The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
Check Point Research Shows Surge in Active Malware Families During First Half of 2016
In June, Conficker accounted for 14 percent of recognized attacks for the second month running; while second-placed Sality accounted for 10 percent and third-placed HummingBad for 6 percent of all attacks. The top-10 families were responsible for 50 percent of all recognized attacks.
Check Point Unveils Powerful New Management Platform, Simplifying Complexity of Security through Consolidation
"With the barrage of connected devices, new technologies like cloud computing, and a continuous wave of sophisticated threats, managing security has become a key initiative beyond the IT department – elevating the role of security to become a more strategic element of the entire organization," said Gabi Reish, vice president of product management, Check Point. "With the capabilities we’re introducing in R80 today, we’re focused on empowering security leaders to become a true partner to the business – moving away from being seen as just the ‘enforcer’ toward becoming more of the ‘enabler.’"
Check Point Receives Eleventh ‘Recommended’ Rating from NSS Labs, Bolstering the Company’s Long-Standing Record as a Securit...
Key findings from NSS Labs 2016 NGFW report of Check Point’s solution are:
Check Point and IBM Security Form Threat Prevention Alliance
The new alliance includes four main areas of collaboration:
From the Server Room to the Airport, Check Point Extends Zero-Day Security to All Systems, Wherever They May Be
In an increasingly connected world, enabling workers to access corporate information through a variety of devices – whether on the office network or from a remote location – can dramatically increase innovation, productivity and growth opportunities. But despite their importance, protection for these devices is limited by traditional, signature-based, anti-virus agents that only detect known threats. Given this, hackers are now increasingly targeting devices, especially those at the endpoint, with more sophisticated zero-day attacks such as new evasive variants of cryptowall and cryptolocker malware.
Check Point Extends Threat Prevention Leadership in the Data Center with New Appliance Series
The evolving sophistication of cyber criminals and their attacks is challenging the effectiveness of traditional security solutions. According to a recent Check Point Security Report, more than 106 unknown malware downloads occur every hour and this number is growing. And yet, the report found only a fraction of enterprises use forward-looking security technologies to help prevent zero-day attacks, mainly due to concerns over network performance and uptime.
Check Point Software Technologies Named a Leader in Gartner 2015 Magic Quadrant for Mobile Data Protection Solutions
Gartner states, “Leaders have products that work well for Gartner clients in small and large deployments. They have long-term roadmaps that follow and/or influence Gartner’s vision of the developing needs of buyers in the market. Leaders make their competitors’ sales staffs nervous and force competitors’ technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists.”
Check Point and AirWatch Partner to Secure the Future of the Mobile Enterprise
“Partnering with Check Point gives our customers a complete security platform to tackle today’s mobile threats,” said Noah Wasmer, vice president and CTO, End- User Computing, VMware. “We’re committed to enhancing and broadening the scope of our joint solution and are excited to deliver this security integration to our customers.”
Check Point Positioned as a Leader in the 2015 Magic Quadrant for Unified Threat Management
“The Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer,” according to Gartner.
Check Point Changes the Malware Game with New Threat Prevention Solution
In the ongoing battle between hackers and security professionals, attackers are increasingly utilizing more sophisticated tools such as new zero-day attack methods and custom variants of existing malware to circumvent traditional sandboxing technology and slip into their victims’ infrastructures undetected. These new attack vectors require a proactive approach with modern solutions and technologies that not only catch known threats, but are also able to identify and stop unknown malware the first time it is seen in the wild. Check Point’s new cutting-edge CPU-level exploit detection engine is uniquely capable of identifying the most dangerous, zero-day threats in their infancy, before malware has an opportunity to deploy and even attempt to evade detection.