Story image

Checkpoint and FireEye team up to battle cyber threats

21 Apr 2015

Security vendors Check Point Software Technologies and FireEye have today announced a partnership to share threat intelligence to protect their customers from modern advanced attacks. 

The partnership enables Check Point’s ThreatCloud and Next Generation Threat Prevention solutions and the FireEye NX platform to share the latest threat intelligence in real-time, allowing customers to update firewall security policies dynamically based on the intelligence from both platforms.

“Organisations of all sizes are targeted every day by hackers, with various methods and intentions,” the companies say in a joint statement. “Whether or not the attacks are successful depends on each organisation’s security implementations and the threat intelligence data that supports them.”

The partnership between Check Point and FireEye will allow the two companies to bring a deeper level of understanding around the threat landscape to customers. 

“The threat landscape is changing every day, with new actors and attack methods emerging faster than ever before,” says Amnon Bar-Lev, president, Check Point Software Technologies. “We’ve arrived at a point in time where the best way to battle cyber threats is to join forces and share knowledge around the attacks and attempts that are occurring, so that we can provide a deeper level of security to our customers.”

“By bringing together the threat intelligence and detection capabilities of both FireEye and Check Point, customers are holistically protected from advanced attacks across all egress points,” says David DeWalt, FireEye CEO and chairman of the board. “This partnership is a model for vendor cooperation that will help enterprises defend themselves against the most sophisticated cyberattacks.”

With this partnership, customers benefit from:
- Actionable, automated threat intelligence: The companies will mutually share anonymised threat intelligence which includes IP addresses, domain names and file hashes that will be automatically integrated into their respective products and networks, to bolster security across their deployed footprints in a customer’s network.

- Access to the largest repository of threat intelligence: The partnership combines intelligence from Check Point’s Next Generation Threat Prevention solutions with intelligence generated by FireEye’s virtual machines to give joint customers the industry’s largest library of threat intelligence currently available.

- Near-real time sharing: The threat landscape is constantly changing, with attackers often shifting between random attacks and customising unique payloads targeted at specific organisations. To protect customers, Check Point and FireEye will update threat information in near-real time within an organisation’s environment, enabling protection in a threat landscape where even a delay of one hour can result in a breach.

Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”
CylancePROTECT now available on AWS Marketplace
Customers now have access to CylancePROTECT for AI-driven protection across all Windows, Mac, and Linux (including Amazon Linux) instances.