Subscribe To Our Daily Enewsletter:

Check Point Introduces Unified Security Management Cloud Service

Check Point Software Technologies has released R80 Security Management-as-a-Service (MaaS), a cloud version of the company’s unified security software.

Organizations can use R80 Security MaaS to deploy Check Point’s unified security management across their network fabric via their web browser, the company said. That way, they can use Check Point’s unified security management capabilities across on-premises appliances, networks and cloud, mobile and Internet of Things (IoT) environments.

What Does R80 Security MaaS Offer?

R80 Security MaaS’s features include:

  • Ability to store and access logs indefinitely.
  • Automatic updates.
  • On-demand expansion.
  • Zero maintenance.

In addition, R80 Security MaaS provides security visibility across organizations’ infrastructure, Check Point stated. This ensures that organizations can use R80 Security MaaS to reduce operational time by up to 60 percent in comparison to other security solutions.

R80 Security MaaS is available via Check Point’s Fast Track Network Security solutions, which are offered by the company’s global network of partners.

Check Point Launches Partner Growth Program

The R80 MaaS release comes after Check Point last week announced the Partner Growth Program, a global partner program designed to help VARs and MSSPs deliver next-generation security services and acquire new customers. Check Point launched the Partner Growth Program at its CPX 360 conference.

VARs and MSSPs can join the Partner Growth Program to access expert resources and find ways to deploy new solutions and improve the overall product experience, Check Point said. They also can earn incentives and rewards for supporting Check Point’s solutions.

Check Point delivers cybersecurity solutions to more than 100,000 government and corporate organizations worldwide. Furthermore, Check Point provides a multilevel security architecture to protect organizations against cloud, network and mobile attacks.

Return Home

No Comments

Leave a Reply

Your email address will not be published. Required fields are marked *