Check Point Announces New Security Technologies for Advanced Threats
2011 ushered in a new breed of cyber threats that brought major organizations including Google, RSA, and Lockheed Martin to their knees and left many others searching for answers. These attacks were alarmingly sophisticated, effective, and elusive. Furthermore, the sophistication of these attacks indicates well organized crime syndicates and nation-states with deep pockets, which elicited the creation of a new industry term, the “advanced persistent threat” (APT). These threats and a new attacker profile have captivated the security industry’s attention as customers demand adequate protection tools.
It is no surprise then that entrepreneurial companies such as Critical Watch, FireEye, Bit9, and Click Security now offer solutions specifically designed to help customers defend against APTs. However, despite the widespread concern about APTs, IT organizations are still expected to block the thousands of traditional commodity threats that bombard their networks every day. Therefore, larger security vendors should develop new product functionality of their own to protect customers against APTs.
As multiple security companies attempt to combat these threats, a number of different security technologies and strategies have emerged such as “big data,” intelligence and analytics, anti-bot, advanced anti-malware, and APT detection solutions. While there remains much debate as to which technologies are most effective (or feasible) against advanced threats, there is the sense that every security vendor should be working diligently to block this attack vector.
Small, start-up companies have the benefit of a clear, specific goal such as APT detection and have the business agility to adjust strategies as the market demands. Too often, larger security companies are more reactive and will wait to identify best-of-breed product design and go-to-market strategies before developing a competing offering. Unfortunately, in the modern threat landscape, there is little time for major IT security companies to enjoy the luxury of a learning period.
That is why Check Point’s newest release of its R75 security operating system caught my attention. R75.40 offers compelling new security technologies such as ThreatCloud, Anti-Virus, and Anti-Bot protection. ThreatCloud is a collaborative network designed by Check Point to collect attack and attacker data from the company’s global install base of network gateways, sensors, third-party research, and internal research. This enables Check Point to dynamically deliver real-time updates to customers’ security gateways, thereby ensuring the highest level of protection possible. ThreatCloud also powers Check Point’s anti-bot and advanced anti-malware software blades. These blades utilize multi-tier APT detection and prevention capabilities to block threats that traditional IPS, firewall, and endpoint solutions cannot address.
R75.40 also offers a multitude of additional new features including data leakage prevention remediation and inbound SSL inspection. However, in a time when it seems that every company is vulnerable, Check Point’s advanced security technologies deliver valuable new functionality for customers.
Industry Analyst Chris Rodriguez can be found knee deep in spreadsheets or e-mailed here.
For additional analysis of this market, check out Frost & Sullivan’s annual global market study entitled Analysis of the Unified Threat Management (UTM) Market and the Impact of Convergence or learn more about Network Security.