Security August 16, 2018 Who You Gonna Call? Stories From the Front Line of Cyber Defense By Check Point’s Incident Response Team In our industry, we tell our stories with ...
Securing the Cloud April 26, 2018 Extending Public Cloud Security beyond SD-WAN The rise of software-defined WAN (SD-WAN) has enabled public cloud adoption by extending connectivity from ...
Security August 31, 2017 Would you Rather be Reactive or Proactive? In today’s world, an organization’s cyber security system must always be operating at full force. ...
Research December 1, 2016 The Internet of Ransomware Things San Francisco’s Municipal Railway (MUNI) riders got to ride for free over the last weekend ...
Harmony May 27, 2016 Check Point Named a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls Today’s enterprise networks are more complex than ever. Cloud computing, floods of connected devices and ...
Research February 29, 2016 “Recommended” for Security Effectiveness and Value 5 Years in a Row by NSS Labs The Next Generation Firewall (NGFW) is the cornerstone of any effective network security strategy. However ...
Research January 26, 2016 A Major Step Ahead in Network Security It’s January 2016 and my New Years’ resolution is still fresh in my mind. In ...
Research December 18, 2015 Angler EK Pushing TeslaCrypt In recent weeks, we have witnessed a very large up rise in TeslaCrypt infection attempts. ...
Research November 3, 2015 Phishing for Employees in Russia During the period August 27-30, 2015, Check Point sensors recorded a large amount of logs ...
Research November 3, 2015 Context-Aware Network Security Defense in depth is a concept that is hard to argue with; put as many ...