Viewfinity Integrates With Check Point to Broaden and Deal With Threat Remediation Across All Endpoints

WALTHAM, MA — (Marketwired) — 03/17/15 — (), the leading provider of next-generation endpoint application control and privilege management solutions has announced their newest collaboration with Check Point® Software Technologies Ltd. This latest integration cross references Viewfinity–s endpoint application monitoring and forensic analysis with Check Point Anti-Bot Blade and Threat Emulation to detect infected endpoints and accelerate incident response and remediation.

In the unfortunate event that an attack occurs, Viewfinity is able to identify the root source of the suspicious behavior including the threat origin, such as URL, who, when, how many endpoints have been targeted. All endpoints involved in a malicious bot connection and roots associated with the threat are identified; malicious executables and all child processes are blocked. The file history tracking on all endpoints allows organizations to clean-up its environment by removing all occurrences of a bot and related activity from every infected endpoint without having to reimage the computer.

The collaboration between Viewfinity and Check Point Anti-Bot Software Blade provides information to update firewall policies preventing any further connection to the malicious URL or to any other Command and Control Center. This information accelerates incident response times and strengthens firewall enforcement policies to mitigate future risks.

Conversely, Check Point Threat Emulation with virtual sandboxing relays crucial information to Viewfinity endpoint Application Control to help accelerate the ability to contain threats; for example, if an application requires elevated privileges, before granting those permissions, the application can be verified with Threat Emulation to ensure its soundness via digital forensic analysis. If the file is unknown, Check Point inspects the file in a virtual sandbox to identify malicious activity.

.

“Network firewalls that incorporate information and threat sharing between adjacent security controls will be preferred by network security buyers.”
Gartner Research Report: Intelligence Awareness and Adaptive Security Response Will Transform Network Firewall Markets
22 August 2014, Lawrence Pingree

“Check Point Anti-Bot Blade and Threat Emulation offer the quickest protection against undiscovered malware in the industry–s most comprehensive multi-layered security solution available,” said Alon Kantor, vice president of business development at Check Point Software Technologies. “This collaboration with Viewfinity offers our joint customers an integrated solution aimed at an accelerated incident response time and immediate post-incident protection.”

“Our customers and prospects are keen to have this integration realized,” remarked Viewfinity CEO, Leonid Shtilman, “as this comprehensive approach broadens and reinforces endpoint security prevention and network threat protection as a whole. Being able to detect, respond and remove malicious files from all infected computers saves an enormous amount of time typically spent reimaging computers. This integration further leverages the investment already made in Check Point implementations.”

Be sure to visit the Viewfinity booth this year at the CPX Check Point Experience 2015 conference, May 7 and 8 at the Gaylord National Resort in Washington, DC.

Viewfinity–s advanced endpoint protection solution focuses on lessening the impact of IT security breaches before, during and after an attack. Our core capabilities reduce the attack surface and proactively prevent advanced persistent threats by removing administrative rights and monitoring and classifying applications. Suspect software is cross-referenced with network security sandboxes and cloud databases to accelerate detection, incident response and remediation efforts. Follow-up threat investigations are pinpoint accurate due to our ancestry tracking forensics that trace back to the origin of an attack. Viewfinity has a unique remediation differentiator in its ability to locate all instances of software related to an attack and block from further execution and propagation on endpoints. For more information, visit .

Dan Chmielewski
Madison Alexander PR
Office +1 714-832-8716
Mobile: +1 949-231-2965

You must be logged in to post a comment Login