RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Odo Security

Company

Content

Owners

Odo Securitysoftware developer for information security. Products of the company implement the Zero Trust model which designates total absence of trust to someone – even to users in perimeter. The model means that each user or the device should confirm the data every time when they request access to any resource in or outside network.

History

2020: Check Point Software Technologies купила Odo Security

On September 17, 2020 Check Point Software Technologies announced Odo Security acquisition. The transaction is going to be closed within several days. The financial component of the agreement of the company was not opened. According to the Israeli media, it is about the amount of $30 million.

By September, 2020 in Odo Security 20 people among whom there are three founders of a startup — Orr Zilberman, Gilad Steinberg and Noah Zilberman work. They will pass to work  into Check Point. Before sale Odo Security attracted in total $5 million investments, including from    TLV Partners and Magma Ventures funds.

Check Point purchased software developer for secure remote access to any application

According to in Odo Security, cybersecurity administrators, using solutions of the company, receive the improved control of information security of the organization, including the complete control magazine of activity of users.  Check Point integrates Odo Security technology into the architecture of Infinity and the concept of SASE (peripheral service of secure access).

File:Aquote1.png
Check Point will provide the consolidated solution which will help the companies to connect safely any number of remote workers to something from any place, making work from the house very easier more safely — told the company, commenting on the transaction.
File:Aquote2.png

Odo Security listed three main scenarios of use of technology of the company:

  • replacement of VPN;
  • ensuring access to a system to third-party users;
  • ensuring access to a system to developers.[1]

Notes