Enterprise Security, Platform Security, Software Security

Check Point Software Technologies Bolsters Endpoint Security with Enhanced Posture Management to Tackle Escalating Vulnerability Exploits

Globenewswire | May 15, 2023 | Read time : 05:00 min

Check Point Software Technologies Bolsters Endpoint Security

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally announced today the expansion of its Check Point Harmony Endpoint protections solution by incorporating vulnerability and automated patch management capabilities. This enhancement addresses the mounting number of cyberattacks that exploit unpatched system vulnerabilities for unauthorized access. To deliver this advanced feature, Check Point has joined forces with Ivanti, integrating Ivanti Patch Management to assess and remediate software vulnerabilities from cloud to edge, into Check Point's Harmony Endpoint protection solution.

The National Vulnerability Database reported over 25,000 vulnerabilities in 2022, with this figure expected to rise. Furthermore, a recent Dark Reading report revealed that 57% of ransomware attacks capitalize on unpatched vulnerabilities, highlighting the necessity of addressing this issue to defend against such threats.

However, vulnerability patching is often a complex and time-consuming process. Many organizations lack insight into their environment's vulnerability status, and even when they do, patching takes an average of 97 days, according a report of the Ponemon Institute. This delay provides ample opportunities for attackers to exploit these weaknesses.

To tackle this challenge, Check Point is enhancing its endpoint security solution, Harmony Endpoint, with vulnerability assessment and automated patch management capabilities. This will equip Harmony Endpoint users with an intelligent, automated process that minimizes the attack surface and boosts operational efficiency by:

  • Automatically scanning organizational endpoints with minimal performance impact
  • Providing comprehensive visibility into the status of all devices, saving valuable time for IT and security teams
  • Auto-patching vulnerabilities and implementing security policies to ensure a secure and uninterrupted workflow.

"We are excited to enhance our endpoint security solution with vulnerability assessment and automated patch management capabilities," says Ofir Israel, VP of Threat Prevention at Check Point, "This added value complements Harmony Endpoint's existing offerings of Endpoint Protection Platform (EPP), Endpoint Detection and Response (EDR), and other advanced security features. Our customers now have the tools they need to swiftly identify and remediate vulnerabilities before they can be exploited, all from a unified platform."

“We are thrilled to partner with Check Point and collaborate to offer customers the highest level of endpoint protection,” said Michelle Hodges, Senior Vice President of Global Channels and Alliances at Ivanti. “We both understand that patch management is a critical component of any cybersecurity program and enhances the overall security posture for our customers by ensuring all systems are updated with the latest application updates, fixes, and patches. At Ivanti, we are committed to providing innovative solutions that empower our partners to strengthen their businesses and safeguard our customers.”

By delivering a comprehensive endpoint security solution, Check Point enables organizations to defend against a broad spectrum of cyber threats and stay ahead of the ever-evolving threat landscape.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally.

Check Point Infinity's portfolio of solutions protects enterprises and public organisations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.

About Ivanti
Ivanti elevates and secures Everywhere Work so that people and organizations can thrive. We make technology work for people, not the other way around. Today’s employees use a wide range of corporate and personal devices to access IT applications and data over multiple networks to stay productive, wherever and however they work. Ivanti is one of the only technology companies that finds, manages and protects each IT asset and endpoint in an organization. Over 40,000 customers, including 88 of the Fortune 100, have chosen Ivanti to help them deliver an excellent digital employee experience and improve IT and security team productivity and efficiency. At Ivanti, we strive to create an environment where all perspectives are heard, respected and valued and are committed to a more sustainable future for our customers, partners, employees and the planet. For more information, visit www.ivanti.com and follow @GoIvanti.

Spotlight

Cyberattacks are on the rise and the aviation sector is experiencing growing interest among cyber criminals. On March 7, 2023, the TSA updated their cybersecurity requirements for airports and aircraft operators. Read the solution brief to learn more about the new regulations and what you can do to secure airports and airlines.

