Check Point announces CloudGuard SaaS
November 2018, Cyber Security, IT infrastructure, Products
Check Point Software Technologies announced the general availability of CloudGuard SaaS, a cloud suite designed to prevent sophisticated security threats that target SaaS applications.
One of the latest additions to Check Point’s CloudGuard portfolio of cloud security products, CloudGuard SaaS protects enterprises that use SaaS applications and cloud-based email (including Office 365, GSuite and OneDrive), and prevents targeted attacks intended to steal sensitive data. Addressing advanced SaaS threats, this cloud service provides 360-degree protection against malware and zero-days, phishing attacks, as well as employee account takeovers. Additionally, it can discover unsanctioned use of SaaS applications and prevent data leakage, while providing instant threat visibility.
“In today’s fifth-generation cyber-attack landscape, it’s crucial to implement technology equipped to take on more threats on business cloud applications,” said Itai Greenberg, VP of Product Management at Check Point Software Technologies. “Businesses generally turn to solutions in the Cloud Access Security Broker domain, which offer visibility and data leakage protection. CloudGuard SaaS, on the other hand, goes beyond CASB capabilities. It’s designed to prevent the most common attacks on SaaS applications, providing peace of mind to enterprises.”
CloudGuard SaaS can be an essential solution that equips businesses with the necessary preventive security for a multitude of enterprise SaaS applications within minutes.
“Businesses today face potential cyberattacks occurring from multiple vectors, including SaaS-based applications. Products like Check Point CloudGuard SaaS can help enterprises looking to protect themselves from attacks of different levels – from phishing to zero-day compromises,” said Jon Oltsik, senior principal analyst at the analyst firm ESG.
CloudGuard SaaS is an effective breach prevention solution for malware and zero-day attacks on SaaS applications, leveraging Check Point’s SandBlast technology. SandBlast scored a 100 percent block rate and highest evasion testing with NSS Labs, a globally recognised trusted source for independent, fact-based cybersecurity testing. By leveraging these capabilities, CloudGuard SaaS protects email attachments and file downloads on file hosting services and collaboration tools. CloudGuard SaaS blocks zero-day threats before they reach users and delivers safe content in seconds, using advanced threat emulation and extraction technology.
CloudGuard SaaS also blocks SaaS account takeovers by preventing unauthorised users from logging in, even if the device is already compromised. Using its new ID-Guard technology, CloudGuard SaaS identifies fraudulent access by finding bad logins and centralising multi-factor authentication. In addition, CloudGuard SaaS can authenticate users in any SaaS application on any device - mobile or PC.
CloudGuard SaaS prevents more phishing attacks than standard email services by leveraging artificial intelligence engines. It can stop sophisticated phishing attacks, spear-phishing, and email spoofing that may bypass other solutions. Malicious email content can also be blocked with high-precision certainty.
For more information and a free trial, visit: https://www.checkpoint.com/products/saas-security/
- 2019 Internet of Things (IoT) Barometer
March 2019, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
A majority of businesses that use IoT technology agree that it has either disrupted their industry or will do so in the next five years.
- Halt, who goes there?
March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.
- IoT is convergence in action
March 2019, Gijima Electronic and Security Systems (GESS), NEC XON, Technews Publishing, Axiz, G4S South Africa, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
The Internet of Things gains more than enough attention these days, but the IoT demonstrates the reality of the convergence between the physical and cyber worlds, and physical security is part of it.
- Stop hacking of access control systems
March 2019, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security
Think someone hacking your access control system not a big deal? Scott Lindley suggests that you think again.
- New cybersecurity pavilion for Securex 2019
March 2019, Securex South Africa , This Week's Editor's Pick, Cyber Security, News, Conferences & Events, Training & Education
Securex South Africa 2019 has announced that 4Sight Technologies, a subsidiary of an international holdings company focusing on investing in Industry 4.0 companies, has signed on as the official sponsor ...
- Keeping your guard up in retail
March 2019, Active Track, Retail (Industry), Security Services & Risk Management, Products
A security officer patrols the perimeter of a local shopping centre throughout the night, every night. During these patrols, the perimeter fence is checked, and the security officer keeps a look-out for ...
- Cash in with true identity
March 2019, Suprema, Access Control & Identity Management, Products
Cash is inherently risky, costly and easily exposed to fraud, thus necessitating the need for stronger security such as opting for the integration of biometrics into cash handling solutions.
- Security by design
March 2019, Johnson Controls, Cyber Security, Integrated Solutions
The security of the platforms on which physical security products are built will increasingly impact purchase decisions and market positions.
- A logical solution for cyber solutions
March 2019, Suprema, Cyber Security, Access Control & Identity Management, Products
BioMini Slim 2 is a thin, FBI PIV and FBI Mobile ID certified FAP20 optical scanner with a large platen for easy capturing of fingerprints.
- Managed IT security solution
March 2019, Cyber Security, IT infrastructure, Products
The LanDynamix fully managed IT security stack ensures that all the main attack vectors typically used by hackers to breach a network are protected and proactively monitored.
- eCLIQ electronic locks
March 2019, ASSA ABLOY South Africa, Access Control & Identity Management, Products
An innovative and easy to install access control solution that offers reliable protection and maximum flexibility.
- Latent fingerprint examination system
March 2019, IDEMIA , Access Control & Identity Management, Products
IDEMIA Case AFIS revolutionises latent print examiners comparison speed, accuracy and operational quality excellence.