RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Check Point R - Security Management Platform

Product
Developers: Check Point Software Technologies
Date of the premiere of the system: 2016
Last Release Date: 2021/07/16
Technology: SaaS - Software as service,  IB - Firewalls

Content

Main articles:

Check Point R80 is a security management platform. R80 is the fruit of more than three years of research and development. The platform is based on technologies that enable IT managers to consolidate all their security environments in one place and create the conditions for improved automation of protection tasks.

2021: Check Point R81.10

July 16, 2021 the company Check Point Software Technologies announced the expansion of the capabilities of the Quantum Hybrid Data Center Security solution. Upgrades provide hybrid protection DPC with automated operations and a scalable platform. ON With Check Point R81.10, Check Point Quantum Maestro 175 and the device, Check Point Quantum Smart-1 Security Management organizations can move workloads between data centers and. cloud

Check Point R81.10

According to the company, more companies are introducing the opportunity to work remotely - and are beginning to use cloud technologies more actively. But distributed business applications across data centers and multiple clouds make it difficult for security teams to manage distributed cloud systems centrally. Another factor that complicates digital transformation is the reliability requirements for connecting users to the data center and cloud from anywhere. As the volume of traffic between data centers and the cloud has increased, organizations have to scale IT on demand and provide fast services and applications so that performance remains appropriate without compromising security.

File:Aquote1.png
With the introduction of distributed SaaS applications and the need to provide more services to employees working remotely, today's data centers are quickly migrating to a hybrid architecture that supports both local and cloud operations.

told Frank Dickson, IDC vice president of security and reliability projects
File:Aquote2.png

File:Aquote1.png
Security threats for July 2021 are becoming more common and only more complex, so their automatic prevention and application of security policies are key measures against the backdrop of an expanded threat landscape. Check Point Software for hybrid data center security optimizes performance and scalability without additional complexity.

noted Itai Greenberg, Vice President, Product Management, Check Point Software Technologies
File:Aquote2.png

Check Point Software Comprehensive Portfolio Capabilities for Hybrid Data Center Security:

  • Appropriate level of threat prevention for systems in the data center. With Check Point R81.10 software, companies will receive protection that includes more than 60 AI and Machine Learning systems to block potential threats as of July 2021. These systems are suitable for any network. All gateways are automatically updated to fully protect your organization from zero-day threats.
  • Optimized performance for day-to-day operations. Check Point R81.10 optimizes the efficiency of routine operations and allows you to implement a unified Check Point Software security management system throughout the network, including browser-level protection. This deployment does not require significant time, continuous maintenance, or manual updates.
  • Automated and scalable data center operations. Using the Check Point Maestro management system, you can configure one Quantum gateway in a few minutes so that its power and performance becomes 52 gateways. Check Point Quantum Maestro 175 supports a 3.2 Tb/s matrix bandwidth and doubles the number of 10-Gb Ethernet ports for efficient hyperscale management.
  • Scalable security management. Four Quantum Smart-1 Security Management devices from Check Point Software will allow security administrators to scale managed gateways on demand, optimize their power in half in five minutes. Security management platforms provide complete visibility into threats and optimize system resilience.

Today's data centers and networks require a flexible hybrid cloud security architecture with automation and artificial intelligence (AI) technology. This allows you to scale threat prevention performance on demand with a single management system in both the local environment and the cloud.

2020: Availability as Cloud Service

Check Point Software Technologies Ltd., a provider of solutions in the field, cyber security announced that the R80 centralized security software solution will now be available as a. cloud service This gives customers the fastest way to deploy and manage Check Point security across the entire network structure - web browser without having to spend time deploying, maintaining, and upgrading the system manually. This became known on February 13, 2020.

Availability as a cloud service

The Security Management-as-a-Service update of the R80 complements the set of Check Point Fast Track Network Security solutions for protection, scalability, and ease of deployment and management. R80 Security MaaS visualizes the security of your entire IT infrastructure on a custom dashboard. This enables you to manage complex environments more efficiently and reduce transaction times by up to 60% over other solutions.

