Download PDF version Contact company

Check Point® Software Technologies Ltd., a pioneering provider of cyber security solutions, has announced the acquisition of Atmosec. An early-stage start-up, Atmosec specialises in the rapid discovery and disconnection of malicious SaaS applications, preventing risky third-party SaaS communications, and rectifying SaaS misconfigurations.

The move reinforces Check Point's commitment to enhance its SaaS security offering and address the security gaps and blind spots in SaaS applications. Atmosec was founded in January 2021 and employs 17 employees.

Atmosec's research

The widespread adoption of SaaS applications has exposed organisations to an increased array of cyber threats. Statista reports an average use of 130 SaaS applications by organisations. Yet, Atmosec's research reveals that there are approximately 700 additional SaaS applications in use without IT's knowledge. 

Moreover, within popular enterprise SaaS platforms like O365 and Slack, hundreds of third-party apps are connected. This ever-expanding SaaS landscape not only increases the potential attack surface, but also introduces many apps that could be harmful or misused to leak sensitive information, often bypassing proper IT authorisation.

Author's quote

The shift to SaaS applications introduces specific challenges, notably in the realm of malicious

The shift to SaaS applications introduces specific challenges, notably in the realm of malicious SaaS-to-SaaS communications. Atmosec's capabilities in SaaS discovery, risk assessment, and full visibility are instrumental in addressing these challenges,” says Nataly Kremer, Chief Product Officer and Head of R&D at Check Point Software Technologies.

She adds, "Integrating Atmosec's technology into Check Point Infinity sets us to deliver one of the industry's most secure SASE solutions, enabling organisations to effectively manage SaaS security, prevent data leaks, unauthorised access, and malware dissemination, and ensure a robust, adaptive zero trust environment.”

Key features

Key features of Atmosec's technology include:

  • Quick discovery and disconnection of malicious SaaS applications, completed in under 10 minutes
  • Prevent third-party SaaS applications from communicating with an enterprise’s SaaS environment
  • Provide full visibility into authorized and unauthorized SaaS applications
  • Fix misconfigurations within SaaS applications such as publicly exposed repositories, 
  • Enforce multi-factor authentication (MFA) to access the application, and many more.

Critical enhancements

With Atmosec’s technology, Check Point Infinity will offer SaaS security with continuous SaaS posture management, prevention of malicious communications (SSPM), and a full security stack for SaaS apps including threat prevention, data protection, and adaptative zero-trust access controls for both users and devices (CASB). 

New capabilities will be incrementally released based on roadmap milestones, enabling organisations to utilise these critical enhancements from the same Check Point Infinity platform they already use. The acquisition of Atmosec is expected to close by mid-September 2023.

 

Download PDF version Download PDF version

In case you missed it

Honeywell - how disruptive technologies make security systems better
Honeywell - how disruptive technologies make security systems better

The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years.  There is a higher demand...

Has price inflation ended (or slowed down) in the security market?
Has price inflation ended (or slowed down) in the security market?

Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It hap...

Proactive security: the future of perimeter defence
Proactive security: the future of perimeter defence

The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. W...

Quick poll
Which feature is most important in a video surveillance system?