Check Point Press Releases

Check Point Delivers Unparalleled Cyber Threat Visibility in the Era of Big Data

Next-Generation SmartEvent Exposes Security Risks from Billions of Logs in Just Seconds

San Carlos, CA  —  Wed, 23 Apr 2014

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced the availability of Next-Generation SmartEvent, a new and powerful event monitoring solution for real-time processing and storing of threat detection data. Next-Generation SmartEvent offers one single view for all security threats and network components, to more easily manage and analyze big data security, and to make faster and more informed security decisions.

Security incident and event management continues to grow in complexity. With the influx of device connectivity and content – mobile devices, endpoints, and gateways comprising organizations’ networks – the ever-increasing volume of data and growing security incidents results in more events to be processed and continuous monitoring requirements. This creates the need for highly customizable analytic tools for monitoring, quickly searching and reporting on an organizations’ IT security environment.

“To stay one step ahead of security threats, organizations need powerful event monitoring solutions that are simple to use, provide robust security analytics to rapidly identify and investigate threats, and enable policy modifications based on these threats,” said Dorit Dor, vice president of products at Check Point Software Technologies. “Next-Generation Smart Event provides simple yet powerful and comprehensive event monitoring capabilities including highly-customizable views, blazing-fast search and report results for events and real threats that reside in the data.”

Key features of the Next-Generation SmartEvent include:

Effective Threat Analysis and Customized Visibility: Utilizing customizable views to display only information relevant to your organization, security administrators can easily understand security status and trends at a glance. Using one-click detailed views and free-text search, administrators can quickly investigate security incidents and can easily correlate multiple logs in order to identify suspicious activity from the clutter. Organizations can also create rich and personalized reports for necessary stakeholders in security decision making, including security professionals, network engineers and C-level management.

Big Data Threat Detection in Seconds: Next-Generation SmartEvent analyzes and searches logs with unprecedented speed and scale. Billions of logs can be analyzed per day, and over a hundred million logs can be searched in a matter of seconds. This speed and scale facilitates forensic investigation and regulatory compliance with easy access to terabytes of historical logs.

“Everywhere Monitoring” for all Security Threats: Next-Generation SmartEvent brings real-time event visibility across multiple security systems including: Firewall, IPS, Anti-Virus, Anti-Bot, Threat Emulation, URL Filtering and Application Control. The SmartEvent web portal allows administrators to be on top of their security posture and monitor all security threats, anywhere and anytime, using mobile phones and tablet devices.

“While security incidents continue to grow in frequency and sophistication, ‘everywhere monitoring’ is critical to ensure security continuity. Next-Generation SmartEvent brings awareness and control of security threats and network components through a consolidated and customizable view in a matter of seconds,” concluded Dor.

For more information on Next-Generation SmartEvent, visit: /products/smartevent-software-blade/index.html .

Next-Generation SmartEvent will be available on Check Point’s new Smart-1 Appliances from our worldwide partners:

Follow Check Point via


About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (, the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.


This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.