[an error occurred while processing the directive]
RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Check Point ThreatCloud

Product
Developers: Check Point Software Technologies
Date of the premiere of the system: April, 2012
Technology: Firewall

On April 23, 2012 Check Point Software Technologies provided Check Point ThreatCloud. Of which this technology data collection from a unique global network of sensors of detection of threats and dissemination of this information on security gateways around the world is the cornerstone. Check Point ThreatCloud analyzes more than 250 million addresses regarding detection of bots, 4.5 million signatures of the malware and 300 thousand infected websites. This service is the cornerstone of a new program blade of Anti-Bot and an advanced blade of Antivirus. The updated information on threats is transferred directly to gateways of clients, allowing to take timely security measures against new threats.

Hackers use the malware, botnets and other opportunities of invasions for the attacks on several websites or the organizations to increase the probability of success of cracking. Nevertheless, more than a half of violations of security remain unknown because information exchange about potential threats between the companies is not adjusted. Effectively to resist to modern threats and to provide data protection, the enterprises should make joint efforts for the organization of similar exchange.

Check Point ThreatCloud is dynamically updated on the basis of the data obtained from a global network of sensors of detection of threats. The companies can transfer to ThreatCloud service of data on the revealed threats. The updated information is transferred then to gateways of safety of clients, raising extent of their protection. At detection of new bots or other malware in the computer network of the organization, its identification data (The IP address, the web address and the record DNS) are sent to ThreatCloud then this information in read seconds is sent to partners and clients worldwide. ThreatCloud uses also other sources of data on threats: gateways of security of the equipment of the companies, information from the Check Point research group and industry web channels of the malware.

"ThreatCloud expands an arsenal of means of protecting, providing to clients much more information on the attacks, than they had still — Dorit Dor, the vice president for products of Check Point Software Technologies company says. — This technology is based on world cooperation and aimed at increase in power, quality and high-speed performance of detection of threats of network security. It allows clients to react quickly to the attacks to which other companies were already plunged and to timely take preventive measures on protection of the Internet gateways".
"We observe the growing interest in Internet protection at many companies and rather small amount of resources using which the companies can obtain necessary data on security — John Grady, the senior analyst, the specialist in products of security of IDC Research company says. — Irrespective of whether the company was exposed already to the attacks or just wants to take measures for ensuring data protection, program blades of Check Point based on ThreatCloud technology is a promising solution which will allow clients to apply around the world developments of Check Point in their own network environment".

The Check Point company releases the new program blade of Anti-Bot using ThreatCloud service and allowing to detect bots them to block and to prevent potential damage. Multi-tier ThreatSpect™ — the module of detection of bots which analyzes traffic on each gateway is a part of a blade. At detection of a bot the channel between dangerous the host node and the removed operator is instantly blocked.

Other powerful component of the complete solution Check Point for prevention of threats is the advanced program blade of Antivirus which is also based on ThreatCloud technology and finding out more than in 300 times more of signatures than its previous versions. It allows to limit access to the infected websites and to prevent penetration of unknown viruses into network of the organization. Using an intuitive dashboard clients can quickly analyze threats of the attacks of bots and other malware, fixing existence of threats, the related risk level and possible damage of security of the company – for example data loss or distribution of fraudulent spam. The combination of program blades of Anti-Bot and Antivirus is the single powerful solution for prevention of threats protecting the companies from the newest technologies of cyberterrorism.

New and advanced program blades are included in the updated solution Check Point R75.40 in which Check Point GAiA — the unified operating system compatible to all available gateways of security and program blades is also presented. Thanks to existence more than 100 new features of security of R75.40 provide to clients reliable protection and the optimized management.