D3 Security, the leader in next-generation security orchestration, automation and response (SOAR), announced a new partnership with Check Point Software Technologies Ltd., a leading provider of cyber security solutions globally, to help security teams automate and orchestrate response to the next generation of cyberattacks. The partnership features integration between D3 NextGen SOAR and multiple Check Point products, bringing together best-of-breed technologies to rapidly validate and disrupt even the most advanced cyberattacks.

D3’s integrations include Check Point SandBlast and Next Generation Firewall (NGFW). Customers can now use D3 to automate critical enrichment and response actions, including MITRE ATT&CK-based correlation and surveillance, enabling proactive response to today’s fast-moving cyberattacks. D3 has also joined the Check Point Technology Integration Program.

Recommended AI News: Embrace Serverless IoT/ AI Workloads: Hasura GraphQL Goes Server-Less With New Cloud Launch

“The integration between D3 and Check Point helps customers combat modern cyber threats, which are highly dynamic and evasive,” said Gordon Benoit, D3 Security President. “By combining Check Point’s and D3’s solutions, customers can automate and scale incident response workflows and dramatically reduce dwell and response times.”

“Check Point’s integration with D3 NextGen SOAR helps customers rapidly respond to threats against on-premise networks, endpoints, cloud and mobile. We are pleased that Check Point and D3 Security customers can have real-time alerts and threat intelligence acted upon quickly,” said Itai Greenberg, VP of Product Management at Check Point Software.

Recommended AI News: Intel Powers Memory-Optimized Azure Virtual Machines (VMs) Featuring Deep Learning Boost Technology

Unlike traditional incident response, which requires manual coordination, the integrated approach enabled by D3 and Check Point combines alerts and threat intelligence with fast-acting playbooks for the validation, conviction and remediation of threats. This unified detect-and-respond model helps security teams see beyond the individual stages of a cyberattack, allowing for improved decision-making and faster remediation of advanced cyberattacks.