Centralized vulnerability detection platform

Centralized Vulnerability Detection Platform - AI MS

Share post

Horizon IOC: Check Point integrates a new platform into its IT security architecture. This means there is now central management of vulnerability detection for Horizon XDR/XPR and Playblocks. 

The innovative platform fits seamlessly into the Horizon architecture and can be easily integrated into the Horizon XDR/XPR and Playblocks products. The latter fill Horizon IOC automatically after the integration. With their help, Indicators of Compromise (IOC) can be evaluated much more easily than before.

Consolidation of data at one point

Horizon IOC stitches together data from various sources, including other Check Point products, SOC teams, and external components. This creates a high level of user-friendliness because various data streams and records are made visible on a management interface. Security guidelines and policies are also enforced across all company systems, including Check Point's products as well as third-party and proprietary systems.

Users can also enter values, descriptions and names and transfer the specifications to the entire organization with one click. You can also group different IOCs into different feeds to improve overview. The product can also be connected to real-time feeds and IOCs can be manually imported to stay current with the threat landscape. Additionally, Horizon IOC can receive external updates, such as from threat intelligence feeds.

Important points for Horizon IOC

  • Centralized IOC management for seamless control
  • Immediate enforcement of policies across the organization
  • Automatic populating of IOCs for quick response
  • Easy and fast IOC creation
  • Improved management and control
  • Constantly updated IOC feeds for timely protection
More at CheckPoint.com

 


About check point

Check Point Software Technologies GmbH (www.checkpoint.com/de) is a leading provider of cybersecurity solutions for public administrations and companies worldwide. The solutions protect customers from cyberattacks with an industry leading detection rate for malware, ransomware and other types of attacks. Check Point offers a multi-level security architecture that protects company information in cloud environments, networks and on mobile devices, as well as the most comprehensive and intuitive “one point of control” security management system. Check Point protects over 100.000 businesses of all sizes.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more