Cloud firewall with protection for Virtual WAN

Cloud firewall with protection for Virtual WAN

Share post

A global leader in cyber security solutions announces the general availability of its industry-leading next-generation cloud firewall, factory-integrated with Microsoft Azure Virtual WAN to provide customers with best-in-class security.

The integration provides advanced threat protection and layered network security across public, private, and hybrid clouds. It enables companies to migrate to Azure with maximum operational efficiency.

Network as a Service

"Microsoft Azure Virtual WAN is a Network-as-a-Service, which offers customers a number of benefits because this model simplifies networking, security, and routing functions to drive scalability, cost savings, and improved performance. Native integration between Azure Virtual WAN and Check Point CloudGuard (generally available) enhances and complements the security of Azure Virtual WAN, providing our customers with centralized security in an intuitive and simple offering through the Azure Marketplace,” said Reshmi Yandapalli, Principal Product Manager at Microsoft.

As companies grow and work in a distributed IT environment, connectivity and IT security become an operational challenge. Check Point Research recently reported that the number of cloud-based cyber attacks increased by 2022 percent in 48 compared to the previous year, largely due to companies digitizing their operations and moving them to the cloud. Businesses need to securely connect their cloud infrastructures while protecting communications and collaboration between their employees, partners and customers. CloudGuard's native integration with Azure Virtual WAN solves this challenge by providing secure connectivity that reduces business risk and protects cloud assets.

“Cloud computing enables companies to scale their cloud workloads in seconds. Enterprises need security that is flexible, reduces complexity, and focuses on prevention,” said TJ Gonen, VP of cloud security at Check Point Software Technologies. “We are proud to work with Microsoft to provide Azure Virtual WAN customers with the integrated protection of CloudGuard Network Security, powered by AI, to protect their cloud instances against all advanced threats and start their digital transformation with confidence support."

Do you have a moment?

Take a few minutes for our 2023 user survey and help make B2B-CYBER-SECURITY.de better!

You only have to answer 10 questions and you have an immediate chance to win prizes from Kaspersky, ESET and Bitdefender.

Here you go directly to the survey
 

Benefits of the firewall

  • Industry-leading threat protection: CloudGuard supports all security use cases and includes Firewall, IPS, Application Control, IPsec VPN, Anti-Virus and Anti-Bot, DLP, and Threat Extraction and Threat Emulation for zero-day threats. Check Point network security solutions achieved the highest security effectiveness of 99,7 percent malware prevention and the lowest false positive rate of 0,13 percent, according to the latest Miercom Benchmark Report.
  • Cloud-native and integrated security: CloudGuard was built around the cloud principles of elasticity, availability, resiliency, and seamless support for growing data volumes. It is easy to implement via the Azure Marketplace in the Virtual WAN Hub. CloudGuard is integrated with Azure Routing Intent for security injection: a centralized, simpler, faster, more consistent and scalable way to secure multi-spoke networks.
  • Greater operational efficiency and simplicity: CloudGuard can be easily and quickly deployed as a consumption-based solution. (At the time of this announcement, usage-based billing exists statically with pre-determined billing based on scale units). The integration enables agile maintenance, upgrades and updates, which significantly reduces operational effort.
More at Checkpoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more