Check Point harnesses cloud security to deter botnet infections in enterprise

Check Point harnesses cloud security to deter botnet infections in enterprise

Check Point Software Technologies Tuesday announced a cloud-based threat-detection service that can help to identify botnets in real time and block them from wreaking havoc on enterprise networks.

Check Point's ThreatCloud relies on an Internet-based sensor network, along with information resources such as industry malware feeds, to pinpoint the ever-changing landscape of IP addresses of botnets and similar threats. This threat-detection information can be shared with Check Point security gateways that use a new security blade called Anti-Bot to detect if computers behind them have become infected and compromised so that they can reach out to the botnet command-and-control point. The Check Point gateways could then block outbound communications attempts and flag the security problem for remediation.

DOE PROJECT: Research lab extends host-based cyber sensor project to open source

Another new technology Check Point is making available this week is the Antivirus Software Blade, which enables its gateways to receive ThreatCloud information in real time.

Also announced at the company's Experience 2012 event in Orlando this week is that Check Point's unified operating system, Gaia, is available through software blade release R75.40. It has added security features, such as DLP watermarking and Web proxy configuration.

Check Point has supported two separate OS platforms since its acquisition of the Nokia security appliance business about two years ago. But the new 64-bit Gaia operating system supports all Check Point appliances, open servers and virtualized gateways, including on IPv4 and IPv6 networks, with up to 70 million concurrent connections.

Check Point release R75.40 also includes SmartLog, a log analyzer to turn raw data into security information that can be obtained through a keyword search capability.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.

Read more about wide area network in Network World's Wide Area Network section.

Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about Check Point Software TechnologiesCheck Point Software TechnologiesCheck Point Software TechnologiesDLPIDGLANLPNokiaPoint Software TechnologiesSoftware Technologies

Show Comments
<img height="1" width="1" style="border-style:none;" alt="" src="//"/>