Check Point has launched MDR 360 ° and MXDR 360 °, two new packages of detection and response managed services designed to simplify protection, accelerate the response to threats and reinforce visibility throughout the digital business environment.

The new solutions are part of the Infinity Global Services portfolio and offer 24/7 protection through a man -managed SOC. They adapt to complex environments and multi supplier, integrate identity protection, advanced analytics and more than 160 integrations with third -party tools.

“With overflowing cybersecurity equipment, our new solutions are designed to lighten the operational load, with real -time detection and effective response, regardless of the supplier,” says Eitan Lussi, vice president of Infinity Global Services in Check Point Software. “It’s not just about alerts, but actionable intelligence. Our combination of AI and experience helps companies better and reinforce their long -term resilience.”

Identity as a new attack border

With the focus of the attackers put more and more in users, the detection of identity -related threats is key. Check Point Software offers real -time monitoring, detection of configuration errors and complete visibility on platforms such as Microsoft AD, Enter ID and OKTA, allowing identifying abuse of access credentials, lateral movements and upgrade of privileges before they become gaps.

Designed to climb and adapt

MDR and MXDR 360 ° are designed to integrate with the tools that companies already use, without losing visibility or control. The new integrations with Amazon, Microsoft, Wiz, among others, improve response flows, prioritizing critical threats to act quickly.

MAIN CAPABILITIES:

  • Open and neutral integration: Compatible with Security tools Cloud, Endpoints, Firewallsf and Saas.
  • Detection of identity threats: Includes native support for Microsoft AD, Enter ID and OKTA.
  • Optimized data management (MXDR): It offers data management with business level and assistance for compliance with regulations. In addition, it optimizes the costs by means of a co -managed approach, using always for high value security and data lake analysis for profitable data retention, threat hunting and research.
  • Expert and flexible response: proactive and reactive response to incidents that include more than 100 hours annual response to incidents led by experts, covering crisis management, simulation, planning and execution manuals aimed at helping companies prepare, respond and recover from cyber attacks. It offers flexible hours for risk evaluations, analysis of the root cause and other types of custom support to reinforce cyberbrenciencia.
  • Complete coverage 24/7: Unified Research, Research and Response on the entire attack surface by alerts to proactively identify threats and go to go when an active attacker is confirmed, which allows faster verdicts and actions throughout the life cycle of the threat, unlike the response to incidents, which focuses on crisis management during an active infraction.

Check Point MDR and MXDR 360 ° are available at three flexible subscription levels. MDR includes the basic detection and response functions with Endpoint and APIS agents. MDR 360 ° Add identity protection, more integrations and access to Infinity XDR/XPR with artificial intelligence to enrich incidents and contextualize threats. MXDR 360 ° provides a complete solution with always managed, Data Lake and SOC shared operations.

Check Point Infinity Global Services provides end -to -end safety solutions to more than 5,000 companies worldwide. From proactive evaluations and intelligence of threats to professional services and soc, it helps companies reinforce their cybercraft, reduce risks and improve their preparation with the support of artificial intelligence in real time and a global team of experts.

MDR 360 ° and MXDR 360 ° are a firm commitment to Check Point Software for open, neutral and integrated services, designed to respond to the most demanding cybersecurity challenges. In an environment with increasingly sophisticated threats, regulatory pressure and shortage of specialized profiles, these solutions offer continuous protection and an expert response from a man -managed SOC, including detection of identity threats and advanced storage and analysis capabilities.