Check Point unveils management platform

New R80 security platform helps organizations to better consolidate processes, policies and technology for smarter, more proactive protection.

  • 8 years ago Posted in
Addressing the sprawling complexity of securing today’s modern enterprise, Check Point has introduced its next-generation security management platform, Check Point R80. The new platform gives IT leaders the ability to consolidate all aspects of their security environment into one single place, enabling for new levels of automation for time-consuming security tasks.
 
“With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security has become a key initiative beyond the IT department – elevating the role of security to become a more strategic element of the entire organization,” said Gabi Reish, vice president of product management, Check Point. “With the capabilities we’re introducing in R80, we’re focused on empowering security leaders to become a true partner to the business – moving away from being seen as just the ‘enforcer’ toward becoming more of the ‘enabler.’”
 
 
Business is increasingly challenged to stay ahead of new threats that are continually evolving. The new R80 management platform addresses this need, providing a unified security approach for enterprises to consolidate all aspects of their security, so they can deploy strong protection efficiently across their organizations. This is accomplished in three key ways:
 
·        The introduction of ‘one console, one policy.’ The new R80 platform ensures consistently strong protections across the entire infrastructure with a single console to manage the perimeter, data center branch and cloud deployments. This means streamlining and gaining greater visibility into policy administration, even allowing multiple administrators the ability to work on the same policy without conflict.
 
·        Better aligning security with business processes and network architectures. The technology in R80 helps security teams keep pace with changing policy by segmenting into manageable sections, aligning security to IT processes, and helping empower security self-service for business owners and freeing key security personnel for strategic security tasks.
 
·        Integration of threat management for a single view into risk across a network. In R80, security teams have full visibility into security status and can react faster to prevent the next attack. Monitoring, logging, reporting and event correlation are all captured into the same, visual, customizable dashboard. This not only enables an easy one-to-two clicks to drill down and quickly troubleshoot an event; it allows teams to create custom-tailored reports for everyone from key business executives to technology partners.
Research shows ‘game needs to be changed,’ with security innovation years behind that of the...
73% of organizations lack automated patch management, and 62% experienced incidents involving...
Quest Software has signed a definitive agreement with Clearlake Capital Group, L.P. (together with...
Dell EMC PowerProtect Cyber Recovery for AWS provides a fast, easy-to-deploy public cloud vault to...
Aqua’s cloud native application protection platform becomes the only solution that protects cloud...
54% of organisations working on a security transformation project now or in the next 12 months.
Node4 has released its Mid-Market IT Priorities Report 2021. The independent report reveals that...
Zscaler Zero Trust exchange cloud-based architecture enables superior green security capabilities...