Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Check Point Rolls Out Managed Security Services

Check Point Software recently launched a new suite of services that leverages its ThreatCloud security intelligence infrastructure to protect enterprise networks and provide expert advice on demand. Customers can choose a managed security service for day-to-day security operations and an incident response service that provides support in the event of an attack.

Check Point's ThreatCloud Managed Security Service monitors and analyzes data from Check Point's Intrusion Prevention System (IPS) gateway, which is deployed on the customer's premises. The gateway also includes anti-bot and antivirus capabilities. Events generated by the IPS are sent up to the ThreatCloud for analysis, and customers are notified of malicious activity.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

Check Point offers three service levels: Standard, Premium and Elite. The Standard and Premium levels require customers to manage the IPS gateways themselves; Check Point will manage gateways for Elite customers. Event analysis is automated in the Standard package; a Check Point analyst will review all alerts for Premium and Elite customers.

ThreatCloud Incident Response, meanwhile, provides real-time assistance from Check Point's security experts to help customers either deal with an attack in progress or to respond to a successful attack.

Check Point's ThreatCloud is updated in part by its customers, who share threat data: When new bots or malware threats are identified by an organization, identifiers such as the IP address or URL are sent to the ThreatCloud and an update is distributed to peers and customers around the world. Palo Alto's WildFire service operates in a similar manner.

Eric Ahlm, research director at Gartner, says there is a great deal of potential for "reputation services" such as ThreatCloud to better detect threats and improve the overall efficacy of security products. Reputation services are already being deployed in conjunction with email and Web gateways. "What I'm starting to see is that concept move its way to firewalls and IPS," he says.

Managed security services are a familiar part of the security landscape, and customers have a variety of choices, including service providers such as Verizon and traditional IT vendors such as IBM and Dell. By adding a services play to its portfolio, Check Point hopes to add value to its own product line while also opening a potential new revenue stream.

As noted by the InformationWeek report Security at Today's Network Speeds, threat prevention and monitoring systems are challenged to keep up with faster networks. "Monitoring and security vendors can't build higher-speed products until the technology is both mature enough to incorporate in their hardware and customer adoption gains critical mass to generate sales," writes author Kurt Marko. "Monitoring and security products have a tougher assignment than switches and adapter cards; there's just more packet processing involved. It's much more difficult to capture, analyze and/or filter packets than it is to merely transfer and switch them."

Ahlm says Check Point's new Security Service positions the company to better use its trained analysts to do more than just monitor devices, but also have the capability to detect new threats and better protect customer environments. He says recent Gartner research found that among 380 security service buyers in North America and Europe, the most important criteria when looking at outsourced managed security services was an improved security posture.

Pricing for the Check Point ThreatCloud Security Services varies depending on the size and scope of the deployment, the company said, and is available through its partners.


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers