Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber-security solutions globally, today announced Infinity Total Protection: a revolutionary security consumption model that enables enterprises to prevent Gen V cyberattacks. This innovative model utilizes Check Point Infinity Architecture components, providing the highest levels of security, while also reducing cost by consolidating security components.

All business sectors are now experiencing Gen V (5th Generation) cyber-attacks which are characterized by being large-scale and fast moving across multiple industries. These sophisticated attacks on mobile, cloud and various enterprise networks, easily bypass conventional, static detection-based defenses being used by most organizations today. To protect networks and data against these attacks, organizations need to move up to Gen V cyber-security using Check Point Infinity, which combines real-time threat prevention, shared intelligence and the most advanced security across networks, cloud and mobile.

'Enterprises need to protect themselves from sophisticated-and dangerous-attacks on all fronts: network, endpoint, mobile and cloud,' said Doug Cahill, group director and senior cybersecurity analyst at market research firm, Enterprise Strategy Group. 'These latest, fifth generation attacks (Gen V) require a comprehensive fifth generation cyber-security solution, such as Check Point's Infinity Total Protection, to keep critical business data safe from potentially devastating attacks across the entire enterprise.'

Infinity Total Protection is a game-changing new consumption model with a simple all-inclusive, per-user, per-year subscription offering. The offering enables enterprises to fully utilize Gen V security across their entire network. Infinity Total Protection is the only subscription solution available today that includes both network security hardware and software, with fully integrated endpoint, cloud and mobile protections and zero-day threat prevention, together with unified management and 24×7 premium support. With it, subscribers immediately benefit from Check Point Infinity's unified security architecture and total threat prevention across all their enterprise environments, whether on-premise, mobile, or cloud.

'Cyberattacks are getting bigger, more sophisticated and more complex daily, yet many organizations still rely on outdated, older-generation security technologies that can only detect attacks after they have already occured,' said Gabi Reish, VP product management and product marketing at Check Point. 'With Infinity Total Protection, enterprises can quickly and easily deploy Gen V cyber security, the Check Point infinity architecture, across their entire environment, and so prevent and block the most advanced threats and attacks.'

Check Point Infinity Total Protection delivers the broadest set of security technologies to protect organizations against the most advanced and unknown threats, including:

  • Real-time Threat Prevention: Protection against APTs and unknown zero day malware, using real-time sandboxing; ransomware protection; and anti-bot technologies, powered by integrated, real-time cloud-based threat intelligence and machine learning for identifying new threats.
  • Advanced Network Security: The most advanced firewall, intrusion prevention and application control, supporting networks of any size - from branch offices to global enterprises, and across both private and public cloud security offerings.
  • Cloud Security: Advanced threat prevention security in public, private and hybrid cloud, and SDN environments, with micro-segmentation for east-west traffic control inside the cloud.
  • Mobile Security: Malware prevention on iOS and Android mobile devices, rogue network identification, secure containers, data protection and document encryption, and EMM integration.
  • Data Protection: Anti-ransomware for known and unknown ransomware, data protection and seamless document encryption, browser security, a fully integrated endpoint protection suite and security forensics.
  • Integrated Security & Threat Management: A unified security management environment supporting multi-device, multi-domain and multi-admin management, with complete threat visibility supporting collection, correlation and attack analysis, and reporting tools for compliance and audit.

The new solution was unveiled at CPX 360 Barcelona, Check Point's annual cyber-security summit and expo for customers and partners. CPX 360 is dedicated to addressing today's most pressing cyber security challenges and helping customers of all sizes develop strategies to stay one step ahead of new and emerging cyberthreats and sophisticated hackers.

Read more about Check Point Infinity and Infinity Total Protection.

Check Point Blog: http://blog.checkpoint.com/
Twitter: http://www.twitter.com/checkpointsw
Facebook: http://www.facebook.com/checkpointsoftware
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
YouTube: http://www.youtube.com/user/CPGlobal

Check Point Software Technologies Ltd. published this content on 24 January 2018 and is solely responsible for the information contained herein.
Distributed by Public, unedited and unaltered, on 24 January 2018 17:39:13 UTC.

Original documenthttps://www.checkpoint.com/press/2018/check-point-software-technologies-announces-infinity-total-protection-unique-new-security-model-prevent-gen-v-threats-attacks

Public permalinkhttp://www.publicnow.com/view/D2B8532C3760D4B55D4EB94F95A9127699E7682F