Check Point Blog

March 1, 2017

Check Point R80 Just Made Neopharm’s Security Management Simpler

It’s becoming more challenging than ever to manage security across expanding networks, new technologies, and with growing business requirements. With the risk posed by modern threats, security teams need far more agility and visibility to…

Read More
Corporate Blog July 22, 2016

Securely Embrace the Hybrid Cloud

The trend in enterprise IT is to move from a hardware-centric to an application-centric network model, enabling businesses to streamline processes and improve end-user experiences, all while enhancing their competitive positioning. As a result, IT…

Read More
Research April 11, 2016

Security Management for Critical Infrastructure Environments

The mission of protecting industrial control systems (ICS) is so vital that it cannot be left to just any security solution. Every day we expect water to flow from our faucets, our lights and electricity…

Read More
Research April 4, 2016

It’s Time to ReThink Security Management

“You never change things by fighting the existing reality. To change something, build a new model that makes the existing model obsolete.” R. Buckminster Fuller said those words decades ago, but they still ring true…

Read More
Research March 28, 2016

Security Management Innovation in Financial Services

The financial industry is one of the leaders in adopting new technology to service and protect its customers, and recent developments in technology have given the industry countless opportunities to do so even more. Digital…

Read More
Research March 21, 2016

Optimizing Security Management with Unified Policy

Today, cyber security is becoming more complicated as organizations’ networks are increasingly dynamic and often extend beyond the perimeter. In addition, a company’s security profile has transformed to encompass all aspects of the work environment…

Read More
Research March 7, 2016

Why Visibility Is Critical to Your Security Management Program

Today, managing security can be a complex endeavor. The growing complexity of networks, business requirements for innovation and rapid delivery of services and applications require a new approach to managing security. Traditional security management approaches…

Read More
Research March 1, 2016

Announcing R80 Security Management

May you live in interesting times. While it’s debatable this phrase originated as a Chinese curse – I’ve had my share of inventive Chinese curses hurled at me while growing up in Asia and this…

Read More