Check Point is introducing four applications for its a la carte security platform that allows customers to create tailored security appliances on off-the-shelf hardware. Check Point is introducing four applications for its a la carte security platform that allows customers to create tailored security appliances on off-the-shelf hardware.The new software blades – Application Control, Identity Awareness, Data Loss Prevention and Mobile Access – are part of a new release of the company’s Security Blade Architecture called R75.The company is also launching 3D Security, a program to raise awareness of security problems and best practices and linking them to high-level business needs and strategies, educating end users and consolidating security enforcement with an overall business view, says Gil Shwed, Check Point’s chairman and CEO.The 3D plan is to publish best practices for what corporate security policies should include, such as data access control, mobile use policies, how to handle security incidents, how to respond when users violate policies, exception handling and auditing, Shwed says. One example is a Web-based education service for all corporate employees to familiarize them with security policies and their responsibilities to adhere to them. Many of the areas 3D addresses are also addressed by Check Point products, he says.As for the new software blades, the Application Control tool can discern 100,000 Web applications and widgets, and allow customers to set policies about them. The Identity Awareness blade enables tapping Active Directory to assign security policies to groups or individuals, giving granular controls and reducing configuration time. The Data Loss Prevention blade protects data and engages with pop-ups if they are about to jeopardize sensitive information. Mobile Access integrates the company’s SSL VPN and encryption technologies to protect corporate communications on mobile devices.Read more about wide area network in Network World’s Wide Area Network section. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe