Click here to close now.

SYS-CON MEDIA Authors: Liz McMillan, Jon McNeill, Elizabeth White, Pat Romanski, Carmen Gonzalez

News Feed Item

Check Point Pioneers Revolutionary Cyber Intelligence Marketplace: ThreatCloud IntelliStore

The Only Platform That Transforms Threat Intelligence From Multiple Sources Into Attack Prevention; Launches Today With Industry-Leading Partners

BARCELONA, SPAIN -- (Marketwired) -- 05/20/14 -- Check Point Experience 2014 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the launch and immediate availability of ThreatCloud IntelliStore, a unique threat intelligence marketplace that enables organizations to select intelligence feeds that will automatically prevent cyberattacks. This new offering builds on Check Point's core security intelligence infrastructure: ThreatCloud™, the industry's largest real-time big data security infrastructure, which delivers threat data from a worldwide network of threat sensors.

Organizations need customizable threat intelligence that can be immediately used within their network environments to prevent cyberattacks from occurring. Today however, sources for threat intelligence are fragmented, and offered by numerous vendors for specific countries and verticals. Check Point's exciting advancement in security architecture, Software-defined Protection (SDP), makes threat prevention simple and flexible, quickly converting threat intelligence into real-time protections.

ThreatCloud IntelliStore launches with several industry-leading partners -- iSIGHT Partners, CrowdStrike, IID, NetClean, PhishLabs, SenseCy, and ThreatGRID to offer actionable threat intelligence to customers worldwide. Customers can select and customize intelligence feeds from a variety of sources according to their organizations' needs in specific geographies, vertical industries, and protection types. It establishes a single source for the most relevant feeds that can automatically be translated into security protections to stop threats on Check Point gateways, leveraging the existing infrastructure and policies already established by an enterprise.

"We are extremely excited to launch the ThreatCloud IntelliStore. It's a groundbreaking collaboration that seeks to eliminate the current fragmentation of the threat intelligence market and is the first platform to automatically aggregate threat intelligence feeds for real prevention," said Dorit Dor, vice president of products at Check Point Software Technologies. "As the only provider of customizable intelligence from various sources, we are proud and excited to offer ThreatCloud IntelliStore as an innovative solution and service that no other vendors offer."

ThreatCloud IntelliStore launches today with a number of best-of-breed intelligence partners, with more to follow:

ThreatCloud IntelliStore Partner Quotes:

iSIGHT Partners

  • Adversary-focused intelligence based on advanced cyber security research.

"Check Point is changing the security landscape with ThreatCloud IntelliStore. This endeavor will provide organizations with the tools they need to build next generation intelligence-led security programs and it will shape the cyber security market as a whole," said John P. Watters, chief executive officer, iSIGHT Partners. "We are excited to make our high-fidelity intelligence available as the premium offering in ThreatCloud IntelliStore."

CrowdStrike

  • Global provider of security technologies and services focused on identifying advanced threats and targeted attacks.

"We are thrilled to bring CrowdStrike's Intelligence Exchange (CSIX) into Check Point's innovative and market-leading arsenal of security technology," says George Kurtz, president/CEO & co-founder of CrowdStrike. "With CSIX, organizations can now leverage a real-time adversary attribution engine to maximize the value of existing security investments, gain immediate insight into targeted attacks, and prioritize and focus resources on the most critical threats."

IID

  • Global intelligence on Advanced Persistent Threats (APTs), malware, exploit drops and Distributed Denial-of-Service (DDoS).

"The unfortunate reality of today's advanced cybercrime attacks is that they are always evolving faster than organizations can keep up with them," said Rod Rasmussen, president and chief technology officer at IID. "ThreatCloud IntelliStore infrastructure provides a great platform to harness the power of IID's unique, high value, actionable and real-time threat intelligence to alert to new threats as they occur."

NetClean

  • Global intelligence developer of technical solutions to fight child sexual abuse material.

"The NetClean CSA Data Feed provides the world's largest list of signatures of known Child Sexual Abuse (CSA) images and videos identified by law enforcement working together with NetClean. Partnering with Check Point gives us a new and global reach that is vital to our strategy," said Christian Berg, chief executive officer of NetClean. "This is a ground breaking partnership as it's the first time we are offering access to our data base outside NetClean. Solving child sexual abuse is a collective responsibility and our partnership with Check Point is a perfect example of the collaboration needed."

PhishLabs

  • Finance-related intelligence on cybercrime threats such as fraud, phishing and DDoS.

"We're excited to be an inaugural provider in Check Point's ThreatCloud IntelliStore because it solves two big threat intelligence issues. First, every organization has different intelligence needs. ThreatCloud IntelliStore gives customers the flexibility to choose the feeds that best meet their needs," said John LaCour, founder and chief executive officer of PhishLabs. "Second, threat intelligence alone doesn't stop attacks. It needs to be applied. Via ThreatCloud IntelliStore, our high-fidelity cybercrime threat intelligence can be automatically applied to proactively block phishing, malware, DDoS, and other cyber-attacks."

SenseCy

  • Human-validated intelligence for financial, government, and critical infrastructure companies.

"We are excited to be an initial cyber intelligence provider for Check Point's ThreatCloud IntelliStore. We believe our premium cyber intelligence feeds -- based on information collected from deep-web and darknet sources -- will offer great added benefit to Check Point customers and are very glad to be partners in this marketplace," said Assaf Keren, chief technology officer at SenseCy. "We are looking forward to a long and fruitful relationship between our two companies."

