Artificial Intelligence February 4, 2025 AI-Powered Security Management for the Hyperconnected World Today’s security approach is siloed. Each deployed security tool is designed to provide a specific ...
Artificial Intelligence February 3, 2025 Protect Your Organization from GenAI Risks with Harmony SASE Love it or hate it, large language models (LLMs) like ChatGPT and other AI tools ...
Artificial Intelligence January 29, 2025 The Journey to Autonomous Cyber Security The evolution of cyber security is no longer just about reacting to threats; it is ...
Company and Culture January 28, 2025 Continuing to Pioneer Cyber Security Excellence and Shaping the Future As a trusted leader in cyber security, Check Point proudly acknowledges its 2024 accolades from ...
Artificial Intelligence January 27, 2025 Introducing HT-ML Guard to Automatically Analyze and Secure HTML Files Highlights: HTML files are being used in phishing attacks, mimicking trusted websites HT-ML Guard is ...
Email Security July 17, 2023 Check Point Software is recognized for its impressive security products in CRN’s 2023 Tech Innovator Award We are proud to announce that Check Point Software has been named as a finalist ...
Innovation September 19, 2022 Prevention-first MDR/MPR – Elevating Managed Detection and Response to the Next Level A common cyber security problem faced by many organizations Everywhere you look, the impact of ...
Innovation April 12, 2018 Bracing for the next Atlanta: Preventing Cyber-Attacks on Major Cities Two weeks ago, the city of Atlanta suffered a large scale cyber-attack. All court ...
Innovation December 21, 2017 Huawei Routers Exploited to Create New Botnet A Zero-Day vulnerability in the Huawei home router HG532 has been discovered and hundreds of ...
Innovation November 13, 2017 October’s Most Wanted Malware: Cryptocurrency Mining Presents New Threat Check Point’s latest Global Threat Index has revealed crypto miners were an increasingly prevalent form ...