Check Point Software Technologies Ltd. is an Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security and security management.

Wikipedia
Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • If you ask any Check Point researcher or engineer for one word that describes what Check Point does best, you’ll get a wide range of answers — anything from “cybersecurity” to “cyber-security” to the rebels that’ll say “cyber security”.   But if you ask the press, you’ll get a very different answer. Growth.   Over […] The post Growing a Global Company: Recapping Gil Shwed’s Interviews with Forbes ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Check Point’s latest Global Threat Index reveals the rise of crypto-mining malware targeting enterprises   During the month of December 2017, crypto-mining malware rapidly rose in Check Point’s Global Threat Index’s top ten most prevalent malware.   Crypto-mining malware refers to cybercriminals hijacking the victim’s CPU or GPU power and existing resources to mine cryptocurrency. […] The post Dec...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • In the past, cyber-criminals have targeted businesses, hospitals, and governments; today, we’ve seen them begin to focus on games and apps intended for children.   Check Point Researchers have revealed a new and nasty malicious code on Google Play Store that hides itself inside roughly 60 game apps, several of which are intended used by […] The post Malware Displaying Porn Ads Discovered in Game A...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The Spectre and Meltdown vulnerabilities recently discovered in Intel, AMD and ARM processors, are fairly complex. In this post we will try to simplify what the problem is, how it could affect your business and what actions can be taken to protect against it. It is important to begin by clarifying that despite their two […] The post How The Spectre/Meltdown Vulnerabilities Work appeared first on C...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • OS Level Solutions Are Not Enough The recent Meltdown and Spectre vulnerabilities target weaknesses of the CPU rather than the Operating System, or the applications that run on it. (See here for background on how these vulnerabilities work). Since they do not involve the Operating System, solutions that monitor at that level, such as traditional […] The post Mitigating CPU Vulnerabilities: Removin...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Check Point researchers have detected a new type of adware roaming Google Play, the official app store of Google. The suspicious scripts overrides the user’s decision to disable ads showing outside of a legitimate context, and then, in many of the apps, hides its icon to hinder efforts to remove it. This is a purely […] The post LightsOut: Shining a Light On Malicious Flashlight Apps on Google Pla...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
  • Check Point Infinity is the first consolidated security across networks, cloud, and mobile, providing the highest level of threat prevention against both known and unknown targeted attacks to keep you protected now and in the future. Jeff Schwartz, our Vice President of US Engineering, explains how we do this. For more information: https://www.checkpoint.com/architecture/infinity/

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • A Zero-Day vulnerability in the Huawei home router HG532 has been discovered and hundreds of thousands of attempts to exploit it have already been found in the wild. The delivered payload has been identified as OKIRU/SATORI which is an updated variant of Mirai. The suspected threat actor behind the attack is an amateur nicknamed ‘Nexus […] The post Huawei Routers Exploited to Create New Botnet app...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Check Point’s NSS BPS Test Highlights: Lowest TCO per Mpbs Highest security effectiveness with 100% block rate Results achieved via a single, consolidated gateway We are pleased to announce that Check Point achieved NSS Recommended in the recent NSS Labs Breach Prevention System (BPS) test. Using a single consolidated 15600 gateway, Check Point achieved the […] The post NSS Recommends Check Point ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Arnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we’re ready for it.”  The past year certainly took us by surprise when the WannaCry and Petya ransomware outbreaks hit businesses globally, causing unprecedented disruption, while serious new vulnerabilities such as BlueBorne were discovered in almost every connected […] The post What Lies Ahead? ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • During the month of November, the Necurs botnet has returned to Check Point’s Global Threat Index’s top ten most prevalent malware. Check Point researchers found that hackers were using Necurs, considered to be the largest spam botnet in the world, to distribute the relatively new Scarab ransomware that was first seen in June 2017. The […] The post November’s Most Wanted Malware: Return of Necurs ...

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.