February 25, 2016 By Richard Telljohann 3 min read

Collaboration does not come easily to security professionals. There are many understandable reasons for our collaborative hesitancy that go back a long way.

There was security through obscurity, the misguided belief that if we didn’t talk about our environment and infrastructure, we’d be safer because people didn’t know much about our potential weaknesses. There’s the feeling of embarrassment in sharing information about failures in effectiveness within our own organizations.

Or there’s the ultimate humiliation and frustration of suffering a breach, regardless of the sophistication of our defenses and preparedness.

Moving Forward With Collaboration

We have taken some steps in the direction of collaboration. Information Sharing Analysis Center (ISAC) organizations across industries were quite pioneering and have grown in influence. There are definitely more CISOs and security professionals willing to open up and discuss their success and challenges at industry events. There are even platforms such as the IBM X-Force Exchange, set up for the sole purpose of sharing and disseminating threat intelligence among like-minded groups.

But even with these signs of progress, it still feels like hacktivist groups and cybercrime organizations are well ahead in their pursuits due to collaboration and teamwork.

IBM Security and Check Point Software have worked together for a long time, but we now have a bigger purpose for security collaboration: Our goal is to expand collaboration between our two organizations and our products and services to help our mutual customers accelerate their threat protection. These new areas of collaboration and service investments aim to improve visibility, reduce complexity and extend the value of security investments.

Sharing Threat Research

Our first focus area of collaborative defense is in threat research. We’ve joined forces by having researchers from both companies share early-stage threat identification to corroborate and speed analysis.

Check Point’s Threat Cloud and IBM’s X-Force teams are collaboratively using the cloud-based X-Force Exchange platform, leveraging its private collections feature. Developed and validated threat intelligence will be released to the public on X-Force Exchange, available via STIX and TAXII open standards, as well as through each company’s respective product threat feeds. Our initial collaborations are very promising.

In the area of security intelligence and threat protection, we’re improving the collaboration and automation between two premier platforms: Check Point’s Next Generation Threat Protection and IBM’s QRadar SIEM. We’ve recently expanded QRadar’s out-of-the-box integration for Check Point to support the full breadth of its capabilities, including threat emulation, antibot, antivirus, IPS and DLP blades.

Additionally, Check Point will soon be joining the IBM Security App Exchange with a new QRadar App that will fully integrate Check Point’s SmartEvent capability within the QRadar graphical user interface. This will allow users to provide network policy changes and analysis from their standard security operations center (SOC) interface of QRadar.

Collaborative Efforts in the Mobile Space

Collaboration also extends to the mobile world via cloud-based management and threat protection. Check Point is rolling out new integrations between IBM MaaS360 Enterprise Mobile Management (EMM) and Check Point’s Mobile Threat Prevention (MTP). This integration provides simplified deployment of MTP, with visibility to all devices and apps managed by MaaS360, risk scoring of devices and remote configuration and management.

In a future release — expected in spring 2016 — MTP will provide automated mobile remediation by triggering MaaS360 to remove or quarantine risky or potentially malicious apps.

The final area of collaboration between our organizations is the one where it all began 18 years ago: providing managed security services (MSS) based on Check Point’s groundbreaking firewalls.

The IBM MSS team leverages our eight global SOCs and extensive operational experience to provide mutual customers the best experience from Check Point’s threat protection technology. As customers’ network environments have become more complex — and threats more sophisticated — we will continue to collaborate to provide the best MSS experience for Check Point customers around the world.

Security is proving to be best played as a team sport, with trust and open communication among fellow players a best practice for winning. We’re taking the next step in collaboration and are thrilled to have Check Point as a security partner to join and support this new ecosystem.

More from

What we can learn from the best collegiate cyber defenders

3 min read - This year marked the 19th season of the National Collegiate Cyber Defense Competition (NCCDC). For those unfamiliar, CCDC is a competition that puts student teams in charge of managing IT for a fictitious company as the network is undergoing a fundamental transformation. This year the challenge involved a common scenario: a merger. Ten finalist teams were tasked with managing IT infrastructure during this migrational period and, as an added bonus, the networks were simultaneously attacked by a group of red…

A spotlight on Akira ransomware from X-Force Incident Response and Threat Intelligence

7 min read - This article was made possible thanks to contributions from Aaron Gdanski.IBM X-Force Incident Response and Threat Intelligence teams have investigated several Akira ransomware attacks since this threat actor group emerged in March 2023. This blog will share X-Force’s unique perspective on Akira gained while observing the threat actors behind this ransomware, including commands used to deploy the ransomware, active exploitation of CVE-2023-20269 and analysis of the ransomware binary.The Akira ransomware group has gained notoriety in the current cybersecurity landscape, underscored…

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today