SHARE
Facebook X Pinterest WhatsApp

Check Point Makes Security Intelligence Actionable

Top Five Trends in Network Forensics Adoption Gathering threat intelligence is one thing, but being able to actually act on it in a meaningful way is quite another. In a move that promises to make threat intelligence software more useful, this week at the Check Point Experience 2014 conference, Check Point Software Technologies announced ThreatCloud […]

Written By
MV
Mike Vizard
May 23, 2014
Slide Show

Top Five Trends in Network Forensics Adoption

Gathering threat intelligence is one thing, but being able to actually act on it in a meaningful way is quite another.

In a move that promises to make threat intelligence software more useful, this week at the Check Point Experience 2014 conference, Check Point Software Technologies announced ThreatCloud IntelliStore, an online marketplace through which customers can gain access to threat intelligence services from iSIGHT, CrowdStrike, IID, NetClean, PhishLabs, SenseCy and ThreatGRID.

Alon Kantor, vice president of business development for Check Point, says that in addition to threat intelligence, as the provider of IT security firewalls and gateways, Check Point is making it possible to access any of the threat security feeds available via the ThreatCloud Intellistore.

Beyond simply making that information available, Kantor says Check Point is distinguishing itself by allowing customers to automate the process of applying policies to Check Point enforcement gateways based on the latest threat intelligence. In effect, Kantor says that Check Point is creating an ecosystem around an open application programming interface (API) for threat intelligence that forewarns customers of potential threats in a way that they can more easily act on.

When it comes to threat intelligence, there appears to be something of an arms race going on. In fact, just this week Cisco announced that it is acquiring ThreatGRID. But as interesting as all that security intelligence might be, it is only valuable within the context of the process that automates the remediation of the vulnerabilities identified. Otherwise, IT organizations are essentially powerless to defend themselves, because it’s only a matter of time before their manual processes are overwhelmed by the volume of potential threats.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Observability: Why It’s a Red Hot Tech Term
Tom Taulli
Jul 19, 2022
Top GRC Platforms & Tools in 2022
Jira vs. ServiceNow: Features, Pricing, and Comparison
Surajdeep Singh
Jun 17, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.