Spotlight

Cyberattacks are on the rise and the aviation sector is experiencing growing interest among cyber criminals. On March 7, 2023, the TSA updated their cybersecurity requirements for airports and aircraft operators. Read the solution brief to learn more about the new regulations and what you can do to secure airports and airlines.

Related News

Enterprise Security, Software Security, API Security

Wallarm Unveils API Abuse Prevention, Protects Organizations Against Bot-Based Attacks

Businesswire | June 26, 2023

Wallarm, the end-to-end API security company, today announced the early release of its API Abuse Prevention feature to address one of the most critical API threats: bot-based attacks. Wallarm can now accurately identify and mitigate API bot activity, protecting systems against API abuse, account takeover (ATO), and price scraping. This new feature prevents potential revenue loss, protects customer information, and defends against reputational damage, while ensuring the best possible experience for legitimate API users. “Bots are a growing threat to API security, and traditional methods of prevention have proven to be ineffective,” said Ivan Novikov, CEO of Wallarm. “Our API Abuse Prevention feature is a game-changer. It can accurately detect and stop a wide range of bot types, without relying on JavaScript challenges. This provides our customers with a highly effective solution to protect their APIs from bot-based attacks.” "As the fintech, healthtech, and e-commerce industries continue to evolve, API security has become more crucial than ever, with bots posing an increasing threat. Traditional security measures, such as WAFs and WAAP tools, have demonstrated their inadequacy in mitigating these risks," explained Ivan Novikov, CEO of Wallarm. "Our API Abuse Prevention feature offers an innovative solution to this problem, accurately detecting and neutralizing various bot types without the complex deployment. This empowers our clients with a highly effective defense against bot-driven attacks on their APIs." Bots are a significant threat to the security of APIs and a massive concern for organizations of all sizes. In recent years, there have been several high-profile incidents of API abuse, including the theft of customer data, Denial-of-Service (DoS) attacks, and unauthorized access to sensitive information. These incidents have highlighted the need for effective solutions to prevent API abuse. Wallarm’s API Abuse Prevention provides organizations with a highly effective solution to protect APIs from bot-based attacks by using specialized detectors to identify and stop a wide range of bot types, including stuffing bots, spiders, scanners, security crawlers, and scalper bots. These detectors can detect bot activity based on several factors, such as request patterns, timing anomalies, and API endpoint behaviors. It is designed to provide organizations with customizable protection against malicious automated behavior that blocks the bad while allowing the good—and at scale. While traditional bot protection products are mostly focused on the web application, Wallarm’s API Abuse Prevention is specifically developed to mitigate automated actions against APIs where competing solutions fall short. It is delivered on the existing Wallarm Advanced API Security platform, enabling customers to reduce tool sprawl, analyst workload and fatigue, and operational costs. Additionally, Wallarm API Abuse Prevention includes detailed reporting and analysis, allowing organizations to better understand the nature and full scope of bot activity on their APIs, which can be used to improve overall API security and prevent future attacks. Wallarm’s API Abuse Prevention is available now as a part of Wallarm's Advanced API Security offering. To learn more, visit https://www.wallarm.com. About Wallarm Wallarm End-to-End API Security offerings provide robust protection for APIs, web applications, microservices, and serverless workloads running in cloud-native environments. Hundreds of Security and DevOps teams choose Wallarm to: discover all their web apps & API endpoints, traffic flows and sensitive data usage for complete visibility; protect their entire API portfolio against emerging threats; and respond automatically to incidents for better risk management. Our platform supports modern tech stacks, offering dozens of deployment options in cloud and Kubernetes-based environments, and also provides a full cloud solution. Wallarm is headquartered in San Francisco, California, and is backed by Toba Capital, Y Сombinator, Partech, and other investors.

