Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Launches New Manged Security and Incident Response Services

Check Point Software Technologies introduced two managed security services as part of the new ThreatCloud Security Services offering to help organizations protect their networks from attacks.

Check Point Software Technologies introduced two managed security services as part of the new ThreatCloud Security Services offering to help organizations protect their networks from attacks.

The ThreatCloud services provides customers with access to experts 24/7 to help with real-time remediation while in the middle of an attack and to understand the kind of risks and threats facing the organization, Check Point said Wednesday. ThreatCloud Managed Security Service is a continuous monitoring service that monitors events on customer security gateways and correlates them with third-party data to identify potential risks and threats, Check Point said. ThreatCloud Incident Response helps customers while the attack is in progress to figure out what steps to take in order to secure the network.

ThreatCloud Managed Security Service analyzes all logs collected in the environment and tracks gateways and endpoints to give organizations visibility into what is happening on the network. The ThreatCloud team continuously monitors event feeds and logs on customer security gateways to make sense of the flood of data and to generate customer-specific guidance and actionable alerts, Check Point said. If an attack or suspicious activity gets flagged, the service sends the customer an actionable alert based on Check Point’s Threat Prevention Policies, Check Point said.

“With the increasing level of threat sophistication and greater frequency, it can be challenging for even the best equipped security teams to stay ahead of the curve,” said Dorit Dor, vice president of products at Check Point Software Technologies.

The Managed Security Service provides customers with security monitoring, visibility and compliance support. The service also provides recommendations on ideal configuration settings and fine-tunes policies for Check Point’sThreat Prevention Software Blades, including IPS, Anti-Bot and Antivirus.

With ThreatCloud Incident Response, organizations will be able to be up and running quickly after an incident. Check Point-certified security professionals recommend controls, offer practical remediation and implement security best practices.

It’s no surprise Check Point is adding managed services to its portfolio. The security services market is growing strong, although the rate of its growth has slowed from previous years, according to Gartner figures. Gartner analysts recently reported worldwide security services spending reached $35.1 billion last year, and is expected to hit $38.3 billion by the end of 2012. Gartner projected the market would exceed $49.1 billion in 2015.

The new ThreatCloud services provide customers with “critical security resources,” Dor said.

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.