Security Technology
Showing posts with label
Check Point Software
.
Show all posts
Showing posts with label
Check Point Software
.
Show all posts
Check Point Software Technologies recognized as Leader in the 2020 Gartner Network Firewall Magic Quadrant
›
Check Point Software Technologies is proud to be named a Leader in the 2020 Magic Quadrant for Network Firewalls (NFW). This marks the 21st ...
Check Point CloudGuard integrates with AWS Gateway Load Balancer at Launch
›
By Jonathan Maresky, CloudGuard Product Marketing Manager, published November 10, 2020 Cloud security is not a trivial practice of “click-an...
Check Point Software´s predictions for 2021: Securing the ‘next normal’
›
“Life is what happens while you’re making other plans,” said John Lennon. And the events of 2020 have shown how right he was. If you had lo...
Critical Vulnerability in Windows OS – Check Point customers remain protected
›
Only five days after Google disclosed information about a critical vulnerability in the Microsoft Windows operating system (CVE-2020-17087),...
New Check Point R81 is Industry’s First Cyber Security Platform with Autonomous Threat Prevention
›
By Michael A. Greenberg, Product Marketing Manager, Security Platforms Watch the Webinar Replay Managing cyber security today is complex, th...
Check Point Presents the First Autonomous Threat Prevention System
›
How many hours have you or your security admins spent on managing and configuring threat prevention policies? And how long did it take to ge...
October 2020’s Most Wanted Malware: Trickbot and Emotet Trojans Are Driving Spike in Ransomware Attacks
›
Check Point researchers report that Trickbot and Emotet top the Global Threat Index, and are being used for distributing ransomware against ...
Who’s Calling? Gaza and West-Bank Hackers Exploit and Monetize Corporate VoIP Phone System Vulnerability Internationally
›
Hackers have targeted Sangoma and Asterisk VoIP phone systems at nearly 1,200 organizations worldwide in past 12 months Main purpose of hack...
Infrastructure as Code assessment with Terraform
›
Security is of utmost importance for any piece of code or infrastructure The traditional security approach was based on a ticketing system t...
Check Point Software Joins Microsoft OCP FY21 Q1 Winners Circle Program
›
Check Point is proud to announce that Microsoft has awarded us ‘Top Azure P2P IP Co-Sell by an ISV partner’ for the Microsoft OCP FY21 Q1 Wi...
Hospitals Targeted in Rising Wave of Ryuk Ransomware Attacks
›
Healthcare is the most targeted industry, by ransomware, in the US in October October saw a 71% increase in Ransomware attacks against the h...
Don’t Let Hackers Throw Your Brand Integrity Down the Drain
›
By Yaelle Harel and Yair Herling, Technical Product Marketing Social Phishing attacks remain the most successful methods used to execute att...
Check Point Software Provides Over 1,000,000 eLearning Minutes since the Covid-19 Outbreak
›
Check Point Software’s Learning and Training department’s main mission is to make cyber security knowledge accessible to everyone. In just a...
Shipping Logistics Leader IMC Deploys Check Point SandBlast Agent to Safeguard Supply Chain Data
›
By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point IMC Companies provides supply chain expertise to cu...
Measuring the Global Impact of the NSA’s Top 25 Vulnerabilities Being Exploited In the Wild
›
Adi Ikan, Network Research & Protection Group Manager On Tuesday October 20, 2020, the NSA published a detailed report informing the pub...
8-Part Video Guide: How to Secure your Remote Workforce
›
Part #8: 5 Must Have Protections for Office 365 and G Suite The COVID-19 pandemic has had a dramatic effect on every organization since it c...
Use Case: Automated Endpoint Detection & Response
›
By Yaelle Harel, Technical Product Marketing Manager Only 22% of Security and IT professionals strongly believe that their organization is f...
Check Point Software and Splunk Showcase Automated Threat Response at Splunk .conf20
›
20–21 October | AMER 21–22 October | EMEA & APAC Comprehensive security has never been more important than today with the significant in...
5G: Better, Always-on Connectivity Demands Better, Always-on Security
›
Protecting the new generation of 5G-based applications against advanced cyber-attacks How fast is your Internet connection right now? No ma...
Enhancing Threat Hunting with MITRE ATT&CK
›
By Yaelle Hare, Technical Product Marketing Manager Threat Hunting is a proactive approach for finding and remediating undetected cyber-atta...
›
Home
View web version