Menlo Integrates Security Platform With Check Point Firewalls, Gateways
Joint Check Point and Menlo Security customers can now set policies to determine which traffic types and user groups pass from Check Point’s gateways to the Menlo Security Isolation Platform.
April 13, 2016
PRESS RELEASE — Menlo Park, Calif. – April 13, 2016 – Menlo Security, a pioneer of cloud-based malware isolation, today announced a partnership to help organizations protect their users from Web and email attacks by integrating the Menlo Security Isolation Platform with Check Point’s (NASDAQ: CHKP) Industry-Leading Next-Generation Firewalls and vSEC Virtual Edition Gateways. With this partnership, Check Point’s security gateways can selectively steer network traffic to Menlo Security’s Isolation Platform based on policy controls.
“Menlo Security’s Isolation Platform is a great compliment to Check Point’s Next-Generation Firewalls and vSEC Virtual Edition Gateways enabling our customers to prevent threats from Web and email attack vectors,” said Alon Kantor, vice president of business development at Check Point Software. “The seamless integration of our technologies enables customers to deploy cutting edge solutions in an increasingly complex and cloud-oriented security environment. Now, our customers can prevent future attacks by isolating Web browsers and email applications with the full range of protection provided by the Check Point Software Blade architecture.”{ad}
Unlike current threat prevention systems that attempt to distinguish good content from bad, Menlo Security isolates and executes Web and email content in its cloud-based Isolation Platform, before it reaches user devices. This ensures no content can reach the end user’s device, thus keeping it safe from malware. Joint Check Point and Menlo Security customers can now easily set policies to determine which traffic types and user groups pass from Check Point’s gateways to the Menlo Security Isolation Platform. Customers deploying the joint solution will benefit from:
Complete isolation of Web and email content via Menlo’s Isolation Platform
Streamlined deployment with integrated security policies
Seamless end user experience
“Our collaboration with Check Point gives our joint customers flexible deployment options that fit within their existing security architectures.” said Poornima DeBolle, chief product officer at Menlo Security. “This work ensures that whether the deployment is in a private or public cloud, we can deliver a validated enterprise scale implementation. The partnership is a significant expansion of Menlo’s Technology Partner Program, reinforcing our commitment to customer success.”
Additional Resources
Learn about Menlo Security
Engage with Menlo Security on Twitter
Follow Menlo Security on LinkedIn
Read more on the Menlo Security blog
About Menlo Security
Menlo Security protects organizations from cyber attack by eliminating the threat of malware from Web and email. Menlo Security’s cloud based Isolation Platform easily scales to provide comprehensive protection across organizations of any size without requiring end point software or impacting end user experience. Menlo Security is trusted by some of the world’s largest enterprises, including Fortune 500 companies and financial services institutions. Backed by General Catalyst, Sutter Hill Ventures and Osage University Partners, Menlo Security is headquartered in Menlo Park, California. For more information, visit http://www.menlosecurity.com or @menlosecurity.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the largest pure-play security vendor globally, provides industry-leading solutions and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending the entire enterprise, from networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
Read more about:
AgentsAbout the Author
You May Also Like