Addressing the sprawling complexity of securing today’s modern enterprise, Check Point has introduced its next-generation security management platform, Check Point R80. The new platform gives IT leaders the ability to consolidate all aspects of their security environment into one single place, enabling for new levels of automation for time-consuming security tasks.
“With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security has become a key initiative beyond the IT department – elevating the role of security to become a more strategic element of the entire organization,” said Gabi Reish, vice president of product management, Check Point. “With the capabilities we’re introducing in R80, we’re focused on empowering security leaders to become a true partner to the business – moving away from being seen as just the ‘enforcer’ toward becoming more of the ‘enabler.’”
Business is increasingly challenged to stay ahead of new threats that are continually evolving. The new R80 management platform addresses this need, providing a unified security approach for enterprises to consolidate all aspects of their security, so they can deploy strong protection efficiently across their organizations. This is accomplished in three key ways:
· The introduction of ‘one console, one policy.’ The new R80 platform ensures consistently strong protections across the entire infrastructure with a single console to manage the perimeter, data center branch and cloud deployments. This means streamlining and gaining greater visibility into policy administration, even allowing multiple administrators the ability to work on the same policy without conflict.
· Better aligning security with business processes and network architectures. The technology in R80 helps security teams keep pace with changing policy by segmenting into manageable sections, aligning security to IT processes, and helping empower security self-service for business owners and freeing key security personnel for strategic security tasks.
· Integration of threat management for a single view into risk across a network. In R80, security teams have full visibility into security status and can react faster to prevent the next attack. Monitoring, logging, reporting and event correlation are all captured into the same, visual, customizable dashboard. This not only enables an easy one-to-two clicks to drill down and quickly troubleshoot an event; it allows teams to create custom-tailored reports for everyone from key business executives to technology partners.