The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
Check Point Software Technologies revolutionizes IoT Cyber Security
SAN CARLOS, CA — Thu, 14 Nov 2019
Blueprint For Securing Industrial Control Systems
In order to do so, we use the Purdue model, which was adopted from the Purdue Enterprise Reference Architecture (PERA) model by ISA-99 and used as a concept model for Computer Integrated Manufacturing (CIM).  It is an industry adopted reference model that shows the interconnections and interdependencies of all the main components of a typical Industrial Control System, dividing the ICS architecture into 3 zones and subdividing these zones into 6 levels.
Check Point Protects Branch Office Microsoft Azure Internet Connections and SaaS Applications from Cyber Attacks
Enterprises are moving their applications, workloads and services out of the data center into the cloud. As enterprises become more distributed, organizations need flexible solutions that deliver secure and predictable application performance across a global footprint. Companies need to securely connect their branch offices to the internet and SaaS cloud applications
Check Point Revamps Small and Medium Businesses Security to Protect from the Most Advanced Cyber Attacks
According to the 2019 Verizon Data Breach Investigations Report, 43% of all breach victims were small businesses, and 63% of attack attempts against SMBs were successful. The cost of disruption from cyber-attacks against SMBs can exceed $1M, according to a Ponemon Institute report, which can have a devastating effect on an organization.
How to Adopt a Threat Prevention Approach to Cybersecurity
Hardly a week goes by without news of a breach or a cyber incident being reported. The cost and frequency of cyberattacks have increased compared to previous years, and where hackers formerly focused mainly on larger companies, small- and medium-sized firms are now equally vulnerable.
Check Point SandBlast Endpoint Protection Recognized as a Leader by Independent Research Firm
SAN CARLOS, CA — Mon, 23 Sep 2019
Forrester names Check Point a Leader in Endpoint Security Suites
We are pleased to announce that Forrester Research recognized Check Point’s SandBlast Agent as an endpoint security leader in its newly published report
BlueKeep exploit is weaponized: Check Point customers remain protected
First reported in May 2019, Bluekeep (CVE-2019-070) was reported as a critical security vulnerability by Microsoft. The vulnerability exists in the Remote Desktop Protocol (RDP) and allows for Remote Code Execution (RCE). Check Point, recognizing the criticality of this vulnerability issued both IPS and Endpoint protections immediately following the announcement.
Check Point Research Reveals Security Flaw that Leaves Android Smartphones Vulnerable to Advanced SMS Phishing Attacks
The affected Android phones use over-the-air (OTA) provisioning, through which cellular network operators can deploy network-specific settings to a new phone joining their network. However, Check Point Research found that the industry standard for OTA provisioning, the Open Mobile Alliance Client Provisioning (OMA CP), includes limited authentication methods. Remote agents can exploit this to pose as network operators and send deceptive OMA CP messages to users. The message tricks users into accepting malicious settings that, for example, route their Internet traffic through a proxy server owned by the hacker.