The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
Check Point Partners with Coursera to Deliver Free Online Courses, Helping Cyber-Security Professionals Develop Their Skills
SAN CARLOS, CA — Tue, 23 Jun 2020
Taking a second look at Two Factor Authentication
For several years now, and after a wide array of massive data breaches where passwords were compromised, single-factor authentication – or authentication by means of a password theoretically only known to the user – has become a thing of the recent past, making way for two-factor or multi-factor authentication.
The Best Security Management is now in the Cloud
Have you ever wondered what it would be like to manage your on-premises and virtual gateways from the cloud? Via a web browser? With the best access control and threat prevention platform that can keep pace with the latest security, handle rapid growth and effectively manage maintenance?
Choosing your Next Endpoint Security Solution? 5 Key Questions you Must Consider
It’s time to rethink your endpoint security strategy. Navigating today’s threat landscape requires having market-leading technologies that can protect you from all vectors of attack, while not compromising on business continuity. Here we discuss five key questions you should add to your checklist when you evaluate your next endpoint security vendor.
Check Point Software Extends Infinity Architecture with Full Range of Quantum Security Gateways™, Delivering Uncompromised Enter...
SAN CARLOS, CA — Tue, 21 Apr 2020
How to Implement Layered Security into Cloud Workloads
From a cloud security standpoint, however, microservice architectures require drastically new thinking. For example, DevSecOps practices assume that infrastructure is being deployed to the same resilient and secure endpoints, but with serverless, everything is in flux: An IP address associated with an S3 bucket today could be subsequently associated with an orchestrator or a load balancer within minutes after the S3 bucket stops using it. The runtime image or workload running the image itself becomes the security perimeter, and the cloud security approach taken needs to reflect this in order to secure the system as a whole.
ZoneAlarm Launches New Web Secure Free Advanced Chrome Extension to Protect Users against the Most Common Online Threats
SAN CARLOS, CA — Tue, 31 Mar 2020
COVID-19 Impact: As Retailers Close their Doors, Hackers Open for Business
And of course, when the real economy falters, the underground economy springs into action. Hackers around the globe are taking advantage of the Covid-19 outbreak by accelerating their activities to spread their own infections.
Check Point expands the 1500 series gateways for SMB with 2 new models
Small businesses play a critical role in economic growth and innovation across the globe, but often lack the resources to fully protect themselves against today’s advanced cyber-threats. Now, small and midsize businesses can enjoy truly enterprise-grade security with industry-leading threat prevention capabilities, coupled with easy and intuitive management.