ThreatGRID

  • Unified malware analysis and threat intelligence solution for accurate and context-rich intelligence.

"We are delighted to join Check Point's ThreatCloud IntelliStore initiative," said Dov Yoran, chief executive officer and co-founder at ThreatGRID. "Our premium content feeds, generated exclusively from our proprietary cloud-based malware analysis platform, empower customers to deploy context-rich, actionable threat intelligence to proactively defend against advanced and targeted attacks."

"By bringing together the best sources for threat intelligence, ThreatCloud IntelliStore provides organizations the flexibility to select the most appropriate data feeds through a singular system. This data in turn is fed into ThreatCloud™ and provides the protections organizations need across all of their security gateways," concluded Dor.

ThreatCloud IntelliStore is immediately available for all Check Point security gateways from our worldwide partners: http://partners.us.checkpoint.com/partnerlocator/.

For more information on ThreatCloud IntelliStore, visit: http://www.checkpoint.com/products/threatcloud/index.html.

Follow Check Point via
Twitter: www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The cloud is now a fact of life but generating recurring revenues that are driven by solutions and services on a consumption model have been hard to implement, until now. In their session at 16th Cloud Expo, Ermanno Bonifazi, CEO & Founder of Solgenia, and Ian Khan, Global Strategic Positioning & Brand Manager at Solgenia, will discuss how a top European telco has leveraged the innovative recurring revenue generating capability of the consumption cloud to enable a unique cloud monetization mod...
FedRAMP is mandatory for government cloud deployments and businesses need to comply in order to provide services for federal engagements. In his session at 16th Cloud Expo, Abel Sussman, Director for Coalfire Public Sector practice, will review the Federal Risk and Authorization Management Program (FedRAMP) process and provide advice on overcoming common compliance obstacles.
Red Hat has launched the Red Hat Cloud Innovation Practice, a new global team of experts that will assist companies with more quickly on-ramping to the cloud. They will do this by providing solutions and services such as validated designs with reference architectures and agile methodology consulting, training, and support. The Red Hat Cloud Innovation Practice is born out of the integration of technology and engineering expertise gained through the company’s 2014 acquisitions of leading Ceph s...
Are your applications getting in the way of your business strategy? It’s time to rethink your IT approach. In his session at 16th Cloud Expo, Madhukar Kumar, Vice President, Product Management at Liaison Technologies, will discuss a new data-centric approach to IT that allows your data, not applications, to inform business strategy. By moving away from an application-centric IT model where data integration and analysis are subservient to the constraints of applications, your organization will b...
As organizations shift toward IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection &E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his session at 16th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Partnerships, will disc...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance...
Analytics is the foundation of smart data and now, with the ability to run Hadoop directly on smart storage systems like Cloudian HyperStore, enterprises will gain huge business advantages in terms of scalability, efficiency and cost savings as they move closer to realizing the potential of the Internet of Things. In his session at 16th Cloud Expo, Paul Turner, technology evangelist and CMO at Cloudian, Inc., will discuss the revolutionary notion that the storage world is transitioning from me...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
The essence of cloud computing is that all consumable IT resources are delivered as services. In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, will demonstrate the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He will discuss from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT ...
Cloud data governance was previously an avoided function when cloud deployments were relatively small. With the rapid adoption in public cloud – both rogue and sanctioned, it’s not uncommon to find regulated data dumped into public cloud and unprotected. This is why enterprises and cloud providers alike need to embrace a cloud data governance function and map policies, processes and technology controls accordingly. In her session at 15th Cloud Expo, Evelyn de Souza, Data Privacy and Compliance...
Roberto Medrano, Executive Vice President at SOA Software, had reached 30,000 page views on his home page - http://RobertoMedrano.SYS-CON.com/ - on the SYS-CON family of online magazines, which includes Cloud Computing Journal, Internet of Things Journal, Big Data Journal, and SOA World Magazine. He is a recognized executive in the information technology fields of SOA, internet security, governance, and compliance. He has extensive experience with both start-ups and large companies, having been ...
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. In his session at 15th Cloud Expo, Michael Meiner, an Engineering Director at Oracle, Corporation, will analyze a range of cloud offerings (IaaS, PaaS, SaaS) and discuss the benefits/challenges of migrating to each of...
Platform-as-a-Service (PaaS) is a technology designed to make DevOps easier and allow developers to focus on application development. The PaaS takes care of provisioning, scaling, HA, and other cloud management aspects. Apache Stratos is a PaaS codebase developed in Apache and designed to create a highly productive developer environment while also supporting powerful deployment options. Integration with the Docker platform, CoreOS Linux distribution, and Kubernetes container management system ...
The results of a global study commissioned by CA Technologies reveal that mobile and desktop applications have become the new battleground for brand loyalty. In today’s software-driven world, where consumers are more discerning about what they expect from applications, the reality is that businesses that fail to deliver a positive application experience risk losing as much as a quarter of their customer base. “Consumers no longer view applications as nice-to-have novelties. They now have a hug...
The industrial software market has treated data with the mentality of “collect everything now, worry about how to use it later.” We now find ourselves buried in data, with the pervasive connectivity of the (Industrial) Internet of Things only piling on more numbers. There’s too much data and not enough information. In his session at @ThingsExpo, Bob Gates, Global Marketing Director, GE’s Intelligent Platforms business, to discuss how realizing the power of IoT, software developers are now focu...