Read More

Data Security, Platform Security, Software Security

Skyhigh Security Enables Secure Use of AI Applications with Leading Data Protection Technology

Businesswire | June 29, 2023

Skyhigh Security today announced it’s enabling organizations to adopt artificial intelligence applications in a secure manner that protects sensitive, confidential, and business critical information through its leading Security Service Edge (SSE) portfolio. Skyhigh Security’s technology protects data and stops threats in the cloud across all websites, Software-as-a-Service (SaaS) applications, Infrastructure-as-a-Service (IaaS) environments and Shadow IT, from a single, cloud-native enforcement point. Skyhigh Security’s purpose-built SSE platform is future-proofed with advanced data protection controls that directly apply to AI apps to protect customers’ business critical data. The same controls will apply to all new and emerging cloud applications in the future to protect against the risks of data loss. Skyhigh Security also delivers the largest and most accurate cloud registry of over 40K+ cloud services, based on a detailed security assessment across more than 75 objective criteria. The Skyhigh Cloud Registry quickly identifies new generative AI apps and the corresponding risk level for each app. According to Skyhigh Security’s global telemetry data from the first half of 2023, close to a million of its users have accessed ChatGPT through corporate infrastructures. The volume of users has increased by 1500 percent from January to June, demonstrating the unprecedented momentum and adoption of generative AI applications across organizations and industries. Because of the risks associated with ChatGPT and similar AI applications, many organizations are seeking ways to ensure data is protected while allowing for productive use of the technology. “Securing corporate data in SaaS applications, like ChatGPT and other generative AI applications, is what Skyhigh Security was built to do,” said Anand Ramanathan, chief product officer, Skyhigh Security. “We currently track more than 500 different AI cloud service providers as part of our registry—a 130 percent increase since January. Through the Skyhigh SSE portfolio, organizations already enjoy granular visibility and control of these apps, protect sensitive data, and meet compliance regulations such as PCIDSS, HIPAA, and GDPR, all in one comprehensive solution. We ensure our customers have the appropriate guardrails in place.” “Skyhigh Security is paving the way forward for organizations to drive productivity and innovation by adopting AI technologies, while reducing risk and protecting critical business data,” said Dan Meacham, CISO, Legendary Entertainment. “At Legendary Entertainment, we use the Skyhigh Cloud Platform to help us monitor our generative AI traffic and prevent inadvertent uploads of regulated data, such as PII or trade secrets, or downloads of fake or malicious apps. It provides crucial insight into the corresponding risk levels of workflows pertaining to different AI tools and applications, along with the amount of data being posted within them. This visibility is essential for us to accelerate business productivity, while ensuring our risk is efficiently mitigated.” The Skyhigh SSE portfolio includes Skyhigh Cloud Access Security Broker (CASB), Skyhigh Secure Web Gateway (SWG), Skyhigh Private Access and other products, integrated into its comprehensive Skyhigh Cloud Platform, with Data Loss Prevention (DLP) as a core capability. Through its CASB for Shadow IT and SWG capabilities, it provides advanced data protection for organizations that allows the use of AI applications, including: Visibility into AI applications in use, as well as their corresponding risk levels. With insights into usage trends, businesses can exercise greater control over their data. Control over the amount of data uploads/in posts, lowering the risk of unintentional access to sensitive data. Flexibility in giving access to AI applications. Block complete access to AI applications for all users or simply block just risky/specific AI applications.Restrict AI applications used within your organization by providing access only to users with a business justification. Improved security awareness across the organization by coaching users on the risks of utilizing AI applications. Add pop ups whenever users access these sites, which direct them to not input any sensitive info in the application and note that it will be monitored by DLP. Reduced risk by automatically disabling and deleting the conversation history within AI applications, like ChatGPT, so that corporate data cannot be used to train the system. Prevent copy/paste of sensitive content into AI applications, like ChatGPT, by leveraging Skyhigh Security’s Web Isolation capabilities. Protect sensitive data from being uploaded to AI applications like ChatGPT. Apply DLP policies to block sensitive data from being posted, including social security numbers, bank account numbers, proprietary IP such as source code, employee and customer names. On July 11 and 13, Skyhigh Security will host a special webinar titled, ChatGPT and AI: Embrace It or Fear It, with Skyhigh Security’s Cloud Security Architect, Nate Brady. Register here to attend the webinar and learn more about how to harness AI and cloud services effectively and responsibly. About Skyhigh Security Skyhigh Security is focused on helping customers secure the world’s data. It protects organizations with cloud-native security solutions that are both data-aware and simple to use. Its market-leading Security Service Edge (SSE) Portfolio goes beyond data access and focuses on data use, allowing organizations to collaborate from any device and from anywhere without sacrificing security. For more information, visit www.skyhighsecurity.com.

