Check Point Blog

Corporate Blog August 16, 2018

Who You Gonna Call? Stories From the Front Line of Cyber Defense

By Check Point’s Incident Response Team   In our industry, we tell our stories with an eye toward the hackers. While the antagonists take up all the spotlight, the heroes that stop the attacks are…

Read More
Cloud Security April 26, 2018

Extending Public Cloud Security beyond SD-WAN

The rise of software-defined WAN (SD-WAN) has enabled public cloud adoption by extending connectivity from on-premise to cloud applications. A recent CSO article discusses how security is a key inhibitor towards rapid migration to the…

Read More
Corporate Blog August 31, 2017

Would you Rather be Reactive or Proactive?

In today’s world, an organization’s cyber security system must always be operating at full force. What seemed to be “good enough solutions” before are simply not enough. Still, organizations choose to handle technical issues after…

Read More
Research December 1, 2016

The Internet of Ransomware Things

San Francisco’s Municipal Railway (MUNI) riders got to ride for free over the last weekend (Nov 25th-26th), after what appears as a ransomware hit the agency’s payment system. The alleged attack sought $73,000 in ransom…

Read More
Harmony May 27, 2016

Check Point Named a Leader in the 2016 Gartner Magic Quadrant for Enterprise Network Firewalls

Today’s enterprise networks are more complex than ever. Cloud computing, floods of connected devices and highly mobile workforces put a ton of pressure on security teams to keep networks and data protected. At the same…

Read More
Research February 29, 2016

“Recommended” for Security Effectiveness and Value 5 Years in a Row by NSS Labs

The Next Generation Firewall (NGFW) is the cornerstone of any effective network security strategy. However as the threat landscape continues to evolve and grow in sophistication, NGFW solutions should prove effective at protecting against new…

Read More
Research January 26, 2016

A Major Step Ahead in Network Security

It’s January 2016 and my New Years’ resolution is still fresh in my mind. In addition to visiting the gym more frequently and losing some of my “holiday” weight, I am also resolute that this…

Read More
Research December 18, 2015

Angler EK Pushing TeslaCrypt

In recent weeks, we have witnessed a very large up rise in TeslaCrypt infection attempts. TeslaCrypt is a relatively new ransomware, first reported in the beginning of 2015. Although it is not the most sophisticated…

Read More
Research November 3, 2015

Phishing for Employees in Russia

During the period August 27-30, 2015, Check Point sensors recorded a large amount of logs generated by the IPS protection “PHP Print Remote Shell Command Execution.” This was an interesting anomaly, as we do not…

Read More

Context-Aware Network Security

Defense in depth is a concept that is hard to argue with; put as many security mechanisms in place to make it difficult if not impossible for the bad guys to gain access to your…

Read More