Check Point Blog

Corporate Blog November 2, 2018

Democracy Under Attack: Summarizing the Elections Threat Landscape

By Gal Fenighstein, Threat Intelligence   Introduction   The election process, all over the world, has been modernized. From online voter registration forms to debates waged on social media all the way to electronic voting…

Read More
Corporate Blog September 18, 2018

Join Check Point at Microsoft Ignite 2018: Discover Cloud Security and Connectivity

Microsoft Ignite 2018 (#MSIgnite) is almost here, and Check Point is delighted to be a Gold Sponsor again for this year’s conference. If you are making the trek out to Orlando and planning on attending, we…

Read More
Corporate Blog August 16, 2018

Quickly Gauge Your Security’s Generation With This 5-Question Quiz

by Bob Matlow, Cyber Security Advocate   The cyber-security world entered a new day and age when WannaCry and NotPetya wrecked havoc across hundreds of countries, causing billions of dollars of damage. Cyber criminals have…

Read More
Corporate Blog June 21, 2018

Forrester Research names Check Point Software a Leader in Endpoint Security Suites

SandBlast Agent Complete Endpoint Protection received highest possible scores in the Malware Prevention, Data Security, and Mobile Security criteria   We are pleased to announce that Forrester Research recognized Check Point as a Leader in…

Read More
Corporate Blog June 5, 2018

Healthcare, Retail, and Finance: Gen V Attacks Affect All Industries

Fifth generation mega-attacks have changed the cyber security landscape forever.  As proven by the WannaCry and Petya ransomware attacks last year, using vulnerabilities and exploit tools stolen from intelligence agencies, attackers can now cause economic…

Read More
Cloud Security January 3, 2018

The DevOps Revolution is Changing Cloud Security – Don’t Get Left Behind

After talking with many information security managers and compliance officers over the last few years, a troubling picture is emerging. In the old days the security and compliance teams were powerful organizations, ruling the entire…

Read More
Research November 7, 2017

Check Point IoT Blog Series: ‘Home, Smart Home’ – But How Secure Is It?

The smart home is often idealized as a domestic paradise — your fridge orders your groceries for you, your robot vacuum cleaner zooms from room to room, and changing the thermostat is as easy as…

Read More
Research October 31, 2017

Account Hijacks Affect Everybody, Even ‘Top Dogs’

Being “cool and smart” was the name of the game when we were at school, and it seems nothing really changes as we get older. With the ‘cool factor’ among IT professionals translating into the…

Read More
Cloud Security August 30, 2017

Security By Design: How Dome9 Goes Above and Beyond to Keep Your Cloud Safe

At Dome9, we live by a simple motto: security-first. At every opportunity, we push past the expected minimums to provide unexpected satisfaction and confidence to our customers. As a security firm, we are held to…

Read More
Research

Layered protection is a must. Here’s why.

Cyber attacks are advancing in their sophistication. Take WannaCry – once it makes a single entry, its ability to spread throughout the organization and evade protection layers infected hundreds of thousands of computers. These advances…

Read More