Check Point Advances ThreatCloud for Zero-Day Security
Check Point expands Software Blade Architecture with new sandboxing, content inspection and compliance technologies.Check Point Software Technologies is updating its Software Blade Architecture for network security services with the R77 release today. The R77 release provides new threat emulation capabilities that are intended to help limit the risk of zero-day exploits. The Software Blade Architecture is Check Point's platform for delivering multiple "blades" of security capabilities, including firewall, virtual private network (VPN) and intrusion prevention system (IPS). With the R77 update, Check Point is adding the new ThreatCloud Emulation Service to the mix, expanding the company's existing ThreatCloud services for the Software Blade Architecture. Check Point first began talking about its ThreatCloud in 2012. Fred Kost, head of product marketing for Check Point, explained to eWEEK that the initial ThreatCloud announcement was about the cloud delivery of a threat database. Some of Check Point's products are both feeding into and using the ThreatCloud data. "With R77, we’re announcing the ThreatCloud Emulation Service where we're doing sandbox analysis in the cloud to stop zero-day and unknown attacks," Kost said. The ThreatCloud Emulation Service is a stand-alone subscription to send files to Check Point's sandbox service in the cloud, according to Kost. The basic idea behind a security sandbox is to provide a secure facility in which malware can be safely analyzed. Instead of getting free rein over a potentially vulnerable enterprise network, the sandbox limits the ability of malware to do any real harm, while enabling researchers to examine and understand the malware's goals.