Download PDF version Contact company

Check Point® Software Technologies Ltd., a provider of cyber security solutions globally, announces the acquisition of a new cloud-based technology that delivers secure remote access created by Odo Security.

This technology will integrate with Check Point´s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any application. The COVID-19 pandemic has driven enterprise adoption of mass remote working for their global workforces, from 30% before the pandemic to 81%.

Threat prevention services

Seventy-four percent plan to enable large-scale remote working permanently. However, many organisations overlooked critical aspects of security in the race to enable remote working, which significantly increased their exposure to cyber-attacks. Now more than ever, organisations need to secure remote connectivity anytime, anywhere to any resource.

Many organisations find themselves compromising security in order to deliver the connectivity required"

Many organisations find themselves compromising security in order to deliver the connectivity required by their business needs,” said Dr. Dorit Dor, VP of Products, Check Point Software Technologies. “By incorporating Odo Security’s unique clientless, cloud-delivered secure remote access to our portfolio of threat prevention services, we help organisations overcome this dilemma. Check Point delivers a consolidated solution to help organisations to securely connect any number of remote employees to everything, from any location, making working from home easier and safer than ever.”

Secure access service edge technology

Odo Security, an Israeli start-up founded in 2017, developed a cloud-based, clientless secure access service edge (SASE) technology that delivers secure remote access. Unlike traditional secure remote access solutions, this technology enables:

  • Users to easily connect through a unified portal to a wide range of applications, such as remote desktops, web applications, database servers, cloud and corporate servers, with no client or software installation.
  • Security administrators to easily deploy the solution in less than five minutes from the cloud. They also gain enhanced visibility including full audit trail of user activity.
  • Zero Trust Architecture to define granular access policy to give the right people in the right context, the least privileged access to applications and reduce the attack surface.

Check Point will integrate Odo Security’s technology into its Infinity architecture and SASE vision. This consolidated solution will deliver the easiest secure remote access with unmatched security, based on NSS top-rated threat prevention security services. The transaction is expected to be closed within a week.

Download PDF version Download PDF version

In case you missed it

SHIELD certification: enhancing security and stakeholder collaboration
SHIELD certification: enhancing security and stakeholder collaboration

In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certifi...

What are the new security applications in colleges and universities?
What are the new security applications in colleges and universities?

College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety an...

Real-time security analytics by Winston-Salem Police Department with Verkada
Real-time security analytics by Winston-Salem Police Department with Verkada

The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driv...

Quick poll
Which feature is most important in a video surveillance system?