Tag: Check Point Software

AESI Acumen Engineered Solutions International Inc./ AESI-US Inc. (‘AESI’) simplifies mission-critical security operations with Check Point Software

Read the original article: AESI Acumen Engineered Solutions International Inc./ AESI-US Inc. (‘AESI’) simplifies mission-critical security operations with Check Point Software By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software A consulting company gains cloud-based…

The Cyber Pandemic is Here – Protect Your Organization

Read the original article: The Cyber Pandemic is Here – Protect Your Organization The COVID-19 pandemic has had a dramatic effect on organizations globally. As previously reported, threat actors will always seek to take advantage of major events or changes…

Covid-19 ‘Vaccines’ Touted for Just $250 on Darknet

Read the original article: Covid-19 ‘Vaccines’ Touted for Just $250 on Darknet Range of counterfeit coronavirus vaccines and medicines offered on Darknet Vaccine-related phishing campaigns take advantage of the global race to deliver the shots Covid vaccine-related domains show sharp…

Aligning Secure Remote Access to NIST Guidelines

Read the original article: Aligning Secure Remote Access to NIST Guidelines With 80% of security professionals scaling up their remote access infrastructure, per Check Point research, certain controls should be applied to ensure that security is not compromised. Below are…

AWS Instance Metadata Service (IMDS) Best Practices

Read the original article: AWS Instance Metadata Service (IMDS) Best Practices Omer Shliva Cloud Guard Dome9 Research Introduction Metadata is “data that provides information about other data” (Wikipedia). In other words, Metadata is “data about data”. In AWS, Instance Metadata…

Living in a Post-quantum Cryptography World

Read the original article: Living in a Post-quantum Cryptography World By Julia Rabinovich, Architect, Network Security Products Today, it is pretty expected from what we can see in the way hackers go after their victims. Whether through social engineering, phishing…

ARSAT Migrates to Check Point Software in Record Time

Read the original article: ARSAT Migrates to Check Point Software in Record Time By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Empresa Argentina de Soluciones Satelitales Sociedad Anónima (ARSAT) is one of the largest ISPs…

Check Point IoT Protect Firmware

Read the original article: Check Point IoT Protect Firmware A complete end-to-end solution for all your firmware security needs. By Mor Ahuvia, Product Marketing Manager and Bob Bent, Technical Marketing Manager To build connected devices that are ‘secure by design’…

The Must See List. A Look at AWS re:Invent 2020

Read the original article: The Must See List. A Look at AWS re:Invent 2020 AWS re:Invent is here, and although this is a change from the usual single week of learning and innovation in Las Vegas, the enriched three weeks…

Preventing the Unknown with Static Analysis

Read the original article: Preventing the Unknown with Static Analysis This blog provides insights into zero-day unknown threats – what are they, and why is it a challenge to protect against them. Also, it covers Check Point SandBlast Agent’s approach,…

Achieving K8 Security @ The Speed & Scale of DevOps

Read the original article: Achieving K8 Security @ The Speed & Scale of DevOps By, Yaffa Finkelstein, Product Marketing How many workloads is your organization running? How are you keeping your cloud native applications – the drivers of your business…

Enhancing Cloud Security Posture for AWS Network Firewall

Read the original article: Enhancing Cloud Security Posture for AWS Network Firewall By, Trisha Paine, Head of Cloud Product Marketing Amazon Web Services (AWS) just announced the availability of the AWS Network Firewall, a managed service that makes it easy…

Infrastructure as Code assessment with Terraform

Read the original article: Infrastructure as Code assessment with Terraform Security is of utmost importance for any piece of code or infrastructure The traditional security approach was based on a ticketing system to provision a piece of infrastructure. This method…

Use Case: Automated Endpoint Detection & Response

Read the original article: Use Case: Automated Endpoint Detection & Response By Yaelle Harel, Technical Product Marketing Manager Only 22% of Security and IT professionals strongly believe that their organization is fully ready to respond to a cyber-attack or a…

