Check Point® Software Technologies Ltd. announced Infinity Total Protection: a revolutionary security consumption model that enables enterprises to prevent Gen V cyberattacks. This innovative model utilizes Check Point Infinity Architecture components, providing the high level of security, while also reducing cost by consolidating security components. Infinity Total Protection is a game-changing new consumption model with a simple all-inclusive, per-user, per-year subscription offering. The offering enables enterprises to fully utilize Gen V security across their entire network. Infinity Total Protection is the only subscription solution available now that includes both network security hardware and software, with fully integrated endpoint, cloud and mobile protections and zero-day threat prevention, together with unified management and 24x7 premium support. Check Point Infinity Total Protection delivers the broadest set of security technologies to protect organizations against the most advanced and unknown threats, including: Real-time Threat Prevention: Protection against APTs and unknown zero day malware, using real-time sandboxing; ransomware protection; and anti-bot technologies, powered by integrated, real-time cloud-based threat intelligence and machine learning for identifying new threats. Advanced Network Security: The most advanced firewall, intrusion prevention and application control, supporting networks of any size – from branch offices to global enterprises, and across both private and public cloud security offerings. Cloud Security: Advanced threat prevention security in public, private and hybrid cloud, and SDN environments, with micro-segmentation for east-west traffic control inside the cloud. Mobile Security: Malware prevention on iOS and Android mobile devices, rogue network identification, secure containers, data protection and document encryption, and EMM integration. Data Protection: Anti-ransomware for known and unknown ransomware, data protection and seamless document encryption, browser security, a fully integrated endpoint protection suite and security forensics. Integrated Security & Threat Management: A unified security management environment supporting multi-device, multi-domain and multi-admin management, with complete threat visibility supporting collection, correlation and attack analysis, and reporting tools for compliance and audit.