Check Point Software Technologies has announced the acquisition of a new cloud-based technology that delivers secure remote access created by Odo Security.

The technology will integrate with Check Point’s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any application.

The Covid-19 pandemic has driven enterprise adoption of mass remote working for their global workforces, from 30% before the pandemic to 81% today. Seventy-four percent plan to enable large-scale remote working permanently.

However, many organisations overlooked critical aspects of security in the race to enable remote working, which significantly increased their exposure to cyber-attacks and need to secure remote connectivity anytime, anywhere to any resource.

“Many organisations find themselves compromising security in order to deliver the connectivity required by their business needs,” says Dr Dorit Dor, vice-president: products at Check Point Software Technologies “By incorporating Odo Security’s unique clientless, cloud-delivered secure remote access to our portfolio of threat prevention services, we help organisations overcome this dilemma.

“Check Point delivers a consolidated solution to help organizations to securely connect any number of remote employees to everything, from any location, making working from home easier and safer than ever.”

Odo Security, an Israeli start-up founded in 2017, developed a cloud-based, clientless secure access service edge (SASE) technology that delivers secure remote access.

Unlike traditional secure remote access solutions, this technology enables:

Users to easily connect through a unified portal to a wide range of applications, such as remote desktops, web applications, database servers, cloud and corporate servers, with no client or software installation.

Security administrators to easily deploy the solution in less than five minutes from the cloud. They also gain enhanced visibility including full audit trail of user activity.

 Zero Trust Architecture to define granular access policy to give the right people in the right context, the least privileged access to applications and reduce the attack surface.

Check Point will integrate Odo Security’s technology into its Infinity architecture and SASE vision.