Check Point Software Technologies, a global provider of cyber-security solutions has unveiled its CloudGuard product family to protect enterprises from Gen V cyber attacks on cloud applications and infrastructure.
Gen V cyber-attacks are defined as large-scale and fast-moving attacks across mobile, cloud and on-premise networks. These sophisticated attacks would easily bypass the conventional, static detection-based defenses being used by most organizations today.
According to Check Point, there is an increase in multi-vector attacks on cloud workloads and cloud applications including malware, as well as increased incidences of account hijacking. Check Point research would show that half of all breaches of enterprise SaaS applications are the result of account hijacks.
Check Point is also introducing CloudGuard SaaS protecting enterprises against cyber attacks on SaaS applications. CloudGuard is a part of the Check Point Infinity architecture, built on industry proven and award-winning technologies to provide comprehensive Gen V cyber protection for the cloud.
“Security is continually cited as a key barrier to wide-spread enterprise cloud adoption,” said Gil Shwed, CEO of Check Point. “Our new CloudGuard product family provides consistent and comprehensive threat prevention for cloud-based SaaS applications and infrastructure workloads.”
CloudGuard SaaS is a set of technologies designed to provide advanced security and threat prevention for Software-as-a-Service (SaaS) applications. CloudGuard SaaS would also prevent account hijacking, using patent-pending ID-Guard technology.
Key security features of Check Point CloudGuard SaaS would include:
- Zero-day Threat Protection – Prevents APTs and unknown zero-day malware from infecting content in SaaS applications using real-time sandboxing, ransomware protection, anti-bot technologies and real-time cloud-based threat intelligence.
- Identity Protection with ID-Guard (patent-pending) technology – identifies and blocks threat actors or impostors to access SaaS accounts, and blocks unauthorized users and compromised devices.
- Data Protection – automatically forces encryption of sensitive data, and blocks and quarantines unauthorized sharing of sensitive files.