 back to blog

Check Point Integration: Gain Continuous Threat Visibility and Enforcement

October 28, 2019
Please note that this is an automated translation. For the most accurate information, refer to the original version in English.

The time-to-response is often times what defines the success or failure of a security team. With increasingly sophisticated threats, security teams must continuously monitor for threat activity across all environments and contain and block threats immediately to limit damage.

That’s why we are excited to announce our technology partnership with Check Point today. The integration between the Cognito automated network detection and response platform and Check Point Next Generation Firewalls empowers security staff to quickly expose hidden attacker behaviors, pinpoint specific hosts involved in a cyberattack and contain threats before data is lost.

Check Point SandBlast Zero-Day Protection offers cloud-based sandboxing technology where files are quickly quarantined and inspected, running in a virtual sandbox to discover malicious behavior before they enter the network.

The Cognito platform accelerates customer threat detection and investigation using sophisticated artificial intelligence to collect, store and enrich network metadata with insightful context to detect, hunt and investigate known and unknown threats in real-time.

Security teams can condense weeks of work into seconds and quickly pinpoint the hosts involved in an active cyberattack, verify the threat with on-demand forensics and trigger a dynamic containment of the affected devices—all from within the intuitive Cognito user interface.

Cognito now integrates seamlessly with Check Point Next Generation Firewalls to provide the protection, visibility and enforcement tools necessary for security teams to succeed. Learn more in the solution brief.

Want to learn more?

Vectra® is the leader in Security AI-driven hybrid cloud threat detection and response. The Vectra platform and services cover public cloud, SaaS applications, identity systems and network infrastructure – both on-premises and cloud-based. Organizations worldwide rely on the Vectra platform and services for resilience to ransomware, supply chain compromise, identity takeovers, and other cyberattacks impacting their organization.

If you’d like to hear more, contact us and we’ll show you exactly how we do this and what you can do to protect your data. We can also put you in contact with one of our customers to hear directly from them about their experiences with our solution.

Get in touch