Check Point integration: Gain continuous threat visibility and enforcement

Check Point integration: Gain continuous threat visibility and enforcement

Check Point integration: Gain continuous threat visibility and enforcement

By:
投稿者:
Vectra
October 28, 2019

The time-to-response is often times what defines the success or failure of a security team. With increasingly sophisticated threats, security teams must continuously monitor for threat activity across all environments and contain and block threats immediately to limit damage.

That’s why we are excited to announce our technology partnership with Check Point today. The integration between the Cognito automated network detection and response platform and Check Point Next Generation Firewalls empowers security staff to quickly expose hidden attacker behaviors, pinpoint specific hosts involved in a cyberattack and contain threats before data is lost.

Check Point SandBlast Zero-Day Protection offers cloud-based sandboxing technology where files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before they enter the network.

The Cognito platform accelerates customer threat detection and investigation using sophisticated artificial intelligence to collect, store and enrich network metadata with insightful context to detect, hunt and investigate known and unknown threats in real time.

Security teams can condense weeks of work into seconds and quickly pinpoint the hosts involved in an active cyberattack, verify the threat with on-demand forensics and trigger a dynamic containment of the affected devices—all from within the intuitive Cognito user interface.

Cognito now integrates seamlessly with Check Point Next Generation Firewalls to provide the protection, visibility and enforcement tools necessary for security teams to succeed. Learn more in the solution brief.

About the author

Vectra

Vectra® is the world leader in AI-powered network detection and response.

Author profile and blog posts

Most recent blog posts from the same author

Threat detection

How to Track Attackers as They Move to Your Network from the Cloud

December 8, 2020
Read blog post
Security operations

Expertise That Unlocks the Potential within Your Security Operations

July 21, 2020
Read blog post
Industry

A Tale of Two Attacks: Shining a Security Spotlight on Microsoft Office 365

October 26, 2020
Read blog post