subscribe: Daily Newsletter
search the site
Check Point simplifies security with R80
Addressing the sprawling complexity of securing today’s modern enterprise, Check Point Software Technologies recently introduced its next-generation security management platform, Check Point R80.
The new platform represents over three years of R&D, building on Check Point’s best-in-class technology that delivers IT leaders the ability to consolidate all aspects of their security environment into one single place, further paving the way for new-levels of automation capabilities for time-consuming security tasks.
“With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security has become a key initiative beyond the IT department – elevating the role of security to become a more strategic element of the entire organisation,” says Doros Hadjizenonos, country manager of Check Point South Africa. “With the capabilities we’re introducing in R80, we’re focused on empowering security leaders to become a true partner to the business – moving away from being seen as just the ‘enforcer’ toward becoming more of the ‘enabler’.”
Advancements in technology, including the proliferation of interconnected devices and an interdependent digital global economy, have fuelled countless improvements in how we work. This has also challenged business to stay ahead of new threats that are in constant motion and evolution. The new R80 management platform addresses this need, providing a unified security approach for enterprises to consolidate all aspects of their security so they can be more efficient and adept at deploying strong protections across their organisations. This is accomplished in three key ways:
• The introduction of ‘one console, one policy.’ The new R80 platform ensures consistently strong protections across the entire infrastructure with a single console to manage the perimeter, data centre branch and cloud deployments. This means streamlining and gaining greater visibility into policy administration, even allowing multiple administrators the ability to work on the same policy without conflict.