TMCnet News

Damballa Announces Failsafe Integration with Check Point Software
[January 20, 2016]

Damballa Announces Failsafe Integration with Check Point Software


Damballa, the experts in network security monitoring, today announced its Failsafe threat detection platform now integrates with Check Point Software (News - Alert) Technologies (NASDAQ: CHKP), the largest pure-play security vendor globally to help customers identify and mitigate external threats at the earliest possible stage. With this integration, customers of Check Point will be able to leverage Damballa Failsafe to discover active infections, notify Check Point of suspected infected devices, and identify whether communication attempts are being made with a command and control (C&C) server.

"Check Point has established a reputation in the market for implementing proactive and preventative technologies to block malware before it wreaks havoc in a company's network," said Steve Laubenstein, VP, Business Development & Strategic Partnerships. "With this integration, customers of Check Point can take advantage of Damballa's highly sophisticated threat detection system, which is based on years of machine learning as well as the industry's largest data set, to automate their response to a breach of their network. We are confident that our combined solutions will enable customers to rapidly pinpoint infections and reduce the time to remediation."

Damballa Failsafe leverages a distributed computing architecture that enables the seamless addition of powerful new detection modules, ease of integration with other security technologies, and more efficient processing power. As a result, enterprises can 'future-proof' their threat detection platform to deal with current and emerging threats.

The integration of Damballa and Check Point works in the following manner:





 
1. Damballa Failsafe discovers an infected device, suspected device and/or active C&C domains
 
2. Damballa Failsafe notifies Check Point of device state and identified C&C communication attempts
 
3. Check Point implements policies based on device state (suspected or infected) information (i.e., block infected assets from communicating to internet and/or high-value assets, enhance logging on suspected assets)
 
4. Check Point blocks active C&C communication attempts identified by Failsafe
 

"Customers of all sizes worldwide rely on Check Point for leading edge protection technologies," said Alon Kantor, vice president of business development at Check Point. "By utilizing Damballa's intelligence to find devices communicating with known C&C infrastructure, Check Point can seamlessly update network policy and reduce the time it takes for organizations to address the latest threats to their environments."

To learn more about the integrated offering between Damballa and Check Point, click here.

About Damballa

Damballa is a network security monitoring system that provides evidence of threat-related activity needed to prevent data theft. We discover criminal operators that have already bypassed perimeter defenses and pose a business risk. Our automated system works in real-time and over time regardless of the attack vector, device type or OS. Attackers may take time to reveal themselves and when they do, Damballa will expose them and initiate mitigation. Our patented solutions leverage Big Data from one-third of the worlds Internet traffic, combined with machine learning, to automatically discover and terminate criminal activity, stop data theft, minimize business disruption, and reduce the time to response and remediation. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android (News - Alert), and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information, visit www.damballa.com, or follow us on Twitter (News - Alert) @DamballaInc.


[ Back To TMCnet.com's Homepage ]