The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
97% of Organizations Are Unprepared for Gen V Cyber Attacks, Says Check Point Software 2018 Security Report
April 12, 2018
January’s Most Wanted Malware: Cryptomining Malware Continues to Drain Enterprise CPU Power, say Check Point
“Over the past three months cryptomining malware has steadily become an increasing threat to organizations, as criminals have found it to be a lucrative revenue stream,” said Maya Horowitz, Threat Intelligence Group Manager at Check Point. “It is particularly challenging to protect against, as it is often hidden in websites, enabling hackers to use unsuspecting victims to tap into the huge CPU resource that many enterprises have available. As such, it is critical that organizations have the solutions in place that protect against these stealthy cyber-attacks.”
Check Point SandBlast Receives Highest Security Effectiveness and Lowest TCO Scores in NSS Labs’ First-Ever Breach Prevention Sy...
SAN CARLOS, CA — Thu, 21 Dec 2017 Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cybersecurity solutions globally, today announced it has earned the highest security effectiveness score in NSS Labs’ first-ever Breach Prevention System (BPS) test. NSS Labs tested Check Point’s SandBlast Full Threat Prevention solution using a single consolidated 15600 gateway, running at 9,268 Mbps, and recommended it for both its security effectiveness and lowest total cost of ownership (TCO).
Show Me The Money: Cybercriminals Deploying Diverse Range of Banking Trojans and Ransomware, says Check Point
Check Point® Software Technologies Ltd. (NASDAQ: CHKP) revealed that banking trojans were extensively used by cyber-criminals during August, with three variants appearing in the company’s latest Global Threat Impact Index.
Check Point Infinity NGFW Earns NSS Recommended in Next Generation Firewall Test
The NSS ‘Recommended’ rating for NGFW reinforces Check Point’s goal of delivering the most effective and efficient security to customers across all network segments. The Check Point 15600 Next Generation Threat Prevention solution, part of Check Point Infinity, was submitted to this NSS test and it delivered an Exploit Block Rate of 99.56%.
Check Point SandBlast Mobile Receives Miercom’s Certified Secure Award
Mobile devices are the de facto standard in business today, storing and providing access to critical business information. But they also introduce an additional threat vector to enterprises, so they must be protected. The Miercom MTD Industry Assessment measured the ability to detect modern hacking techniques targeting both Android and iOS-based mobile devices. Specifically, the test measured product ability to detect, block and respond to:
Check Point Introduces the Cyber Security Architecture of the Future: Check Point Infinity
“Check Point Infinity is the culmination of our overarching vision to build a security architecture that unifies the best security, the best intelligence and the best management that we can offer across networks, cloud and mobile,” says Gabi Reish, VP product management, Check Point. “This architecture is designed to ensure organizations are prepared to handle the changing dynamics of the IT future. The principle is very simple – a unified security architecture will keep businesses secure in every environment, with more efficient and effective IT operations.”
Check Point Earns U.S. Department of Defense Certifications for Cyber Security Appliances
Check Point’s 4000 Series, 5000 Series, 15000 Series and 23000 Series appliances with software version R77.30 are certified for the following capabilities:
Hancitor Makes First Appearance in Top Five ‘Most Wanted’ Malware in Check Point’s February Global Threat Impact Index
The downloader, that installs malicious payloads such as banking trojans and ransomware on infected devices, climbed 22 places after more than tripling its global impact in the past month. Hancitor, also known as Chanitor, is usually delivered as a macro-enabled Office document in phishing emails with “important” messages such as voicemails, faxes or invoices.