Check Point and FireEye Announce New Partnership to Share Threat Intelligence
April 2015 by Marc Jacob
Check Point® Software Technologies Ltd. and FireEye announced a partnership to share threat intelligence to protect customers from modern advanced attacks. As part of this cooperation, Check Point’s ThreatCloud and Next Generation Threat Prevention solutions and the FireEye NX platform will share the latest threat intelligence in real-time, allowing customers to update firewall security policies dynamically based on the intelligence from both platforms..
Organizations of all sizes are targeted every day by hackers, with various methods and intentions. Whether or not the attacks are successful depends on each organization’s security implementations and the threat intelligence data that supports them. The partnership between Check Point and FireEye will allow the market leaders in zero-day protection to bring a deeper level of understanding around the threat landscape to customers. With this partnership, customers benefit from:
• Actionable, automated threat intelligence: The companies will mutually share anonymized threat intelligence which includes IP addresses, domain names and file hashes that will be automatically integrated into their respective products and networks, to bolster security across their deployed footprints in a customer’s network.
• Access to the largest repository of threat intelligence: The partnership combines intelligence from Check Point’s Next Generation Threat Prevention solutions with intelligence generated by FireEye’s virtual machines to give joint customers the industry’s largest library of threat intelligence currently available.
• Near-real time sharing: The threat landscape is constantly, with attackers often shifting between random attacks and customizing unique payloads targeted at specific organizations. To protect customers, Check Point and FireEye will update threat information in near-real time within an organization’s environment, enabling protection in a threat landscape where even a delay of one hour can result in a breach.