Home » Computer & Software » Internet » Adallom Expands Integration With Check Point to Detect Advanced Threats in Cloud Applications
Ihren XING-Kontakten zeigen

Adallom Expands Integration With Check Point to Detect Advanced Threats in Cloud Applications

PALO ALTO, CA — (Marketwired) — 07/01/15 — Cloud access security broker Adallom today announced an integration with Check Point–s (NASDAQ: CHKP) . Adallom–s purpose-built cloud security platform now integrates seamlessly with Check Point–s Threat Emulation sandboxing capabilities to detect new exploits, zero-day vulnerabilities and targeted advanced persistent threats in any content stored in cloud applications. The Adallom integration allows organizations to unlock the benefits of software-as-a-service (SaaS) applications without compromising security.

SaaS applications offer a unique malware environment for skilled adversaries. The ubiquity of cloud application access via devices that are unmanaged and unsecured greatly expands the threat surface. Collaboration within SaaS environments means any malware infection can spread quickly. In addition, automation tools upload content to cloud applications from various sources, including cloud-to-cloud integrations, increasing the opportunity for malware to be uploaded to cloud applications.

“Most targeted attacks now begin via unknown or undiscovered zero-day exploits in corporate files and email attachments. A significant percentage of these corporate files now reside in cloud applications that sit outside of the boundaries of the traditional security perimeter,” said Alon Kantor, Vice President of Business Development at Check Point Software Technologies. “With the integration of Adallom–s technology with Check Point–s Threat Emulation, organizations can identify targeted advanced attacks occurring as a result of infected files in cloud applications, and enable the right controls to ensure it does not make its way back into the corporate network.”

The joint integration allows documents in Adallom-protected cloud applications to be inspected by Check Point–s Threat Emulation sandboxing environment and detonated against a wide range of browsers, plug-ins, and applications to detect resident malware. Customers will also benefit from the integration of Check Point–s cutting-edge CPU-level threat prevention engine, which provides organizations an unmatched level of protection against attackers by detecting attacks at the pre-infection level.

The Adallom and Check Point joint integration addresses advanced threats by:

unknown malware, zero day exploits and advanced persistent threats in any documents stored in and uploaded to cloud applications;

unknown malware into known threats and extending protections to any Adallom and Check Point customers globally; and,

extending alerts on malware and infections to any existing threat analytics or security information and event management systems (SIEM) to preserve investment protection.

“Organizations of all sizes are making the shift to cloud applications to improve efficiency and enable better IT agility,” said Yinon Costica, VP of Product at Adallom. “While there are clear benefits driving the move to the cloud, consideration must be given to the security of critical data and emerging threats in this new environment. Our cloud application security platform delivers core governance and security controls, while extending key security solutions to the cloud. We are excited to extend our partnership with Check Point to ensure that cloud applications do not become another vector for targeted attacks.”

For more information about Adallom–s support for Check Point, please visit .

Founded in 2012 by cyber defense veterans, Adallom, a 2014 Gartner Cool Vendor, is a cloud access security broker which delivers visibility, governance and protection for cloud applications. Its innovative platform is simple to deploy, seamless to users, and is available as a SaaS-based or on-prem solution. Powered by SmartEngine advanced heuristics and backed by an elite cybersecurity research team, Adallom makes it easy to protect data in the cloud. For more information, visit or follow us on Twitter @adallom.

Check Point Software Technologies Ltd. (), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises– networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.

Mike Spinney
CHEN PR

781-672-3112

You must be logged in to post a comment Login


Blogverzeichnis - Blog Verzeichnis bloggerei.de Blog Top Liste - by TopBlogs.de Bloggeramt.de blogoscoop