Check Point Software Technologies Ltd. is an Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, mobile security, data security and security management.

Wikipedia
Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • In the past two years, the most significant trend in the malware world was the rise of ransomware. Recently, mobile malware followed the footsteps of PC malware, like it has done many times before, as several security vendors detected a sharp rise in the spread of mobile ransomware. According to ESET, ransomware has grown by… The post When Ransomware Goes Mobile appeared first on Check Point Blog.

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Having already looked at the challenges of moving to the cloud, and how attackers gain control of a victim’s account, in this third and final post in our cloud security series, we will be looking at how an in depth approach to defense is required to prevent account takeovers.   As discussed, the primary method… The post Account Takeovers and Cloud Security, Part 3: The Anti-Phishing Solution appea...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • One of the most complex challenges in the world of cyber security is accurately identifying whether a file is good or bad. Take, for example, an executable file. Unlike Word or Excel files for instance, that function only within the context of a specific program, executables, by their very nature, need to operate in a… The post Introducing CADET: AI Technology in Action appeared first on Check Poi...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • When the news broke about the massive ransomware attack on the city of Atlanta, the details seemed dire yet murky – we knew about court dates getting rescheduled, city job applications getting frozen, and computer systems going down for nearly a week. As the rubble began to clear, we’re now seeing a better picture on... Click to Read More The post The Atlanta Ransomware Attack Wasn’t as Bad as We ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Immovable object, meet unstoppable force.   Led by two-time league MVP Stephen Curry, the Golden State Warriors are chasing basketball history. They’ve broken the record for wins in a regular season, they’ve scored and defended at all-time percentages, and they’ve won two championships in the past three years — nearly sweeping LeBron James and the […] The post Championship Basketball, Championship...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • No-one likes having a stranger look over their shoulder when withdrawing money from a public ATM machine, so how much more so would you not want that stranger watching as you carry out online banking activities in the privacy of your own home. Although banks themselves have taken measures to strengthen the security of their […] The post Banking Trojans Continue to Lurk Beneath the Surface appeared...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Check Point’s latest Global Threat Index reveals that the Coinhive cryptominer impacted 22% of organizations, increasing by nearly 50% in May 2018   Crypto-mining malware has shown no signs of slowing its dominance, as the impact of the Coinhive cyptominer increased by nearly 50% during the month, affecting 22% of all organizations around the world […] The post May’s Most Wanted Malware: Cryptomi...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • If LeBron James didn’t play basketball, he’d be just as menacing as a cyber-hacker.   And if Stephen Curry wasn’t shooting three-pointers before he turned three years old, he’d be just as effective at Check Point as he is as a point guard.   The NBA Finals are on, and for the fourth consecutive year, […] The post What The NBA Finals Can Teach Us About Cyber Security appeared first on Check Point B...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Fifth generation mega-attacks have changed the cyber security landscape forever.  As proven by the WannaCry and Petya ransomware attacks last year, using vulnerabilities and exploit tools stolen from intelligence agencies, attackers can now cause economic chaos across all industries around the world.   From finance to healthcare to manufacturing, almost all organizations across all industries […] ...

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • The default shorthand to describe GDPR is a “game changer for data privacy and security”. With roots in a 19th century law essay as well as more recent directives, the arrival of this type of regulation should come as a surprise to very few.   GDPR may, and probably will, prove to be game changing. […] The post GDPR: the Fifth Generation of Data Security appeared first on Check Point Blog.

Check Point Software Technologies
Check Point Software Technologies
Blog Post
  • Defending cyber attacks requires understanding the people and groups that carry them out – the more we know about who they are, how they operate, and what they’re capable of, the more equipped we will be to thwart them in their tracks.   Cyber criminals see it the same way – they’re always seeking intelligence […] The post Cyber Attacks 101: Process Doppelgänger, The Not-So-Friendly Ghost appeared...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video
  • A lackadaisical security guard doesn’t notice sketchy behavior, and allows two suspects to pass through his secure gate.For more information visit https://www.checkpoint.com/gen-v-cyber-security/ Takes real life security scenario, and demonstrates how the standard, traditional methods just don’t do the job any more. Gen V from Check Point, the only solution for 5th generation cyber security.

Check Point Software Technologies
Check Point Software Technologies
SlideShare Presentation
  • The European Union is enforcing the General Data Protection Regulation, or GDPR, impacting enterprise mobile security. GDPR enforces practices to prevent unauthorized use or accidental loss of data through the deployment of appropriate security measures. This slide deck provides key principles of GDPR impact on mobile businesses and how Check Point SandBlast Mobile makes your mobile business GDPR...

Check Point Software Technologies
Check Point Software Technologies
YouTube Video

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.