Silverfort
announced that it has partnered with Check Point Software
Technologies Ltd. to enable customers to respond to detected threats in
real-time by stepping-up authentication. The joint solution enables
unparalleled risk-based adaptive authentication throughout the
organization.
One
of the top challenges for security teams trying to respond to detected
threats is the amount of false positive alerts. With this integration,
customers can leverage Silverfort's adaptive authentication platform to
trigger step-up authentication in response to any Check Point detected
threats in real-time and eliminate false positives. For example, if
Check Point detects bot activity from a specific host, Silverfort can
automatically require an additional form of authentication for any
attempt to access resources performed by the suspect host. If the
additional authentication fails, the activity will be blocked.
"The
threat landscape is evolving faster than ever before, requiring
security practitioners to swiftly and concisely respond to detected
threats," says Snir Hassidim, Business and Corporate Development Manager
at Check Point Software Technologies. "This partnership with Silverfort
will improve our customers' ability to respond to these threats, by
stepping up the authentication requirements to seamlessly improve
validation of user identities."
Enabling Real-Time Incident Response with Dynamic Policies
Network
security solutions provide a binary approach to threat prevention: when
detecting a threat, they either block the user, or allow access and
raise an alert. By combining the two solutions, our customers can
leverage dynamic step-up authentication as a response to network
security events. When Check Point identifies a compromised user or
device, it sends an alert to Silverfort which responds by dynamically
stepping up the authentication requirements, demanding the user to use
an additional form of authentication and confirm his/her identity.
Dynamically
stepping up the authentication criteria instead of simply rejecting the
transaction, improves real-time incident response allowing
organizations to respond with effective security measures upon
suspicious activity. It is also less disruptive than automatic blocking
of user access, because it enables the user to quickly confirm his/her
identity and continue without unnecessary disruptions to the business.
Improving Detection of Malicious Activity with High Fidelity-Alerts
Today,
security professionals need to deal with a high volume of security
alerts. Detecting internal malicious activity, like lateral movement,
becomes very difficult because a skilled attacker knows how to blend in
with normal user activity. Distinguishing between false positives and
real malicious incidents is nearly impossible.
To
improve detection of malicious activity, Check Point and Silverfort
increase the fidelity of these alerts by launching MFA verification and
providing the results to be used as additional feedback. By correlating
alerts provided by Check Point with Silverfort's Adaptive MFA results,
security practitioners can obtain a better, more complete view of an
evolving attack, distinguish between true and false positive alerts, and
improve the organization's security posture.
"Corporate
networks have dramatically changed in recent years creating new
security challenges. Perimeters no longer exist, and passwords are no
longer enough to validate and trust our users," says Hed Kovetz, CEO of Silverfort. "By
integrating Silverfort's adaptive authentication with Check Point we
enable our customers to trigger step-up authentication based on
real-time security alerts, and achieve real-time prevention without
reducing the productivity of their legitimate users."