ThreatConnect Marketplace
  • Apps
  • Playbooks
  • Apps
  • Playbooks
Home » Apps Overview » Check Point Security Management
Back to Apps
Related Resources
  • Check Point - Blog

Categories:
  • Network Security
Built by

ThreatConnect

Check Point Security Management

This new Playbook App automates adding and removing known malicious IOCs in Check Point Security Management. These actions may take place as part of an Incident Response workflow, Phishing Email Triage workflow, or enriching/processing intelligence from OSINT or Premium Intelligence feeds.

The following actions are available:

  • Add Threat Indicator – Add a new Threat Indicator via the Check Point R80 Management API.
  • Delete Threat Indicator – Delete a Threat Indicator via the Check Point R80 Management API.

The ThreatConnect integration with Check Point provides ThreatConnect users the ability to directly push IOCs into their Check Point Firewall. The integration is performed by a Playbook, ThreatConnect’s automation & orchestration capability. When the Playbook gets triggered, the specified indicator gets pushed to the Check Point block list. When malicious indicators are identified, the block is happening instantaneously. Once the indicators have been added to the block list, the team gets notified that malicious indicators have been blocked. Additionally, a dashboard can be created to show the total amount of malicious indicators that have been blocked which can be used for tracking and reporting metrics.

This listing can be found in the ThreatConnect App Catalog under the name Check Point Security Management.

Related Apps

McAfee Web Gateway
Network Security

With the McAfee Web Gateway Playbook app, you can add and remove items from a list on a targeted application within McAfee...

Zscaler Internet Access
Network Security

The ThreatConnect and Zscaler integration enables customers to automate their incident response and proactively protect their...

Palo Alto Networks NGFW
Network Security

The integration ensures that customers can prioritize which threats are relevant to their organization.

Developers

  • Knowledge Base
  • Training Site

Company

  • ThreatConnect
  • Contact Us
  • Blog
  • Twitter
  • Facebook
  • Linkedin

© Copyright - ThreatConnect Marketplace
Scroll to top