Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Check Point Unveils ‘Software-Defined Protection’ Security Architecture

SAN FRANCISCO – RSA CONFERENCE 2014 – Network security firm Check Point Software Technologies today introduced a new security architecture that the company explains as modular, agile and secure.

Called Software-defined Protection (SDP) by Check Point says the architecture takes a three-layer approach comprised of enforcement, control and management layers.

SAN FRANCISCO – RSA CONFERENCE 2014 – Network security firm Check Point Software Technologies today introduced a new security architecture that the company explains as modular, agile and secure.

Called Software-defined Protection (SDP) by Check Point says the architecture takes a three-layer approach comprised of enforcement, control and management layers.

“This framework decouples the control layer from the enforcement layer, enabling robust and highly-reliable enforcement points that obtain real-time protection updates from a software-based control layer,” Check Point explained. “SDP converts threat intelligence into immediate protections and is managed by a modular and open management structure.”

“The threat landscape has become far more sophisticated while at the same time, enterprise IT environments have grown in complexity. Enterprises are looking for advice on how they can become more secure, but in a way that is manageable and simple to use. SDP is today’s security architecture for tomorrow’s threats; it is simple, flexible and can robustly convert threat intelligence into real-time protections,” said Amnon Bar-Lev, president at Check Point Software Technologies.

“Check Point’s new Software-defined Protection is a sound blueprint to architecting security that just makes a lot of practical sense,” said Dan Meyer, vice president of technology at Carmel Partners. “Security attacks have changed radically over the years, and SDP represents a very smart shift forward in protecting organizations of all sizes in a pragmatic, modular and secure approach.”

“By offering a security architecture driven by function, threat and need, Check Point’s Software-defined Protection architectural blueprint can help IT better redesign their enterprise security network to accommodate both today’s IT borderless environment and the dynamic threat landscape,” said Charles Kolodgy, research vice president with IDC Security Products team.

“There are a multitude of point security products that are reactive and tactical in nature rather than architecturally oriented. We developed the Software-defined Protection in response to this gap and to give organizations an agile and secure security infrastructure,” concluded Bar-Lev.

Details on Check Point’s Software-defined Protection are avaialble online (PDF).

Advertisement. Scroll to continue reading.
Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.