Check Point adds application intelligence to firewall

Check Point Software Technologies has added application intelligence (AI) to its firewall offering, which melds security...

Check Point Software Technologies has added application intelligence (AI) to its firewall offering, which melds security components into a single point of enforcement.

Integrated into its Check Point FireWall-1 NG and Smart Defense offerings, AI helps administrators target and prevent application attacks by validating standards compliance, overseeing protocol usage, blocking malicious code and controlling unauthorised operations.

Features incorporated into Check Point NG with AI include worm pattern matching for CIFS (Common Internet File System), peer-to-peer support, fingerprint scrambling to block servers from hackers,and cross-site scripting protection.

"Customers have come to rely on a firewall to protect the network. Now that the threat element has elevated to the application, firewalls need to step up," said Check Point director of product marketing Greg Smith.

These management capabilities within Check Point NG AI will ease volumes of log data that have overrun IT administrators in the past, said Eric Ogren, senior analyst in security solutions and services at Yankee Group.

"Right now the concept is internal firewalls to protect the application environment. But when VoIP becomes more prevalent, securing that at the network perimeter is tricky," Ogren said.

Check Point NG with AI will be available next month.

Read more on IT risk management

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchDataManagement

Close