Addressing the sprawling complexity of securing today’s modern enterprise, Check Point Software Technologies recently introduced its next-generation security management platform, Check Point R80.
The new platform represents over three years of R&D, building on Check Point’s best-in-class technology that delivers IT leaders the ability to consolidate all aspects of their security environment into one single place, further paving the way for new-levels of automation capabilities for time-consuming security tasks.
“With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security has become a key initiative beyond the IT department – elevating the role of security to become a more strategic element of the entire organisation,” says Doros Hadjizenonos, country manager of Check Point South Africa. “With the capabilities we’re introducing in R80, we’re focused on empowering security leaders to become a true partner to the business – moving away from being seen as just the ‘enforcer’ toward becoming more of the ‘enabler’.”
Advancements in technology, including the proliferation of interconnected devices and an interdependent digital global economy, have fuelled countless improvements in how we work. This has also challenged business to stay ahead of new threats that are in constant motion and evolution. The new R80 management platform addresses this need, providing a unified security approach for enterprises to consolidate all aspects of their security so they can be more efficient and adept at deploying strong protections across their organisations. This is accomplished in three key ways:
• The introduction of ‘one console, one policy.’ The new R80 platform ensures consistently strong protections across the entire infrastructure with a single console to manage the perimeter, data centre branch and cloud deployments. This means streamlining and gaining greater visibility into policy administration, even allowing multiple administrators the ability to work on the same policy without conflict.
• Better aligning security with business processes and network architectures. The technology in R80 helps security teams keep pace with changing policy by segmenting into manageable sections, aligning security to IT processes, and helping empower security self-service for business owners and freeing key security personnel for strategic security tasks.
• Integration of threat management for a single view into risk across a network. In R80, security teams have full visibility into security status and can react faster to prevent the next attack. Monitoring, logging, reporting and event correlation are all captured into the same, visual, customisable dashboard. This not only enables an easy one-to-two clicks to drill down and quickly troubleshoot an event; it allows teams to create custom-tailored reports for everyone from key business executives to technology partners.