Reactions to the breach at Hacking Team, as described in Steve Ragan’s recent blog post, have ranged from shock that a security company could be so deeply exposed to glee at these surveillance specialists getting…
Read MoreYour IT department has probably deployed multiple kinds of defenses to protect your network from malware. We are all familiar with antivirus and intrusion prevention programs. They protect us from known threats and are our…
Read MoreYou should be picky when selecting a security solution for your network. When it comes to comparing solutions, are there really any metrics other than speed and accuracy? Those are certainly two of the most…
Read MoreMore than 2.1 million emails are sent and received every second. With high-speed internet as the standard for most organizations, email attachments have become the preferred method to transfer files. Most employees believe that once…
Read MoreIf you protect your network with something other than Check Point, you may not be as protected as you thought. A new report just released by Miercom, a leading network security testing firm, compared the…
Read MoreBen Franklin once said that an ounce of prevention is better than a pound of cure. We couldn’t agree more when it comes to network security. From both time and financial standpoints, it is much…
Read MoreAt Check Point, we live in the same business world everyone else does, where we have to operate at the speed of our customers. In our case, though, one mistake impacts a lot more than…
Read More