The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
5G: Better, Always-on Connectivity Demands Better, Always-on Security
How fast is your Internet connection right now? No matter what speeds you’re currently getting, they’re just a fraction of the up to 10 gigabits per second promised by 5G. That’s over 100 times faster than 4G on today’s mobile phones, and 10x more than even the fastest fibre home broadband service offered currently – it’s actually quick enough to download a 4K HD movie in a matter of seconds. 5G will also be characterized by ultra-low latency, which opens the door to a new era of instantaneous, always-on connectivity between systems. All these qualities enable a huge range of applications, services and devices that are intended to make our lives easier, more efficient, healthier and safer.
Cloud-sourcing: Using Global Threat Intelligence to Instantly Protect Your Cloud Assets
When it comes to security in the cloud, companies face constant, daily threats. This situation has only been exacerbated by the COVID-19 pandemic. In just 10 of the biggest data breaches in 2020, over 3.2 billion records were exposed, the majority of them from medical and healthcare organizations.
Notice the unnoticed: Threat Hunting by SandBlast Agent
End Point Security experts and analysts proactively hunt and investigate incidents based on indicators provided by threat alliances, open-source intelligence (OSINT), or external intelligence. SandBlast Agent’s Threat Hunting solution offers real-time visibility to all indicators collected from all Endpoint devices in the organization. It provides a powerful investigation platform that quickly searches for indicators and provides a list of all appearances across the enterprise hosts, events timeline, and detailed information collected by SandBlast Agent automatic Forensics. Also, the solution offers actionable response options such as quarantine and termination.
Check Point Software and NVIDIA Partner to Secure the Datacenter with Infinity Next
As enterprises become more distributed with the hybrid cloud, artificial intelligence (AI), edge computing and remote workers, the attack surface for cyber criminals has expanded as well. To keep up with demand while staying secure, enterprises need to accelerate data and security throughput by distributing the processing closer to the edge. It all starts with the data center servers that are processing the rapidly increasing volume of application data.
Cloud Security: 12 Myths vs Facts
As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads together and created the following list of the most common cloud security myths, followed by the conflicting realities.
How SandBlast Mobile’s Zero-Touch Deployment enhances your Mobile Workforce Security
Mobile Security is no longer optional. The working from home routine, where employees are increasingly accessing corporate data from their smartphones, extends organizations’ mobile attack surface and expose them to data breaches more than ever. However, the adoption of Mobile Threat Defense solutions (MTD) can be a challenging task for security admins. Mainly because employees are usually cautious about installing applications they are not familiar with and are vigilant about approving configuration and security changes prompted on their device. Read this blog post to learn how SandBlast Mobile, the market-leading MTD solution, addresses these challenges with a zero-touch deployment feature that allows fast and simple adoption of mobile security across your organization.
Check Point Software Partners with Harvard and MIT-founded edX to Deliver Free Online Courses, to Help Close Cyber-security Skills...
SAN CARLOS, CA — Mon, 24 Aug 2020
Check Point and Cisco Deliver Enterprise-Grade Branch SD-WAN Security and Networking
Enterprises are moving their applications, workloads and services out of the data center and into the cloud. Enterprises are turning away from traditional WAN architectures and adopting SD-WAN to provide better support for cloud SaaS applications. SD-WAN enables users to connect through their local Internet providers instead of backhauling through the data center over MPLS lines. The local internet connections reduce network latency and saves costs, but also exposes the branch offices to the same sophisticated cyber attacks that target the data center.
Check Point CloudGuard SaaS protects customers from a new attack vector exploiting SLK files to install malware
In the attack, cyber criminals send an email with an attachment in the form of a .slk file that contains a malicious macro (MSI executable script), allowing them to control infected machines remotely, by installing a Remote Access Trojan. This attack is extremely sophisticated, and meticulously designed to bypass security tools.
Check Point Secures Aruba Branch Office SD-WAN Connections to the Cloud
Unfortunately, the significant increase in the number of remote employees has extended the network perimeter and expanded the cyber-attack surface. CISOs have to rethink their network strategy since traditional methods of securing corporate networks are no longer effective. They need to protect branch connections to local internet providers from the same sophisticated and multi-vector Gen V cyber attacks that impact the datacenter.