How to Choose the Right Cybersecurity Solution REGISTER >
It's a safe bet that today's busy enterprise security professionals are forced to juggle several point products in a bid to keep their users and data safe, a situation made even tougher when that data leaves the confines of their networks and ventures into the cloud or countless mobile devices. Check Point Software Technologies wants to ease that burden.
The company this week announced a new consolidated architecture that provides threat prevention and security management capabilities that cover an organization's network, mobile devices and cloud services (public, private and hybrid cloud). Dubbed Check Point Infinity, the solution provides a more holistic approach to securing enterprise IT environments, according to Darrell Burkey, director of Intrusion Prevention System (IPS) Products at Check Point.
One way Check Point Infinity bolsters data security is to help IT personnel get on the same page, so to speak.
"A common user interface [UI] and usage paradigm makes security teams incredibly more efficient and better able to support each other versus time consuming 'can't see the forest for the trees' infrastructure of managing multiple different products," each with different usage paradigms and interfaces, Burkey told eSecurity Planet. "A simple but huge benefit is that security team members can support each other – i.e. the IPS person can cover for the endpoint person because the UI is common."
When managing security on environments that span networks, the cloud and mobile devices, Check Point Infinity enables security teams to better focus their efforts and set security policies that meet "business requirements versus different policies on different products," Burkey added. Additionally, it offers unified "monitoring and incident response based on the end-to-end attack story, rather than trying to manually piece together single data points from different products."
Behind the scenes, Check Point's existing technologies work in concert to not only provide security visibility and management in a single pane of glass, but also help protect organizations against existing network, mobile and cloud-based threats and new attacks as they emerge.
"Check Point SandBlast can detect [a] zero-day attack, immediately communicate the IOCs [indicators of compromise] back to Check Point ThreatCloud which then disseminates the information to all Check Point customer gateways around the world for immediate protection," explained Burkey. "The window of vulnerability" therefore narrows to mere seconds or minutes instead of the days, weeks and even months that it would otherwise take to respond to threats. "This is huge and tremendously important security benefit of a unified security architecture."
Similar protections are provided to mobile devices and cloud resources courtesy of Check Point Infinity's vSEC Cloud Security and SandBlast Mobile capabilities, respectively.