Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
PALO ALTO, CA -- (Marketwired) -- 07/01/15 -- Cloud access security broker Adallom today announced an integration with Check Point's (NASDAQ: CHKP) Threat Emulation solution. Adallom's purpose-built cloud security platform now integrates seamlessly with Check Point's Threat Emulation sandboxing capabilities to detect new exploits, zero-day vulnerabilities and targeted advanced persistent threats in any content stored in cloud applications. The Adallom integration allows organizations to unlock the benefits of software-as-a-service (SaaS) applications without compromising security.
SaaS applications offer a unique malware environment for skilled adversaries. The ubiquity of cloud application access via devices that are unmanaged and unsecured greatly expands the threat surface. Collaboration within SaaS environments means any malware infection can spread quickly. In addition, automation tools upload content to cloud applications from various sources, including cloud-to-cloud integrations, increasing the opportunity for malware to be uploaded to cloud applications.
"Most targeted attacks now begin via unknown or undiscovered zero-day exploits in corporate files and email attachments. A significant percentage of these corporate files now reside in cloud applications that sit outside of the boundaries of the traditional security perimeter," said Alon Kantor, Vice President of Business Development at Check Point Software Technologies. "With the integration of Adallom's technology with Check Point's Threat Emulation, organizations can identify targeted advanced attacks occurring as a result of infected files in cloud applications, and enable the right controls to ensure it does not make its way back into the corporate network."
The joint integration allows documents in Adallom-protected cloud applications to be inspected by Check Point's Threat Emulation sandboxing environment and detonated against a wide range of browsers, plug-ins, and applications to detect resident malware. Customers will also benefit from the integration of Check Point's cutting-edge CPU-level threat prevention engine, which provides organizations an unmatched level of protection against attackers by detecting attacks at the pre-infection level.
The Adallom and Check Point joint integration addresses advanced threats by:
"Organizations of all sizes are making the shift to cloud applications to improve efficiency and enable better IT agility," said Yinon Costica, VP of Product at Adallom. "While there are clear benefits driving the move to the cloud, consideration must be given to the security of critical data and emerging threats in this new environment. Our cloud application security platform delivers core governance and security controls, while extending key security solutions to the cloud. We are excited to extend our partnership with Check Point to ensure that cloud applications do not become another vector for targeted attacks."
For more information about Adallom's support for Check Point, please visit www.adallom.com/partners/checkpoint.
About Adallom
Founded in 2012 by cyber defense veterans, Adallom, a 2014 Gartner Cool Vendor, is a cloud access security broker which delivers visibility, governance and protection for cloud applications. Its innovative platform is simple to deploy, seamless to users, and is available as a SaaS-based or on-prem solution. Powered by SmartEngine advanced heuristics and backed by an elite cybersecurity research team, Adallom makes it easy to protect data in the cloud. For more information, visit www.adallom.com or follow us on Twitter @adallom.
About Check Point
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises' networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Adallom Press Contact
Mike Spinney
CHEN PR
Email Contact
781-672-3112
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs