Check Point has launched a new secure operating system with intelligence shared to its ThreatCloud.
At its Check Point Experience (CPX) event in Orlando, Florida the company announced the launch of the latest release of its software blade architecture, the R75.40, also known as ‘Check Point GAiA'.
According to the company, this includes more than 100 new security features, including a firewall rule hit count, web proxy configuration and DLP watermarking, as well as anti-bot and anti-virus software blades.
Also included is SmartLog, a next-generation log analyser that the company described as being similar to security incident and event management (SIEM) technology and which helps customers transform data into meaningful security information.
Gil Shwed, founder, chairman and CEO of Check Point, said: “With a 64-bit OS and a variety of cutting-edge features, GAiA enables customers to align multiple layers of security protection on a unified platform and create an integrated security blueprint.
“R75.40 continues to build on our vision for 3D security. From our software blade architecture and powerful line of appliances introduced last year, to our new ThreatCloud and cutting-edge unified OS, we're bringing customers the strong foundation and advanced protections needed to keep their edge in security.”
ThreatCloud, launched as part of R75.40, was described as the "first collaborative network to fight cyber crime, enabling organisations to share attack information and threat trends from multiple global sources to better and more effectively stop attacks".
Gathering data from users' gateways, threat sensors, Check Point research and industry malware feeds, ThreatCloud distributes threat intelligence to security gateways around the globe.
Talking to SC Magazine, Terry Greer-King, UK managing director of Check Point, said this is not a managed service but a community, where common threats may be seen in order to help fight global cyber crime.
“This is the next level of our 3D strategy, a community which will share intelligence to alert other users – either automatically or manually depending on the user. This is the next level of security,” he said.
“If you have computers in your business that are part of a botnet, then it will be seen in the community and alerted. This is about trends and is different from anti-virus as that relies on the vendor. For us it is about selling security rather than selling appliances, about involving people and putting processes in and establishing a community to fight cyber crime.”
John Grady, senior analyst of security products at IDC Research, said: “We see threat intelligence increasingly coming up as a topic of interest for many businesses, primarily because of the rise of advanced threats today and, by comparison, few resources where businesses can get quick access to the data, research and protections they need.
“Whether an organisation has already been the target of an advanced persistent threat or is simply looking to apply new pre-emptive protections, Check Point's ThreatCloud-enabled software blades are a promising solution.”