Content, Channel partners, Security Program Controls/Technologies, Endpoint/Device Security, Identity, Channel investors, MSSP, Channel partner programs, Threat Intelligence

Technology Integration Partnership: Network Perception and Check Point Software Join Forces

Share
Express using arrows. Leadership brings success. Leadership Concepts with Arrows on Blue Background.

Network Perception, a network audit, compliance and security software provider, and cybersecurity specialist Check Point Software Technologies have forged a technology integration partnership, the companies announced in a prepared statement.

Under the partnership, Check Point will provide security infrastructure while Network Perception’s NP-View platform protects critical assets by offering compliance verification, cybersecurity visibility and operational velocity. This allows for the continuous verification and visualization of the security posture, the companies said.

Network Perception NP-View uses the Check Point Security Management Restful API to import network device configurations, offline or continuously, to instantly visualize network architecture. Accordingly, an organization can identify all points of network connectivity and the exposure of protected assets.

Ensuring Firewall Protection

Network Perception CEO Robin Berthier explained that the combined solution verifies access to ports and services across different trust zones to protect mission critical assets:

“Checking for firewall misconfigurations and conflicting rules sounds easy, but manual audits on dozens or hundreds of firewalls can take days or weeks of time. One error or omission can expose your network to security vulnerabilities and risks. Integrating with Check Point ensures that a security infrastructure is configured the best way possible, protecting networks from the latest threats.”

Jason Min, Check Point’s head of Business Development, added:

“Network Perception’s platform takes essential auditing technology and makes it continuous for proactive OT network security that builds cyber resiliency. By integrating our technologies, our joint solution allows for a fully consolidated cybersecurity architecture that protects business and OT infrastructure against sophisticated cyberattacks across networks, endpoint, cloud and mobile.”

Check Point’s MSSP Offerings

Check Point Software Technologies now offers a partner program that allows MSSPs to use its Horizon security operations suite to boost their earnings and protect their customers against cyberattacks, MSSP Alert reported. The program lets MSSPs leverage Horizon to deliver security operations center-as-a-service (SOCaaS) without an upfront investment. This allows MSSPs to supplement their current services with SOCaaS or deliver new services built on Horizon.

In addition, MSSPs can use and provide co-branded versions of Check Point’s Incident Response (IR) services. This enables MSSPs to utilize Check Point’s IR services to help their customers prepare for and respond to security incidents.

An In-Depth Guide to Identity

Get essential knowledge and practical strategies to fortify your identity security.
Jim Masters

Jim Masters is Managing Editor of MSSP Alert, and holds a B.A. degree in Journalism from Northern Illinois University. His career has spanned governmental and investigative reporting for daily newspapers in the Northwest Indiana Region and 16 years in a global internal communications role for a Fortune 500 professional services company. Additionally, he is co-owner of the Lake County Corn Dogs minor league baseball franchise, located in Crown Point, Indiana. In his spare time, he enjoys writing and recording his own music, oil painting, biking, volleyball, golf and cheering on the Corn Dogs.