Developers: | Check Point Software Technologies |
Date of the premiere of the system: | 2017/04/21 |
Last Release Date: | 2018/01/26 |
Technology: | IaaS - Infrastructure as service, cybersecurity - Antiviruses, cybersecurity - the Antispam, the Firewall, cybersecurity - the Fraud detection system (fraud) |
Content |
Check Point Infinity is the consolidated security system for data protection in networks, clouds and mobile devices.
As a part of Check Point Infinity — three basic elements:
- the platform of security — use of the general platforms, information exchange about threats and open infrastructure for ensuring absolute security in all networks, in a cloud and on mobile devices;
- prevention of threats — blocking of the most difficult known and unknown attacks till their beginning;
- the consolidated system — uniform management, modular management of politicians and a possibility of determination of threats are implemented on a uniform control panel by security.
The uniform architecture of Check Point Infinity allows to control the security level to protect all IT processes and to manage them as uniform architecture.
2018
Release of a line of solutions of CloudGuard
The Check Point Software Technologies company in February, 2018 provided a line of solutions of CloudGuard for protection of the organizations against cyber attacks of Fifth generation to cloud applicaions and infrastructure and also CloudGuard SaaS (the former name vSEC) for ensuring protection of the enterprises against the attacks on the SaaS-applications (Software-as-a-service).
CloudGuard is a part of infrastructure of Check Point Infinity. Read more here.
Infinity Total Protection
The Check Point Software Technologies company in January, 2018 provided Infinity Total Protection — a security model which allows the organizations to prevent cyber attacks of Gen V. At the heart of model — components of architecture Check Point Infinity thanks to which the solution provides the high level of protection and also helps to reduce costs due to consolidation of elements of security.
Check Point Infinity combines possibilities of prevention of threats in real time, data exchange of Threat intelligence and ensuring advanced security in networks, a cloud and mobile devices.
In the whole Infinity Total Protection — it is model of security which all elements can be received on a subscription for a year and by the number of users in the company. The solution includes protection of network, hardware and the software, a full range of protection of end devices, a cloud and mobile platforms, prevention of threats of "zero day", a uniform control panel and support 24/7. Thanks to it subscribers have an opportunity of prevention of threats in all corporate environments of the company: physical, cloud or mobile.
Check Point Infinity Total Protection provides a broad set of technologies of protection against advanced and unknown threats which includes:
- Prevention of threats in real time: protection against APT and unknown malware of "zero day" by means of sandboxes technology in real time; protection against programs racketeers; an anti-bot technology based on the integrated intelligence information about the threats from a cloud received in real time and machine learning for identification of new threats.
- The optimized network security: the firewall, an intrusion prevention system and control of applications which are supported by networks of any sizes in a private and public cloud — from small offices to the international corporations.
- Security in a cloud: the optimized system of prevention of threats in a public, private and hybrid cloud and in software-defined networks with microsegmentation which provides control of all traffic in a cloud.
- Mobile security: protection against the malware for iOS and Android, identification of network fraud, safe containers, data protection and enciphering of documents and integration into EMM solutions (Enterprise Mobility Management).
- Data protection: protection against the known and unknown programs racketeers, data security provision and enciphering of documents, protection of browsers, completely integrated protection of end devices and the analysis of threats.
- The integrated security and management of threats: the unified environment of security management supporting control of a set of different devices, domains and administrators which provides unobstructed sight of all threats, their correlation and the analysis of the attacks, the instrument of creation of reports for check of compliance to politicians and audit.
2017: Release of Check Point Infinity
On April 21, 2017 the Check Point Software Technologies company announced release of technology of cyber security of Check Point Infinity.
Check Point Infinity is the culmination of our vision of the systems of cyber security integrating the high level of security, analytics and management in network, a cloud and on mobile devices. This architecture is designed to help the organizations to go in step with dynamically developing information technologies. The principle is very simple — the uniform architecture of security will ensure safety of business in any environment, providing productive exploitation of IT[1]. Vasily Dyagilev, the chief representative of Check Point Software Technologies company in Russia and the CIS |