Enhancing Threat Hunting with MITRE ATT&CK

Read the original article: Enhancing Threat Hunting with MITRE ATT&CK By Yaelle Hare, Technical Product Marketing Manager Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involved searching for indicators of compromise…

Five Reasons to Reevaluate Your Endpoint Protection

Read the original article: Five Reasons to Reevaluate Your Endpoint Protection By Oleg Mogilevsky, Product Marketing Manager, Threat Prevention These days, endpoint security plays a major role in maintaining high security posture. However, a study conducted in mid-2020 revealed that…

Notice the unnoticed: Threat Hunting by SandBlast Agent

Read the original article: Notice the unnoticed: Threat Hunting by SandBlast Agent By Yaelle Harel and Boaz Barzel Threat Hunting is a proactive approach for finding and remediating undetected cyber-attacks. It is a process that involves searching for indicators of…

Secure Your Containers Like Your Apps Depend On It

Read the original article: Secure Your Containers Like Your Apps Depend On It By, Yaffa Finkelstein, Product Marketing Manager Security professionals are all too aware that their container environments are enormous. Assessing its true scale is virtually impossible. On top…

Ransomware: How to Avoid the Dangerous Wave of Attacks

Read the original article: Ransomware: How to Avoid the Dangerous Wave of Attacks By Yaelle Harel, Technical Product Marketing Manager The average cost to rectify the impacts of most recent ransomware attacks is US$732,520 for organizations that don’t pay the…

How to avoid the dangerous wave of ransomware attacks

Read the original article: How to avoid the dangerous wave of ransomware attacks By Yaelle Harel, Technical Product Marketing Manager The average cost to rectify the impacts of most recent ransomware attacks is US$732,520 for organizations that don’t pay the…

Global Surges in Ransomware Attacks

Read the original article: Global Surges in Ransomware Attacks In Q3 2020, Check Point Research saw a 50% increase in the daily average of ransomware attacks, compared to the first half of the year Countries with the most number of…

Cloud Security: 12 Myths vs Facts

Read the original article: Cloud Security: 12 Myths vs Facts By, Gui Alvarenga, Cloud Security Product Marketing As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads…

Cloud Security: 12 Myths vs Facts

Read the original article: Cloud Security: 12 Myths vs Facts By, Gui Alvarenga, Cloud Security Product Marketing As cloud technology expands in both worldwide use and the complexity of offerings, some myths persist. At Check Point, we put our heads…

The Trend Toward Serverless: What, Why, and How?

Read the original article: The Trend Toward Serverless: What, Why, and How? Serverless has been taking the web development world by storm. Many developers opt to pursue serverless functions in new application architectures where a microservice approach would support more…

RampantKitten: An Iranian Surveillance Operation unraveled

Read the original article: RampantKitten: An Iranian Surveillance Operation unraveled Check Point Research has unraveled an ongoing surveillance operation by Iranian entities that has been targeting Iranian expats and dissidents for years. While some individual sightings of this attack were…

CloudGuard Intelligence & Threat Hunting

Read the original article: CloudGuard Intelligence & Threat Hunting Transform your Logs into Actionable Security Logic By, CloudGuard Research team Many companies shifting to the cloud still rely on traditional SIEM solutions and analytics tools to understand cloud logs, activities,…

Top Cloud Security Challenges in 2020

Read the original article: Top Cloud Security Challenges in 2020 By, Trisha Paine, Head of Cloud Marketing Programs Migration to the cloud has accelerated recently, especially in light of the COVID-19 outbreak. This global shift towards a nearly 100% remote…

Securing Android Devices regardless of the owner

Read the original article: Securing Android Devices regardless of the owner By Yaelle Harel, Threat Prevention Technical Product Manager In Android 11, Google is bringing their data separation model, work profile, to company-owned devices. The work profile contains all corporate…

Securing Android Devices regardless of the owner

Read the original article: Securing Android Devices regardless of the owner By Yaelle Harel, Threat Prevention Technical Product Manager In Android 11, Google is bringing their data separation model, work profile, to company-owned devices. The work profile contains all corporate…