Check Point Blog

Corporate Blog July 24, 2019

What is Zero Trust Security? And Why Should You Care

By Dana Katz, Product Marketing Manager, Security Platforms    An ever-evolving IT environment and cyber-threat landscape have made legacy security infrastructures ineffective. Based on the outdated assumption that anything within the security perimeter can be…

Read More
Corporate Blog July 23, 2019

New Splunk Application Boosts SOC Efficiency

By Eytan Segal, Head of Product Management, Threat Prevention Analyzing Check Point threat events in Splunk has never been easier! Procedures for threat monitoring and analysis are key for identifying cyber attacks against an organization,…

Read More
Corporate Blog July 22, 2019

Secure your AWS, Azure and Google Environment Automatically with CloudBots

We’re living in the age of rapid growth of cloud environments. More organizations scale their development process in the cloud with multiple accounts and endless number of services. Manual security and compliance assessments are not…

Read More
Corporate Blog July 16, 2019

Maximum Zero-Day Prevention Without Compromising Productivity

By Jonathan Gold-Shalev, Senior Product Manager, Threat Prevention Organizations use security products to either detect or prevent known and unknown threats. Most threats enter a network via web browsing, web file downloads, phishing emails, and…

Read More
Corporate Blog July 10, 2019

“Agent Smith”: The New Virus to Hit Mobile Devices

In the Wachowski Brothers’ classic Matrix trilogy, “Agent Smith” famously describes the human race as a species that multiplies until every resource is consumed. In reality, it is the “Agent Smith” of the mobile malware…

Read More
Corporate Blog July 9, 2019

June 2019’s Most Wanted Malware: Emotet Takes a Break, but Possibly Not for Long

In June, the most significant change in the threat landscape was not an increase in attacks or a new type of malware, but the absence of one of the most prominent threats of the last…

Read More
Corporate Blog July 8, 2019

CyberNext: Join us for an Invitation-Only Global Cybersecurity Summit

by Eddie Doyle, Global Cyber Security Strategist, published July 8, 2019   Our world is hyper digital, but stopping the next wave of cyber threats depends on high-level, lightning speed in-person conversations.   In cybersecurity,…

Read More
Corporate Blog July 2, 2019

Five Valuable Tips for Success at Microsoft Inspire 2019

By Jonathan Maresky, Product Marketing Manager, Cloudguard IaaS, published July 2, 2019   I like Microsoft Inspire.   The conference, previously known as Microsoft WPC (Worldwide Partner Conference) was my first foray into the wonderful…

Read More
Blog Post June 26, 2019

Security Flaws in Electronic Arts’s Origin Platform

Today’s kids and kids-at-heart are arguably more addicted to computer games than ever before, and some of the most popular are sports themed. But for cyber criminals the only sport they are addicted to is…

Read More
Corporate Blog June 21, 2019

“I’ve Looked at Clouds from Both Sides Now”: Reflections on Visibility, Context & Control in Cloud Security”

By Noa Katz, Product Marketing Manager, Cloud Security, published June 21st 2019   “I’ve looked at clouds from both sides now From up and down, and still somehow It’s cloud illusions I recall I really…

Read More