moving attacks across mobile, cloud and on-premise networks.  These sophisticated attacks easily bypass the conventional, static detection-based defenses being used by most organisations today’.  

“Security is continually cited as a key barrier to wide-spread enterprise cloud adoption,” comments Check Point CEO Gil Shwed.

The company says there has been an increase in multi-vector attacks against cloud workloads as well as account hijacking - even some cloud applications can hide malware.

According to Check Point research, half of all breaches of enterprise SaaS applications are the result of account hijacks.

In January, Check Point released Infinity Total Protection, a security consumption model that utilises check Point Infinity Architecture components to protect against Gen V attacks.

Enterprises need to protect themselves from sophisticated—and dangerous—attacks on all fronts: network, endpoint, mobile and cloud,” comments Enterprise Strategy Group’s Doug Cahill, group director and senior cybersecurity analyst.

“These latest, fifth generation attacks (Gen V) require a comprehensive fifth generation cyber-security solution to keep critical business data safe from potentially devastating attacks across the entire enterprise.”

In the same month, the company launched three more Smart-1 security management appliances for unified policy management and advanced logging for real-time analysis and control.

The company says the new appliances boost performance up to eight times more than previous models.

The new Smart-1 appliance also deliver management storage capacity of up to 48TB, logging rates of up to 100,000 logs/sec.

Mozilla launches Firefox Send, an encrypted file transfer service
Mozille Firefox has launched a free encrypted file transfer service that allows people to securely share files from any web browser – not just Firefox.
Ransomware’s decline equals cryptomining’s rise
ESET’s Security Days Conference recently took place to go over the current threat environment and what to look out for next.
IoT and DDoS attacks: A match made in heaven
A10 Network’s Adrian Taylor uses findings from a number of reports to illustrate his point that advances in technology are facilitating cybercrime.
ForgeRock launches Sandbox-as-a-Service to facilitate compliance
The cloud-based testing environment for APIs enables banks to accelerate compliance with Open Banking and PSD2 deadlines.
Cloud application attacks in Q1 up by 65% - Proofpoint
Proofpoint found that the education sector was the most targeted of both brute-force and sophisticated phishing attempts.
Singapore firm to launch borderless open data sharing platform
Singapore-based Ocean Protocol, a decentralised data exchange that promotes data sharing, has revealed details of what could be the kickstart to a global and borderless data economy.
Huawei picks up accolades for software-defined camera ecosystem
"The company's software defined capabilities enable it to future-proof its camera ecosystem and greatly lower the total cost of ownership (TCO), as its single camera system is applicable to a variety of application use cases."
Barracuda expands MSP security offerings with RMM acquisition
Managed Workplace delivers an RMM platform with security tools and services, such as site security assessments, Office 365 account management, and integrated third-party antivirus.