Showing posts with label Check Point Software. Show all posts
Showing posts with label Check Point Software. Show all posts

Check Point Software Technologies recognized as Leader in the 2020 Gartner Network Firewall Magic Quadrant

Check Point Software Technologies is proud to be named a Leader in the 2020 Magic Quadrant for Network Firewalls (NFW). This marks the 21st time in the company’s history to be named a Leader by Gartner. We believe, Gartner’s recently published 2020 Magic Quadrant for Network Firewalls report lauds Check Point for its consolidated architecture,…

The post Check Point Software Technologies recognized as Leader in the 2020 Gartner Network Firewall Magic Quadrant appeared first on Check Point Software.



from Check Point Software https://ift.tt/38ANZMl

Check Point CloudGuard integrates with AWS Gateway Load Balancer at Launch

By Jonathan Maresky, CloudGuard Product Marketing Manager, published November 10, 2020 Cloud security is not a trivial practice of “click-and-deploy”, “one-size-fits-all” or even “my cloud vendor is responsible for cloud security”. The shared responsibility model is a critical component of a cloud user’s ability to protect their organization’s cloud assets in the long term and…

The post Check Point CloudGuard integrates with AWS Gateway Load Balancer at Launch appeared first on Check Point Software.



from Check Point Software https://ift.tt/35hqQN6

Check Point Software´s predictions for 2021: Securing the ‘next normal’

“Life is what happens while you’re making other plans,” said John Lennon. And the events of 2020 have shown how right he was.  If you had looked through the predictions and contingency plans of the world’s top 1,000 companies 12 months ago, few (if any) would have included detail on dealing with a global pandemic.…

The post Check Point Software´s predictions for 2021: Securing the ‘next normal’ appeared first on Check Point Software.



from Check Point Software https://ift.tt/3pgafRt

Critical Vulnerability in Windows OS – Check Point customers remain protected

Only five days after Google disclosed information about a critical vulnerability in the Microsoft Windows operating system (CVE-2020-17087), Check Point has officially released protection to keep its customers completely safe. Early protections against vulnerabilities that are under active attack are crucial. Microsoft is expected to release an update today, November 10, 2020, but Google research…

The post Critical Vulnerability in Windows OS – Check Point customers remain protected appeared first on Check Point Software.



from Check Point Software https://ift.tt/3nmb75F

New Check Point R81 is Industry’s First Cyber Security Platform with Autonomous Threat Prevention

By Michael A. Greenberg, Product Marketing Manager, Security Platforms Watch the Webinar Replay Managing cyber security today is complex, there are so many things to take into consideration. Between the systems in place to operate the business, the rapid and constant changing technologies that need to be deployed and the scarcity of cyber experts, the…

The post New Check Point R81 is Industry’s First Cyber Security Platform with Autonomous Threat Prevention appeared first on Check Point Software.



from Check Point Software https://ift.tt/32IBLOf

Check Point Presents the First Autonomous Threat Prevention System

How many hours have you or your security admins spent on managing and configuring threat prevention policies? And how long did it take to get conversant enough with the organization’s needs in order to make sure these policies are suitable for your environments? The inherent faults and endless hours involved in manually configuring these policies…

The post Check Point Presents the First Autonomous Threat Prevention System appeared first on Check Point Software.



from Check Point Software https://ift.tt/38qQOzK

October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks

Check Point researchers report that Trickbot and Emotet top the Global Threat Index, and are being used for distributing ransomware against hospitals and healthcare providers globally Our latest Global Threat Index for October 2020 has revealed the Trickbot and Emotet trojans continue to rank as the top two most prevalent malware in October, and that…

The post October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks appeared first on Check Point Software.



from Check Point Software https://ift.tt/36933y7

Who’s Calling? Gaza and West-Bank Hackers Exploit and Monetize Corporate VoIP Phone System Vulnerability Internationally

Hackers have targeted Sangoma and Asterisk VoIP phone systems at nearly 1,200 organizations worldwide in past 12 months Main purpose of hacking campaign is to sell phone numbers, call plans, and live access to compromised VoIP services. Losses from global telecoms fraud exceed 28 Billion USD, according to CFCA (Communications fraud control association), with VoIP…

The post Who’s Calling? Gaza and West-Bank Hackers Exploit and Monetize Corporate VoIP Phone System Vulnerability Internationally appeared first on Check Point Software.



from Check Point Software https://ift.tt/38cxMNe

Infrastructure as Code assessment with Terraform

Security is of utmost importance for any piece of code or infrastructure The traditional security approach was based on a ticketing system to provision a piece of infrastructure. This method worked well in smaller settings where companies managed small infrastructures with minimum turnover. This was true in the case of private data centers managing VMs…

The post Infrastructure as Code assessment with Terraform appeared first on Check Point Software.



from Check Point Software https://ift.tt/2I2TqbT

Check Point Software Joins Microsoft OCP FY21 Q1 Winners Circle Program

Check Point is proud to announce that Microsoft has awarded us ‘Top Azure P2P IP Co-Sell by an ISV partner’ for the Microsoft OCP FY21 Q1 Winners Circle program. This award adds to the growing list of recognition Microsoft has bestowed upon Check Point Software this year, including: Microsoft’s #1 World Wide ISV Co-Sell Partner…

