Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Check Point to Acquire GRC Solutions Provider Dynasec

Check Point Software Technologies is set to acquire governance, risk management and compliance (GRC) vendor Dynasec to help customers handle regulatory requirements.

According to Check Point, the buy will bolster 3D Security, Check Point’s vision for combining policies, people and enforcement in the name of security. The financial terms of the deal are not being made public. However, Check Point did give hints regarding its plans for the new acquisition.

Check Point Software Technologies is set to acquire governance, risk management and compliance (GRC) vendor Dynasec to help customers handle regulatory requirements.

According to Check Point, the buy will bolster 3D Security, Check Point’s vision for combining policies, people and enforcement in the name of security. The financial terms of the deal are not being made public. However, Check Point did give hints regarding its plans for the new acquisition.

Founded in 2004, Dynasec’s product offerings include its “easy2comply” GRC software, which provides a set of GRC frameworks for hundreds of compliance standards and appears to be a main target of the acquisition. According to Check Point, the buy will bring easy2comply together with Check Point’s security, business and consulting services, enabling Check Point to offer a simple way for businesses to automate the manual task of handling a growing number of regulations and compliance standards. Integrating the GRC frameworks with Check Point’s existing security products will allow customers to set and manage policies that can be applied to all of the company’s solutions, according to the company.

“By providing an easy way to define, manage and translate security policies into IT security controls, we are further enhancing the implementation of 3D Security for our customers,” said Amnon Bar-Lev, president of Check Point, in a statement. “This acquisition makes it very simple for customers to establish corporate policies that adhere to a wide range of global compliance regulations, and reinforces the importance of turning security into a business process.”

“With this new offering, we are extending our 3D Security strategy and bringing customers the tools that enable them to easily and quickly implement corporate and security policies with full control and enforcement,” Bar-Lev added.

The deal is expected to close within the next month.

Written By

Marketing professional with a background in journalism and a focus on IT security.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem