Check Point® Software Technologies (Nasdaq: CHKP) and IBM Security today announced an expanded alliance, including the sharing of threat intelligence, as the security industry moves to a more collaborative approach to defend against cybercrime. Also, the companies announced a broad set of product integrations as well as expanded investment across IBM’s consulting and managed security services.
Cybercrime has quickly grown into a significant threat to business, and is now one of the world’s largest illegal economies, accounting for $445 billion in annual profits according to the United Nations. To address this complex and aggressive attack environment, the expanded relationship between Check Point and IBM Security is designed to provide today’s enterprise with a new level of confidence in not only detecting security risks – but also empowering customers with tools to prevent these attacks before they happen.
The new alliance includes four main areas of collaboration:
- Shared threat intelligence. An open approach to collaborative defense in the security industry is needed to effectively protect against new and evolving threats. IBM X-Force and Check Point’s security research team will directly collaborate through the bi-directional sharing of threat identification and analysis using IBM X-Force Exchange (XFE), IBM’s threat intelligence sharing platform. This collective threat intelligence may be integrated into each company’s threat intelligence products, to help deliver proactive threat protection to customers of both companies.
- Integrated event management. Sharing capabilities across the security management platforms deployed by customers accelerates the company’s collective response to threat activity, and extends the value of security technology investments for clients. Check Point will be launching a new SmartConsole application in the IBM Security App Exchange for integration with the IBM Security QRadar Intelligence Platform. The app will deliver network data and security events from Check Point devices to QRadar to enable operators to view threat information in real-time directly from the QRadar console for faster incident response.
- Advanced mobile protection. Integration within IBM Maas360 enterprise mobility management (EMM) will allow customers to easily deploy and manage Check Point Mobile Threat Prevention to limit compromised devices from accessing enterprise networks and data, based on real-time insights. The combination of these capabilities provides automated protection against advanced threats across mobile devices, apps and networks, while significantly simplifying the implementation and ongoing monitoring of mobile security technology across the enterprise.
- Managed security services. IBM Managed Security Services (MSS) will continue to deepen its expertise in delivering and managing Check Point solutions for IBM customers. The deployment and management of a broader range of Check Point network security offerings will be supported through new lab equipment and ongoing training of IBM SOC analysts and solution architects, providing customers with cost-effective access to resources and expertise as their security requirements evolve.
"Today’s business environment is more connected and more innovative than ever before, requiring equally innovative ways to help customers keep a step ahead of possible threats," said Avi Rembaum, vice president of security solutions, Check Point. "Both Check Point and IBM Security take a prevent-first approach to security. Through intelligence sharing and technology integration we aim to help improve our customers’ security programs and create a new model for industry cooperation."
"The sharing of intelligence and expertise is how the security industry will take our defensive capabilities to the next level," said Caleb Barlow, vice president of strategy, IBM Security. "Cybercriminals are not new to this concept of sharing and our industry needs to step up to the challenge. Having a partner the quality of Check Point validate this approach is a big win for our joint customers."
Follow Check Point via:
Check Point Blog: http://blog.checkpoint.com/