MUMBAI, INDIA: Check Point Software Technologies Ltd announced the acquisition of privately held Dynasec Ltd., a leading provider of Governance, Risk Management and Compliance (GRC) solutions.
The acquisition extends Check Point 3D Security that enables companies to view security as a business process, focusing on policy, people and enforcement. The combined security and GRC solutions will enable customers to manage their entire 3D Security process from corporate objectives, to policies and security enforcement – maintaining a continuous holistic security and compliance picture.
Organizations today face a growing number of industry standards and government regulations that require CIOs and security officers to implement a consistent security framework that adheres to GRC requirements without disrupting the flow of business – a nearly impossible task when done manually.
The acquisition of Dynasec will help organizations accelerate the path to 3D Security by enabling customers to easily translate compliance requirements into IT security policies that map to their overall business objectives.
Check Point’s offering will include security, business and consulting services together with Dynasec’s easy2comply leading GRC software solution that provides a rich set of GRC frameworks with built-in best practices that are customizable for hundreds of compliance standards. The Check Point solution will offer a simple way for businesses to automate the manual task of handling a growing number of regulations and compliance standards.
A major advantage of easy2comply is the ability to implement the technology in less than two weeks, helping customers streamline compliance efforts. By leveraging GRC frameworks that include pre-defined regulatory standards, customers are able to quickly translate business and compliance requirements into IT policies at a fraction of the time it takes most companies.
Integrating these tools with Check Point’s existing security solutions enables customers to define and manage policies that can be applied to all of the company’s leading protections, including Firewall, VPN, Application Control, Intrusion Prevention, Data Loss Prevention, Mobile Access and Endpoint Security – helping organizations create a security blueprint that reflects their specific business needs.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.