Check Point harnesses cloud security to deter botnet infections

ThreatCloud service relies on Internet-based sensor network to identify botnets in real time and block them on enterprise networks

Check Point Software Technologies Tuesday announced a cloud-based threat-detection service that can help to identify botnets in real time and block them from wreaking havoc on enterprise networks.

Check Point's ThreatCloud relies on an Internet-based sensor network, along with information resources such as industry malware feeds, to pinpoint the ever-changing landscape of IP addresses of botnets and similar threats. This threat-detection information can be shared with Check Point security gateways that use a new security blade called Anti-Bot to detect if computers behind them have become infected and compromised so that they can reach out to the botnet command-and-control point. The Check Point gateways could then block outbound communications attempts and flag the security problem for remediation.

[ In the data center today, the action is in the private cloud. InfoWorld's experts take you through what you need to know to do it right in our "Private Cloud Deep Dive" PDF special report. | Also check out our "Cloud Security Deep Dive," our "Cloud Storage Deep Dive," and our "Cloud Services Deep Dive." ]

DOE PROJECT: Research lab extends host-based cyber sensor project to open source

Another new technology Check Point is making available this week is the Antivirus Software Blade, which enables its gateways to receive ThreatCloud information in real time.

Also announced at the company's Experience 2012 event in Orlando this week is that Check Point's unified operating system, Gaia, is available through software blade release R75.40. It has added security features, such as DLP watermarking and Web proxy configuration.

Check Point has supported two separate OS platforms since its acquisition of the Nokia security appliance business about two years ago. But the new 64-bit Gaia operating system supports all Check Point appliances, open servers and virtualized gateways, including on IPv4 and IPv6 networks, with up to 70 million concurrent connections.

Check Point release R75.40 also includes SmartLog, a log analyzer to turn raw data into security information that can be obtained through a keyword search capability.

Ellen Messmer is senior editor at Network World, an IDG publication and website, where she covers news and technology trends related to information security.

Read more about wide area network in Network World's Wide Area Network section.

This story, "Check Point harnesses cloud security to deter botnet infections" was originally published by Network World.