R80 is a comprehensive, centralized security software for local and cloud environments with over 160 technology integrations. The latest version of the R80.40 has more than 100 additional features to enhance protection, optimize workflows, and improve performance. R80 Security MaaS provides:

  • Manage all Check Point products from a cloud that comes directly from a web browser
  • fully automated updates that ensure the constant use of modern security tools;
  • On-demand expansion to seamlessly connect more gateways without physical restrictions
  • Lack of maintenance, making environments safer, more manageable, and more compatible
  • Unlimited storage and access to system logs.

File:Aquote1.png
R80 Management-as-a-Service accelerates and simplifies the company's security management processes, eliminating the need for manual maintenance and upgrades while allowing systems to scale on demand. R80, in conjunction with Fast Track Network Security gateways, provides customers with quick access to hyperscaled, high-performance network security while improving operations
notes Itai Greenberg, vice president of product management at Check Point
File:Aquote2.png

Fast Track Network Security includes five Quantum Security Gateways equipped with ThreatCloud and SandBlast Zero-Day Protection. The updated line starts with the 3600 model for branch offices and ends with the 16000 Turbo Hyperscale gateway model, aimed at large organizations. The latest model has a Gen V Threat Prevention bandwidth of 17.6 Gb/s, which is 2 times faster than competing high-end gateways, with 2 times less energy used.

Fast Track Network Security, combined with added security gateways and cloud-enabled R80.40 software, enables companies to leverage leading, fully scalable, and easy-to-manage security against emerging fifth-generation cyber threats.

2019

R80.30 Threat Extraction with patented SSL/TLS verification

In May 2019, Chief Executive Officer and Founder of Check Gil Swede announced the release of R80.30 software with the industry's first proactive document monitoring (Threat Extraction) technology for websites and patent-pending TLS/SSL verification capabilities .

According to developers, R80.30 with Threat Extraction technology for websites provides practical prevention of advanced threats. R80.30 Gen V Threat Prevention protects users from malicious web downloads in real time. Threat Extraction removes exploited content, restores files to eliminate potential threats, and quickly delivers clean content to the user. In addition, the Threat Prevention dashboard provides complete transparency to networks, mobile devices, and endpoints.

The latest release of R80.30 includes patented TLS protocols that provide advanced SSL verification. The technology allows enterprises to quickly verify network traffic encrypted using SSL, avoid cyber attack techniques such as server name manipulation (SNI), and ensure the right balance between security and privacy. Given that 90% of web traffic is encrypted, Check Point's innovations in SSL verification affect enterprises around the world.

In general, the R80 features more than 160 technological integrations and 100 new functions.

Integration with Microsoft AIP

On May 29, 2019, it became known that Check Point Software Technologies, a provider of cybersecurity solutions worldwide, announced the integration of the Check Point R80 SmartConsole device with Microsoft Azure Information Protection (AIP) to prevent the leakage of sensitive business data.

By integrating the advanced security policy set from Check Point with Microsoft AIP file classification and protection, enterprises can retain their business data and IP security no matter how they are used. The solution prevents employees of organizations from accidentally sending sensitive data outside the corporate network in Microsoft Outlook and Exchange applications and extends the full protection against data breaches for popular web services such as Gmail, Dropbox, FTP and Box.

According to a 2019 report by Verizon Data Breach Investigations, 35% of the nearly 42,000 violations analyzed resulted from human error. Integration of Check Point and Microsoft AIP solutions prevents accidental violations. Security IT departments and organizations can now monitor and control disclosure of sensitive information and take corrective action to prevent data loss or misuse. This combination provides Check Point and Microsoft customers with a truly comprehensive data loss prevention solution that consistently ensures that appropriate data management actions are taken regardless of where they are stored and to whom they are transferred.

Vasily Diaghilev commented:

{{quote 'author = Vasily Diaghilev, Head of Check Point Software Technologies Ltd. in Russia and CIS countries|User error is one of the main reasons for hacking data that exposes organizations to reputational damage and fines by regulatory authorities for violation of compliance regimes. Businesses need a way to protect their sensitive data from accidental violations without compromising individual and enterprise performance. Integration between Check Point and Microsoft AIP securely protects enterprise data from hacking through email, web, and FTP services, and provides IT and security departments with the tools they need to monitor the presence of sensitive data on networks and quickly resolve any incidents. }}

When users create or process files with sensitive data, Microsoft AIP recognizes the confidential nature of the file and suggests labeling the document as "Confidential Financial Data." With this label, no user in the organization can accidentally send the file to an external recipient or location outside the corporate network, because integration with Check Point will block any incorrect distribution and notify the user. The system also informs users of the correct transmission of data, helping to prevent future incidents. Microsoft AIP privacy labels can also be automatically applied to documents and files based on IT administrator rules and conditions, and can detect and protect sensitive files using Check Point gateways and the R80 SmartConsole management console.

