Check Point CloudGuard Log.ic protects the cloud from hidden threats
In order to guarantee safety, threat protection must be adapted to the setting: this is the concept behind Check Point CloudGuard Log.ic, a safety solution intended to function natively in public cloud settings. Security executives can track the operations being carried out thanks to embedded analytical instruments so that they can combat threats more efficiently or speed up forensic evaluation.
Check Point CloudGuard Log.ic: Cloud Check Point concealed threats protection performed a study that regulatory compliance (34%) and absence of infrastructure safety visibility (33%) are the two largest issues facing cloud working organisations. This leads to some worrying information: at least one safety incident has been verified by 15% of organisations, although it may be even more alarming that 25% have no concept of any safety faults. This merciless photograph illustrates the need for suitable instruments to safeguard the safety of cloud information and apps.
Check Point CloudGuard Log.ic utilizes a number of instruments such as Amazon Web Services ' VPC Flow Logs (network activity log) and AWS CloudTrail (activity log on a certain account) to collect information to evaluate what occurs in the infrastructure and thereby identify any threats. Security experts can use information in this manner to accelerate investigations or enhance safety of infrastructure and review security policies.
CloudGuard Log.ic utilizes up-to-date data on ThreatCloud threats, the safety landscape developments checkpoint service. It is also possible to generate custom alerts that activate under particular circumstances, such as when customers detect suspect network traffic or unusual activity, or even in case of wrong settings of safety. Changes to the system setup are always related to a user or role, so the entry point can be readily tracked and investigated.
Itai Greenberg, Vice President of Product Management and Marketing at Check Point Software, said that "CloudGuard Log.ic offers our corporate clients with a strong visibility instrument and brings contextuality to all operations in their cloud setting, along with data identifying malicious intent or intrusion detection to avoid mega-attacks of the fifth generation (Gen. V).