Kiteworks and Check Point Together Deliver Advanced Threat Prevention for File Sharing
Advanced threat prevention for file sharing is a necessity for any SMB or enterprise that hopes to defend against data breaches and cyber attacks.
Kiteworks and Check Point have partnered to make Check Point’s award-winning advanced threat prevention solution available for the Kiteworks secure file sharing and governance platform.
Why Enterprises Need Advanced Threat Prevention for File Sharing
In cyber defense, it’s becoming increasingly difficult to recognize and repel attacks. CISOs and security analysts might know who the attackers are—criminal syndicates, hackers, nation states, or other malefactors. But knowing exactly how the enemy is going to attack and where the enemy is going to penetrate the firewall has become a high-stakes, maddening hunt.
Detecting known malware is relatively easy so attackers have become experts at disguising their attacks. Stealth attacks, particularly those that employ zero-day vulnerabilities that have yet to be discovered, can cause serious damage by causing a data breach or by disrupting operations with a DDoS attack, ransomware, or some other form of malfeasance. Because zero-day attacks are often unleashed when an email recipient clicks on a file attachment, advanced threat prevention for file sharing becomes absolutely critical.
Advanced Threat Prevention for File Sharing Delivered: The Kiteworks Platform and Check Point SandBlast
Kiteworks (formerly Accellion) and Check Point today announced a joint partnership to deliver advanced threat prevention for file sharing. This solution, comprising the Kiteworks secure file-sharing and governance platform and the Check Point SandBlast advanced threat protection platform, assures CISOs and their security teams that all files shared through the Kiteworks platform have been scanned for zero-day threats, advanced persistent threats, ransomware, and other types of malware.
Through an integration with the Kiteworks platform, SandBlast can now analyze all files uploaded to Kiteworks or to any Enterprise Content Management (ECM) platform being managed through a Kiteworks connector. In addition, SandBlast can automatically analyze all files sent through Kiteworks email links. Because all files shared through Kiteworks now receive in-depth scrutiny for malware from the industry-leading advanced threat protection solution, enterprises achieve advanced threat prevention for file sharing.
“We see our partnership with Check Point as a very important step in furthering the secure sharing of sensitive information outside of an organization’s firewall,” said Jonathan Yaron, Chief Executive Officer at Kiteworks. “By integrating with SandBlast, we strengthen our security offering, which is a cornerstone of our strategy. Together, we can ensure that any information that enters or leaves the organization is protected and in turn reduces the risk of a data breach.”
“Within this current threat environment, it’s imperative for organizations to have full confidence that the information coming into and going out has not been compromised in any way,” commented Nathan Shuchami, Vice President, Emerging Products at Check Point Software Technologies. “By integrating Kiteworks with SandBlast, Check Point’s advanced threat prevention platform, we provide our customers additional peace of mind that their largest and most sensitive files remain secure and free of any malware, even as they travel beyond enterprise borders.”
With advanced threat prevention for file sharing, Check Point customers use SandBlast to protect Office 365 email, enterprise networks, web browsers, and devices such as PCs, Macs, smartphones, and tablets.
Know—and Stop—Your Enemy
Security attacks occur around the clock in continuously evolving patterns and with ever more subtle techniques. With advanced threat prevention for file sharing, enterprises stop attacks and protect their sensitive information.
To learn more about how Kiteworks integrates with advanced threat prevention and other security solutions to prevent data breaches and repel cyber attacks, schedule a custom demo of Kiteworks today.
Additional Resources
- Glossary Security Risk Management
- Glossary Some Important Supply Chain Risk Strategies
- Glossary Integrated Risk Management (GRC)
- Blog Post A Guide to Information Security Governance
- Glossary Why Cybersecurity Matters