Check Point Launches Horizon Security

Check Point Software is offering its Horizon platform based upon the company´s preventive  philosophy, to improve defences across the network, cloud and endpoints and stop future cyber attacks. 

The Horizon platform combines proactive management solutions for Managed Detection and Response (MDR). Horizon is powered at the click of a button and is supported by innovative AI technology and Check Point's teams of expert analysts. 

Check Point reports a 42% global increase in cyber attacks to the middle of 2022 and that ransomware is now the number one threat to businesses. Attacks are increasing all the time as security teams struggle to shut down breaches before damage spreads due to the distraction of endless alerts and false positives across multiple siloed tools and a narrow attack vector view that lacks context.

The problem is made worse by a lack of cyber experience and the ongoing skills shortage. Against this backdrop, there is now a critical need for all organisations to have a Security Operations Center (SOC), with 24/7 monitoring, response and threat hunting capabilities. However, for many organisations running this kind of operation is far too difficult and expensive 

SOC provision does not, up until now, match the scale of the challenge for organisation who are only focused on detecting and responding to attacks,

Craig Robinson, Research Vice President for Security Services at IDC commented: “Many of the existing solutions in the market today simply deal with detection and management of cyber incidents, but actually preventing incidents has largely been missing in the MDR arena, until now. “Check Point Horizon’s strategy of going prevention-first is a game-changing feature addition in the crowded MDR market.”

The Head of Threat Management and Chief Security Advisor at Check Point Software, Dan Willey commented, “The secret sauce to Horizon is in its unique combination of preventative tools, the industry’s top analysts and research experts and innovative AI.

Check Point Horizon is a unified solution across your entire infrastructure that will vastly improve your cyber defenses and prevent attacks from happening.

He continued: “The strength of any MDR service is in its people, and prevention is in our DNA. With Horizon MDR/MPR, customers benefit from the direct experience of our Incident Response team who handle more than 3,000 incidents per year. If you do not have the resources to run a solid 24/7 SOC, we will do it for you.”

Check Point Horizon brings a prevention-first approach to security operations by providing SOC teams with the tools and services needed to prevent attacks in real-time with fewer resources.

  • Check Point Horizon XDR/XPR increases security operations efficiency by quickly detecting, investigating, and automating responses to attacks across the entire IT infrastructure. By leveraging innovative AI technologies and big data threat intelligence, aggregated from hundreds of millions of sensors worldwide, Horizon XDR/XPR is able to identify threats inside the organization and prevent them from spreading.
  • Check Point Horizon MDR/MPR is a prevention-first MDR service backed by Check Point’s elite experts who will deliver a powerful SOC-as-a-Service. The Check Point analysts will monitor the entire customer’s security estate 24/7, no matter the products or solutions in place, utilising their 25 years’ Incident

Response experience to analyse, correlate and understand what is happening, responding on a customer’s behalf, and making recommendations to drive a prevention mindset throughout the entire delivery of the service. 

Designed for security admins and analysts to investigate and troubleshoot all security incidents, with a simple and intuitive SaaS cloud solution, Horizon saves valuable time and eliminates complexity.

Check Point Software:     Globe Newswire:

You Might Also Read: 

Why A Managed Security Service Provider Should Be On Your Cyber Roadmap:

 

« Hacktivist Group GhostSec Attack Israel
Microsoft Warning - Windows Flaw Being Attacked »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Uniken

Uniken

Uniken REL-ID is a safe, simple, and scalable security platform that tightly integrates your identity, authentication, and channel security.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

Ovarro

Ovarro

Ovarro is the new name for Servelec Technologies and Primayer. Ovarro's technology is used throughout the world to monitor, control and manage critical and national infrastructure.

ISGroup (Information Security Group)

ISGroup (Information Security Group)

ISGroup services include network penetration testing, Web application penetration testing, ethical hacking, vulnerability assessments, code review and associated training.

SafeBreach

SafeBreach

SafeBreach's platform simulates hacker breach methods across the entire kill chain to identify breach scenarios in your environment before an attacker does.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Foretrace

Foretrace

Foretrace aims to prevent, assess, and contain the exposure of customer accounts, domains, and systems to malicious actors.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Department of Homeland Security (DHS)

Department of Homeland Security (DHS)

The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.

Cryptr

Cryptr

Cryptr provides plug and play authentication to manage all your authentication strategies in one place with just a few lines of code.

S2W

S2W

S2W is a data intelligence company specialized in cyber threat intelligence, brand/digital abuse, and blockchain.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

AC3

AC3

AC3 is a leading secure cloud services provider, focused on turning your technology challenges into real results.

Harmonia Holdings Group

Harmonia Holdings Group

Harmonia Holdings Group was born in 2006 with the vision to bring innovation and change to the federal IT sector.