SHARE
Facebook X Pinterest WhatsApp

Check Point Beefs Up Its Security Intelligence

Six Emerging Threats All Security Professionals Should Prepare For Check Point Software Technologies gives IT organizations the ability to inspect any suspicious Microsoft Word or Adobe PDF file with a content inspection engine that has been added to the Check Point software security platform. With the release of Check Point R77 software blade, Check Point […]

Written By
MV
Mike Vizard
Aug 28, 2013
Slide Show

Six Emerging Threats All Security Professionals Should Prepare For

Check Point Software Technologies gives IT organizations the ability to inspect any suspicious Microsoft Word or Adobe PDF file with a content inspection engine that has been added to the Check Point software security platform.

With the release of Check Point R77 software blade, Check Point also provides an emulation service delivered via the cloud that allows IT departments to run suspicious files in a sandbox environment to identify what type of calls that file is trying to make without exposing it to other corporate applications.

According to Fred Kost, head of product marketing at Check Point Software, the goal is to put more actionable security intelligence in the hands of IT organizations at a time when advanced persistent threats (APTs) are targeting specific users and organizations. Rather than being dependent solely on identifying signatures of malware, Kost says Check Point R77 gives IT organizations the ability to more proactively defend themselves from potential new threats.

Pricing for the ThreatCloud Emulation Service is based on a global organizational quota, which begins at a monthly list price of $500 for up to 10,000 inspected files.

In addition to the content inspection engine and threat emulation service, Check Point has added support for RADIUS identity awareness software, central device management and compliance capability delivered within a software blade that plugs into the Check Point firewall platform.

The latest Check Point security intelligence additions are limited to Word and PDF files running in Windows. But Kost says it’s logical to anticipate that Check Point will be extending that capability out to other types of files and operating systems.

With over 70,000 new types of malware being created and distributed each day, the sheer volume of attacks is now beyond the ability of signature-based security technologies to keep pace. That doesn’t mean organizations should stop deploying anti-malware software, but it does create a need to augment the capabilities of those products with security defenses that rely more on automation and isolation to proactively defend the IT environment.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.