Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Launches Threat Intelligence Store

ThreatCloud IntelliStore from Check Point

Internet security firm Check Point Software Technologies has launched a new intelligence marketplace that enables organizations to purchase intelligence feeds to help them defend against cyberattacks using their Check Point security gateways.

ThreatCloud IntelliStore from Check Point

Internet security firm Check Point Software Technologies has launched a new intelligence marketplace that enables organizations to purchase intelligence feeds to help them defend against cyberattacks using their Check Point security gateways.

Dubbed ThreatCloud IntelliStore, the intelligence marketplace builds on Check Point’s ThreatCloud intelligence infrastructure, which delivers threat data from a global network of threat sensors.

“Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring,” Check Point explained. “Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals.”

Designed to offer actionable threat intelligence to customers using Software-defined Protection, ThreatCloud IntelliStore launched with several intelligence partners including:

• iSIGHT Partners

• CrowdStrike

• Internet Identity (IID)

• NetClean

Advertisement. Scroll to continue reading.

• PhishLabs

• SenseCy

• ThreatGRID

More third-party intelligence partners are expected to follow.

Customers can select and customize intelligence feeds from a variety of sources according to their organizations’ needs in specific geographies, vertical industries, and protection types, Check Point said.

“We are extremely excited to launch the ThreatCloud IntelliStore. It’s a groundbreaking collaboration that seeks to eliminate the current fragmentation of the threat intelligence market and is the first platform to automatically aggregate threat intelligence feeds for real prevention,” said Dorit Dor, vice president of products at Check Point.

“The unfortunate reality of today’s advanced cybercrime attacks is that they are always evolving faster than organizations can keep up with them,” said Rod Rasmussen, president and chief technology officer at IID.

“By bringing together the best sources for threat intelligence, ThreatCloud IntelliStore provides organizations the flexibility to select the most appropriate data feeds through a singular system,” said Dov Yoran, chief executive officer and co-founder at ThreatGRID. “This data in turn is fed into ThreatCloud and provides the protections organizations need across all of their security gateways.”

For More information on ThreatCloud IntelliStore is available online

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

UK cybersecurity agency NCSC announced Richard Horne as its new CEO.

More People On The Move

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...