Because integration between Microsoft AIP and Check Point enables data enforcement at the network level, IT and security can monitor and monitor document sharing and immediately take corrective action to prevent data loss.

2016: Unified approach to infrastructure security

The proliferation of personal devices and the interdependence of the digital world economy are global trends that make it possible to improve the performance of our work tasks. At the same time, they set tasks for business to combat constantly evolving threats. According to information for May 2016, the R80 platform helps meet this need by offering a unified security approach that will consolidate all aspects of protection, making them more efficient and adaptive to implementing powerful security solutions. This is achieved in three key ways:

  • Implementation of the "one console - one policy" principle. The R80 platform provides continuous, powerful protection for the entire infrastructure with a single perimeter management console, data center branches, and cloud downloads. This allows you to streamline processes and gain improved visibility into policy administration, including allowing multiple administrators to work with the same policy without a management system conflict.
  • Improve security according to business processes and network architectures. R80 platform technologies help security teams keep pace with changing policies by segmenting into managed sections and aligning security with IT processes. They also help improve security self-service for business owners and free key employees to meet strategic IB challenges.
  • Integrate threat management for a common vision of risk across the network. With the R80 platform, security teams will have full visibility into the protection state, they will be able to respond faster to new attacks. Monitor, register, report, and compare events in a single, visible, and customizable dashboard. This will allow security teams not only to find and solve the security problem in two clicks, but also to create specialized reports for everyone - from key business leaders to technology partners.

2013: Check Point R77

Check Point R77 is a new version of the Software Blade architecture. The R77 features more than 50 new features, including the new ThreatCloud Emulation service, Check Point HyperSpect performance technology, Check Point Compliance software blade, new centralized device management tools, an improved user authentication system based on RADIUS and IF-MAP integration, as well as an improved unified operating system Check Point GAiA.

Check Point Software Technologies Ltd announced the release of a new software solution on August 29, 2013.

Check Point R77 includes proactive security, compliance monitoring, and performance enhancements for existing security gateways.

"To protect their networks, organizations must at least one step ahead of" bad guys. " R77 provides the most advanced platform and security tools for this. With increased performance, cloud-based threat emulation technology, and automated compliance monitoring, the software blade architecture is the most comprehensive of all tiered security solutions available today, "said Dorit Dor, Vice President, Check Point Software Technologies
.
  • Check Point ThreatCloud Emulation service - This service prevents the infection of computer systems from previously unknown exploits (zero-day exploits), new varieties of malware, targeted attacks and threats of increased complexity (Advanced Persistent Threat, APT). As part of Check Point's leading multi-level threat prevention solution, ThreatCloud Emulation performs online analysis of suspicious files, simulates their execution to detect malicious features, and instantly blocks detected malware in email attachments, downloads, and web content. Then the information about the attack is sent to the Check Point network and the cloud ThreatCloud service to provide automatic protection.

ThreatCloud Emulation, which the company first announced in February 2013, is now offered as a new cloud service based on a global monthly quota of scanned files within the organization. The monthly quota is distributed across all enterprise network security gateways and is flexible to deploy. The quota may increase depending on the intensity of use and the rate of growth. The ThreatCloud Emulation service is also available through Private Cloud Emulation.

  • Check Point HyperSpect is an intelligent, adaptive content analytics tool that optimizes hardware usage with a variety of enhancements and acceleration tools, including multi-threading technologies. HyperSpect delivers significant performance gains - up to 50% faster actual performance on all modern platforms.
  • Check Point Compliance - first introduced in March 2013. This compliance monitoring solution is the first to integrate with next-generation firewalls and is fully automated, based on an extensive library of regulatory requirements and more than 300 advanced security practices. Check Point Compliance simplifies compliance with external security standards and internal regulations with instant notifications of policy changes, continuous review of all Check Point software blades, and practical recommendations for optimizing compliance and security.