The post Check Point Software Joins Microsoft OCP FY21 Q1 Winners Circle Program appeared first on Check Point Software.



from Check Point Software https://ift.tt/2TSTqO8

Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks

Healthcare is the most targeted industry, by ransomware, in the US in October October saw a 71% increase in Ransomware attacks against the healthcare sector in the US Ransomware attacks also increased by 33% in APAC and 36% in EMEA Yesterday, the CISA, FBI, and HHS issued a warning against ransomware attacks on U.S. hospitals,…

The post Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks appeared first on Check Point Software.



from Check Point Software https://ift.tt/2Jisu8B

Don’t Let Hackers Throw Your Brand Integrity Down the Drain

By Yaelle Harel and Yair Herling, Technical Product Marketing Social Phishing attacks remain the most successful methods used to execute attacks and steal data. Lookalike domains or emails are often used to mislead users to open emails, click a link, and enter their credentials or any other sensitive data. Hackers count on the trust that…

The post Don’t Let Hackers Throw Your Brand Integrity Down the Drain appeared first on Check Point Software.



from Check Point Software https://ift.tt/34DaH4d

Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak

Check Point Software’s Learning and Training department’s main mission is to make cyber security knowledge accessible to everyone. In just a few months, students and security professionals from all over the world consumed over 1,000,000 free minutes of training, leveraging the wide range of Check Point’s eLearning content. The eLearning offering is designed for professionals…

The post Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak appeared first on Check Point Software.



from Check Point Software https://ift.tt/37RJjRV

Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data

By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point IMC Companies provides supply chain expertise to customers across the U.S. I met with David Ulloa, Chief Information Security Officer at IMC Companies, to learn how the organization protects desktop, laptop, and mobile users from malware, phishing, ransomware, and other threats. READ…

The post Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data appeared first on Check Point Software.



from Check Point Software https://ift.tt/34BiAHg

Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild

Adi Ikan, Network Research & Protection Group Manager On Tuesday October 20, 2020, the NSA published a detailed report informing the public of the top 25 vulnerabilities currently being leveraged and exploited by Chinese hacking groups. The list is mostly composed of high-profile vulnerabilities, such as SIGRed (CVE-2020-1350), BlueKeep (CVE-2019-0708) and CurveBall (CVE-2020-0601). Furthermore, the list encompasses…

The post Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild appeared first on Check Point Software.



from Check Point Software https://ift.tt/3kzNQfd

8-Part Video Guide: How to Secure your Remote Workforce

Part #8: 5 Must Have Protections for Office 365 and G Suite The COVID-19 pandemic has had a dramatic effect on every organization since it came on the scene in late 2019. Businesses of all sizes and shapes around the world have had to adapt at the speed of light, and to make significant infrastructure…

The post 8-Part Video Guide: How to Secure your Remote Workforce appeared first on Check Point Software.



from Check Point Software https://ift.tt/35ACoKg

Use Case: Automated Endpoint Detection & Response

By Yaelle Harel, Technical Product Marketing Manager Only 22% of Security and IT professionals strongly believe that their organization is fully ready to respond to a cyber-attack or a data breach. What about you? Unfortunately, no matter how comprehensive your state-of-the-art security solutions are, you really can’t assume that you won’t get hit with cyber-attack.…

The post Use Case: Automated Endpoint Detection & Response appeared first on Check Point Software.



from Check Point Software https://ift.tt/35CmU8i

Check Point Software and Splunk Showcase Automated Threat Response at Splunk .conf20

20–21 October | AMER 21–22 October | EMEA & APAC Comprehensive security has never been more important than today with the significant increase in remote workers. Sophisticated cyber attacks have increased dramatically since the start of the covid-19 pandemic. These targeted and persistent attacks place high demands on the security staff charged with finding and…

The post Check Point Software and Splunk Showcase Automated Threat Response at Splunk .conf20 appeared first on Check Point Software.



from Check Point Software https://ift.tt/34rIXQ5

5G: Better, Always-on Connectivity Demands Better, Always-on Security

Protecting the new generation of 5G-based applications against advanced cyber-attacks How fast is your Internet connection right now?  No matter what speeds you’re currently getting, they’re just a fraction of the up to 10 gigabits per second promised by 5G.  That’s over 100 times faster than 4G on today’s mobile phones, and 10x more than…

The post 5G: Better, Always-on Connectivity Demands Better, Always-on Security appeared first on Check Point Software.



from Check Point Software https://ift.tt/3knWJZb

Enhancing Threat Hunting with MITRE ATT&CK

By Yaelle Hare, Technical Product Marketing Manager Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involved searching for indicators of compromise (IoC), investigating, classifying and remediate. The hunting can be IoC-Driven, as demonstrated in the previous chapter. It can also be hypothesis-driven, in which the hunt…

The post Enhancing Threat Hunting with MITRE ATT&CK appeared first on Check Point Software.



from Check Point Software https://ift.tt/2TmT6qx

Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Cybersecurity researchers have uncovered a new phishing campaign that exploits social media private messages to propagate malicious payloads...