Check Point Launches Horizon Security

Check Point Software is offering its Horizon platform based upon the company´s preventive  philosophy, to improve defences across the network, cloud and endpoints and stop future cyber attacks. 

The Horizon platform combines proactive management solutions for Managed Detection and Response (MDR). Horizon is powered at the click of a button and is supported by innovative AI technology and Check Point's teams of expert analysts. 

Check Point reports a 42% global increase in cyber attacks to the middle of 2022 and that ransomware is now the number one threat to businesses. Attacks are increasing all the time as security teams struggle to shut down breaches before damage spreads due to the distraction of endless alerts and false positives across multiple siloed tools and a narrow attack vector view that lacks context.

The problem is made worse by a lack of cyber experience and the ongoing skills shortage. Against this backdrop, there is now a critical need for all organisations to have a Security Operations Center (SOC), with 24/7 monitoring, response and threat hunting capabilities. However, for many organisations running this kind of operation is far too difficult and expensive 

SOC provision does not, up until now, match the scale of the challenge for organisation who are only focused on detecting and responding to attacks,

Craig Robinson, Research Vice President for Security Services at IDC commented: “Many of the existing solutions in the market today simply deal with detection and management of cyber incidents, but actually preventing incidents has largely been missing in the MDR arena, until now. “Check Point Horizon’s strategy of going prevention-first is a game-changing feature addition in the crowded MDR market.”

The Head of Threat Management and Chief Security Advisor at Check Point Software, Dan Willey commented, “The secret sauce to Horizon is in its unique combination of preventative tools, the industry’s top analysts and research experts and innovative AI.

Check Point Horizon is a unified solution across your entire infrastructure that will vastly improve your cyber defenses and prevent attacks from happening.

He continued: “The strength of any MDR service is in its people, and prevention is in our DNA. With Horizon MDR/MPR, customers benefit from the direct experience of our Incident Response team who handle more than 3,000 incidents per year. If you do not have the resources to run a solid 24/7 SOC, we will do it for you.”

Check Point Horizon brings a prevention-first approach to security operations by providing SOC teams with the tools and services needed to prevent attacks in real-time with fewer resources.

  • Check Point Horizon XDR/XPR increases security operations efficiency by quickly detecting, investigating, and automating responses to attacks across the entire IT infrastructure. By leveraging innovative AI technologies and big data threat intelligence, aggregated from hundreds of millions of sensors worldwide, Horizon XDR/XPR is able to identify threats inside the organization and prevent them from spreading.
  • Check Point Horizon MDR/MPR is a prevention-first MDR service backed by Check Point’s elite experts who will deliver a powerful SOC-as-a-Service. The Check Point analysts will monitor the entire customer’s security estate 24/7, no matter the products or solutions in place, utilising their 25 years’ Incident

Response experience to analyse, correlate and understand what is happening, responding on a customer’s behalf, and making recommendations to drive a prevention mindset throughout the entire delivery of the service. 

Designed for security admins and analysts to investigate and troubleshoot all security incidents, with a simple and intuitive SaaS cloud solution, Horizon saves valuable time and eliminates complexity.

Check Point Software:     Globe Newswire:

You Might Also Read: 

Why A Managed Security Service Provider Should Be On Your Cyber Roadmap:

 

« Hacktivist Group GhostSec Attack Israel
Microsoft Warning - Windows Flaw Being Attacked »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

Norwegian Information Security laboratory (NISlab)

Norwegian Information Security laboratory (NISlab)

NISlab conducts international competitive research in information and cyber security and operates study programs in this area.

ReversingLabs

ReversingLabs

ReversingLabs develops cyber threat detection and mitigation tools that address the the latest directed attacks, advanced persistent threats and polymorphic malware.

Fair Isaac Corporation (FICO)

Fair Isaac Corporation (FICO)

FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, optimize operations and meet strict government regulations.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Tecnalia Research & Innovation

Tecnalia Research & Innovation

Tecnalia is the largest center of applied research and technological development in Spain, a benchmark in Europe and a member of the Basque Research and Technology Alliance.

CloudVector

CloudVector

CloudVector's API Detection & Response platform is the only API Threat Protection solution that goes beyond the gateway to provide Shadow API Prevention and Deep API Risk Monitoring and Remediation.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

Xiarch Solutions

Xiarch Solutions

Xiarch Security is an global security firm that educates clients, identifies security risks, informs intelligent business decisions, and enables you to reduce your attack surface.

Performance Technologies

Performance Technologies

As a leading IT Solutions Provider in Greece, Performance Technologies delivers reliable, long life solutions, ensuring continuous availability of business-critical services and information.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

MIS Solutions

MIS Solutions

MIS Solutions is a managed cloud and IT security partner making technology work for you.

OpenZiti

OpenZiti

OpenZiti is the world’s most used and widely integrated open source secure networking platform. OpenZiti provides both zero trust security and overlay networking as pure open source software.