Check Point Aims to Expand Reach of Cloud Service

Check Point Software Technologies this week previewed additional capabilities for its Infinity Next cloud service that will be added this year, including support for Linux platforms and a raft of internet of things (IoT) devices.

Speaking at the company’s CPX 2020 conference, Check Point CEO Gil Shwed told conference attendees there are now more than 60 cybersecurity services available via Infinity Next that soon will be able to secure more than 50 types of IT assets and platforms.

Shwed said it would require products from 19 different cybersecurity vendors to provide similar capabilities at a cost of $5.9 million. That compares to a cost of less than $2.7 million for products and services provided by Check Point and three other industry partners, he said. At that cost differential, Shwed made it clear Check Point will be trying to drive consolidation across the entire cybersecurity landscape in 2020.

Infinity Next is designed to be consumed via a subscription. Organizations can opt to consume the entire platform or employ various modules à la carte as they see fit. Like most cybersecurity vendors, Check Point is trying to transition to a cloud model based on subscription revenue versus relying solely on on-premises deployments that typically are acquired as a capital expense. Check Point continues to offer on-premises cybersecurity equipment, but Shwed noted cloud services make it easier for organizations to consume more cybersecurity technologies at a time when threats are more complex than ever.

At the core of Infinity Next is a lightweight nano agent that Check Point is asking developers to include in everything from mobile devices to containers. Less than 50MB in size, that nano agent captures telemetry data that is shared with either Infinity Next or a local instance of Check Point’s software infused with machine learning algorithms and other forms of advanced analytics.

Shwed said Check Point in 2020 also plans to further the adoption of best DevSecOps practices via integration with IT automation frameworks from Puppet and Chef. Check Point already supports Terraform and Ansible.

In addition, Check Point will be enhancing the workflows that can be driven via its application programming interfaces (APIs).

Finally, Check Point will also be adding support for Macintoshes to Check Point Sandblast, endpoint protection software that detects zero-day threat at the CPU level.

While Check Point remains a cybersecurity leader, competition has become fierce as a wave of mergers and acquisitions sweeps the sector. In the last two years, Check Point acquired Dome9, a provider of cybersecurity tools for cloud environments, and ForceNok, a provider of web application and application programming interface (API) protection software. As a rule, Check Point has preferred to develop its own products and services to simplify integration across its portfolio.

It’s too early to say whether a transition to the cloud will enable Check Point to extend its reach beyond its primary base on enterprise IT customers. What is clear is the portfolio of services provided is the overall size of the addressable market Check Point serves will continue to expand as new services are continually added to its portfolio.

Featured eBook
Open Source Security: Weighing the Pros and Cons

Open Source Security: Weighing the Pros and Cons

Over the past few years, open source has grown in popularity, especially among developers using open source code in their application development efforts. Open source software offers incredible benefits to enterprises IT and development efforts. Free, available software libraries mean cost savings, easy customization, speed, agility and flexibility for development and IT teams. There are … Read More