The alliance of Positive Technologies and Check Point sets a higher standard in network perimeter and web resources security

Positive Technologies and Check Point Software Technologies Ltd. (NASDAQ: CHKP) have established a technological alliance to create an integrated approach to corporate network perimeter and web resources security. The partners have released a joint solution that integrates PT Application Firewall and Check Point network devices. The combined solution provides maximum protection for vital web services and applications (online banking systems, electronic trading platforms, public service portals, and various business applications) across the business spectrum.

Our research shows that 71% of web applications tested were found to contain critical vulnerabilities. The attack vector for malicious intrusion into a company’s internal network is based primarily on the exploitation of vulnerabilities in the code of web applications. This prevents traditional systems from implementing information security countermeasures in full, as the classic set of perimeter control tools are ineffective,” says Johan Nordstrom, VP Business Development, Application Security at Positive Technologies. “So not only is it vital to use protection tools such as Web Application Firewall and Network Firewall on a standalone basis, but there must be a technological tandem of tools to exchange information in online mode. This guarantees a new level of protection for corporate resources, fully covering the network and application level.”

As part of the integration, rules were implemented for the exchange of information between both companies’ products with corresponding connectors developed. The two technologies interact in “machine-to-machine” format, ensuring comprehensive protection of web resources: PT Application Firewall detects and blocks attacks, and forwards information about the attacker’s IP address with the lock timeout to Check Point devices, which in turn then blocks requests from the suspicious source at the network level.

The joint solution for securing the corporate perimeter (including web resources) offers protection against zero day attacks (thanks to machine-learning mechanisms embedded in PT Application Firewall) and DDoS attacks on applications, and detects anomalies. In addition, it greatly facilitates the investigation of incidents and features flexible scalability.

“The joint solution provides real-time protection of network perimeter and web applications with automated notifications about incidents. Our approach is to combine the cutting-edge technologies by Check Point and Positive Technologies as a way for creating a new level of protection for corporate information resources. We have already demonstrated successful variations of the joint solution with companies of all sizes, from small businesses to major corporations and large datacenters,” notes Alon Kantor, Vice President of business development, Check Point Software Technologies.

Positive Technologies is a member of the OPSEC (Open Platform for Secure Enterprise Connectivity) programme, launched by Check Point in 1997 and based on the idea of combining technologies around a common enterprise information security system. This allows for tighter integration between Positive Technologies products and Check Point security tools, as well as the information security solutions of the more than 350 vendors participating in the programme. It also significantly expands the development potential of the corporate network security business as a whole.

Positive Technologies is a leading global provider of enterprise security solutions for vulnerability and compliance management, incident and threat analysis, and application protection. Commitment to clients and research has earned Positive Technologies a reputation as one of the foremost authorities on Industrial Control System, Banking, Telecom, Web Application, and ERP security, supported by recognition from the analyst community. Learn more about Positive Technologies at www.ptsecurity.com.

© 2016 Positive Technologies. Positive Technologies and the Positive Technologies logo are trademarks or registered trademarks of Positive Technologies. All other trademarks mentioned herein are the property of their respective owners.

[email protected]                         www.ptsecurity.com


Open Platform for Secure Enterprise Connectivity (OPSEC) is a concept proposed by Check Point. It envisages the creation of a single baseline platform to integrate and manage all aspects of enterprise information security by connecting various additional components through standard interfaces. The platform integrates information security technologies by means of open standards and tools. The standardisation of security tools is threefold, involving the use of the INSPECT language or Inspection Module, open communication protocols and the OPSEC SDK toolkit in developing information security products.