Check Point Software Technologies today announced an alliance with seven security firms to make use of their threat-intelligence feeds and fee data from those sources into Check Point security gateways to block attacks.
Check Point said the six security firms are iSIGHT Partners, CrowdStrike, NetClean, PhishLabs, SenseCy, IID and ThreatGrid. Their cooperation in providing their threat-intelligence information in a way that Check Point security gateways can use for defensive purposes is part of what Check Point calls its Software-defined Protection program which it announced last February
Alon Kantor, vice president of business development at Check Point, said the idea is that each of these six security firms has valuable information about malware sources or impending denial-of-service attacks, for example, that can now be consolidated by Check Point in what it's calling its ThreatCloud IntelliStore service.
+More on Network World: Check Point unveils security architecture for threat-intelligence sharing +
"We're opening up our existing ThreatCloud to third parties for threat-intelligence indicators," said Kantor. The feed from a source such as iSIGHT Partners, which specializes on adversary-focused intelligence, might provide additional information on how to immediately block URLs, IP addresses, malicious files or denial-of-service attacks.
CrowdStrike also collects information on adversaries to gain insight into targeted attacks. Other Check Point alliance partners specialize in different areas, such as ThreatGRID with its malware analysis and PhishLabs with finance-related intelligence. It's expected that Check Point customers could pick and choose which specific six threat-intelligence streams they wanted to use.
Kantor said Check Point expects to provide to the six security firms with an anonymized report of customers that make use of their threat-intelligence stream to ward off attacks or threats flagged by them. "We'll send anonymized reports to these partners, as feedback on their feeds," Kantor said. The report would list the industry the customer is involved in but no identifying information.
Read more about wide area network in Network World's Wide Area Network section.
This story, "Check Point builds seven-armed threat-intelligence sharing alliance" was originally published by Network World.