  • New integrated means of centralized device management. Organizations can efficiently maintain multiple security gateways by leveraging new centralized device management capabilities. New SmartDashboard Control Panel features help eliminate configuration errors in complex environments and reduce management and support costs for security systems. The implementation of these features does not require the purchase of an additional license.
  • Check Point GAiA is an enhanced unified security operating system. It enables faster updates because it reduces downtime by 90% and provides a web interface that is more user-friendly for security administrators.
  • Integrated authentication system. More accurate user authentication on systems other than Windows is achieved through the integration of RADIUS and IF-MAP.
  • Improved licensing. R77 provides licensing transparency by automatically querying licenses and synchronizing data between Check Point UserCenter and the Security Control Panel.


Check Point clients can perform a free upgrade to R77.

The cost of the service ThreatCloud Emulation is for the organization from $500 for 10 thousand verified files per month.

2011: Check Point R75

Check Point R75 is a network security package based on the Software Blade Architecture. Check Point R75 is the first version designed to develop a new product line - 3D Security of Check Point, which defines security as a business process that combines policies, personnel and requirements to provide more reliable protection at all levels of security.

Check Point R75 introduces four new software blades: Application Control, Identity Awareness, Data Loss Prevention and Mobile Access. This version enables companies to gain greater transparency and control over data, Web 2.0 applications, and mobile access by providing multi-faceted security in one integrated solution.

The new network security concept was recognized after the Stuxnet virus attack, which can penetrate traditional firewalls, and began to develop actively after the hacking of the network of RSA Security (EMC division), when attackers managed to steal the secret of password formation in its products. In both cases, the perpetrators used methods to circumvent the available protections, exploiting flaws in network protocols and file formats. Previous firewalls did not protect against such an attack, since they worked only at the network level and could not control the transfer of data to specific applications or users. Therefore, analysts suggested changing the paradigm of forming network filtering rules. Instead of monitoring IP addresses, filtering was required by users and the programs they used. Instead of network protocols - control of individual sites and associated AJAX applications. Instead of passive traffic management, it is a built-in intrusion detection system with a study of files transmitted over the network and a detailed study of their content.


New to Check Point R75 is the Application Control Software Blade, which provides a differentiated, state-of-the-art approach to application control with a combination of robust security technology, user awareness, and broad application control capabilities. Each of these components is required to enable employees to work with Web 2.0 tools without compromising their company's security. To involve employees in the correction process, the new blade includes a unique UserCheck technology developed by Check Point, which allows IT administrators to configure application usage policies based on risk level and user needs. In addition, it provides unique application transparency with a tool such as Check Point AppWiki, the world's largest application library, which today contains more than 100 thousand applications and Web 2.0 widgets.

Also new is Identity Awareness, a software blade that allows users and groups in organizations to manage security policies. Identity Awareness gives organizations unique application control and access control by creating clear security policies based on authentication. The Identity Awareness software blade integrates perfectly with Active Directory, enabling fast and easy deployment.

Other new or updated software blades in Check Point R75 allow customers to easily implement the 3D Security concept and configure their own Check Point R75 security gateway to meet critical security requirements:

  • Data Loss Prevention (DLP) Software Blade is a software blade that prevents data loss or important business information through a MultiSpect data classification mechanism that combines users, content, and processes to block potential vulnerabilities with unmatched accuracy. The innovative UserCheck technology of Check Point warns users about violations and allows them to be fixed in real time.
  • Intrusion Prevention (IPS) Software Blade is a software blade that provides complete, integrated prevention with next-generation firewall capabilities at multi-gigabit speeds, providing complete protection and superior system performance. According to the results of independent tests to date, Check Point's IPS blade surpasses the most advanced products of other intrusion prevention developers and is recommended by NSS Labs.
  • Mobile Access Software Blade is a software blade that securely connects devices such as iPhone and iPad while protecting data using proven encryption technology. Ideal for mobile workers using both manageable and unmanaged devices. The Mobile Access Software Blade is easy to install and use, and now, along with the Check Point Mobile application, is available for download in the App Store.