Read More

Enterprise Security, Platform Security, Software Security

Cyware Raises $30 Million to Accelerate Expansion of AI-Powered Global Cyber Fusion and Threat Sharing Networks

Businesswire | July 05, 2023

Cyware, the leading provider of AI-powered Cyber Fusion platforms for enterprises and MSSPs, and automated threat intelligence sharing for information sharing networks, today announced a $30 million Series C financing round led by Ten Eleven Ventures, a leading multi-stage investment firm specializing in cybersecurity. Also participating are previous investors including Advent International, Zscaler, Emerald Development Managers, Prelude (the venture practice at Mercato Partners) and Great Road Holdings. The Series C financing comes as Cyware has experienced strong year-over-year growth propelled by robust market adoption, excellent customer retention, and extraordinarily large market access. Since Series A financing, Cyware has shown growth of 6x and consolidated its position as an industry leader for threat intelligence automation, security orchestration, and collaborative threat response solutions. Earlier this year, Cyware achieved FedRAMP Ready status for its Cyber Fusion platform and was named one of the most innovative and promising cybersecurity companies by JMP Cyber 66, as well as being recognized in the 2022 Deloitte Technology Fast 500 as one of the Fastest Growing Technology Firms in North America. Cyware’s cloud-based platform is leveraged by top Fortune 1000 and MSSP security teams to transform their legacy SOCs into Cyber Fusion Centers. The platform seamlessly integrates the AI-powered threat intelligence platform (TIP) with data orchestration and workflow automation (SOAR), to facilitate and synchronize actions between cloud and on-premises security tools and technologies. This enables security teams to connect the dots on emerging threats by correlating actionable threat intelligence with detection, threat hunting, vulnerability management, and incident response operations. Cyware’s Cyber Fusion platform is modular, and the underlying TIP, SOAR, and Collaborative Threat Response components can be leveraged in combination or individually by security teams providing them greater flexibility in transforming conventional SOCs. The Cyware platform has become the backbone of global Threat Sharing Networks. Almost all major ISACs (Information Sharing and Analysis Centers), ISAOs, and CERTs use Cyware’s platform to automate threat intelligence sharing, analysis, and actioning for more than 30,000 enterprise members and government entities. The platform also enables large conglomerates, industry groups, and private communities to activate and share threat intelligence with their distributed businesses, clients, and suppliers, and benefit from automated collective defense against ransomware, supply chain attacks, and zero-day vulnerabilities. “Security teams today face an overwhelming amount of data, but silos across data, processes, and technologies make it very challenging to see the bigger picture and proactively stop threats," said Anuj Goel, Cyware CEO and Co-founder. “Our mission at Cyware is to break down these silos, integrate threat intelligence into SOC operations, make it easy for teams to automate response, and act immediately to anticipate and stop threats.” “Threat actors thrive because the rest of us don’t collaborate enough,” said Alex Doll, Founder and Managing Member of Ten Eleven Ventures. “Only Cyware allows overstretched security teams to expand their risk visibility beyond their borders with innovative threat intelligence collaboration while dramatically improving response with vendor-agnostic orchestration and low-code automation. As seasoned investors in the cybersecurity field, we recognize that Cyware’s remarkable platform, revenue growth, and vast customer base – including over 20 ISACs – puts them in an enviable market position.” Cyware plans to leverage this new round of funding to fuel further growth and accelerate channel business and strategic alliances while expanding its global footprint. About Cyware Cyware delivers an innovative approach to cybersecurity that unifies threat intelligence, automation, threat response, and vulnerability management with data insights gleaned from assets, users, malware, attackers, and vulnerabilities. Cyware’s Cyber Fusion platform integrates SOAR and TIP technology, enabling collaboration across siloed security teams. Cyware is widely deployed by enterprises, government agencies, and MSSPs, and is the leading threat intelligence sharing platform for global ISACs and CERTs.

Read More