Tag: Check Point Software

A Quantum Leap for Network Security

By Michael A. Greenberg, Product Marketing Manager, Security Platforms What a time to be alive. The coronavirus outbreak has accelerated the digital transformation of enterprises requiring them to expand support for remote internet connectivity across the globe. Businesses need to…

The Cure for Securing Cloud Workloads in Healthcare

By Trisha Paine, Head of Cloud Marketing Programs, published April 3rd, 2020 The healthcare industry has always been more cautious when it comes to new deployment mechanisms, especially when they involve the cloud. While one appreciates all of the benefits…

Cloud Migration Strategies

Title: Cloud Migration Strategies By Jonathan Maresky, Product Marketing Manager, CloudGuard IaaS, published April 2, 2020 When determining your cloud computing strategy, it’s important to understand that no two commercial situations are alike. Organizations may have varying areas of expertise,…

Cloud Security Intelligence Boost for SIEM

By Gui Alvarenga, Product Marketing Manager Deploying Cloud computing infrastructure is an excellent way for enterprises to stay agile, especially in today’s demanding, fast paced, digitally transforming world – if you’re in business and not meeting those demands, well, then…

COVID-19 Impact: Cyber Criminals Target Zoom Domains

While the world is struggling with the Coronavirus outbreak, many countries have implemented precautionary measures. Schools are being closed, communities are asked to shelter-in-place, and many organizations have enabled their employees to work remotely. As a result, video communication platforms…

Cloud Security Intelligence Boost for SIEM

By Gui Alvarenga, Product Marketing Manager Deploying Cloud computing infrastructure is an excellent way for enterprises to stay agile, especially in today’s demanding, fast paced, digitally transforming world – if you’re in business and not meeting those demands, well, then…

COVID-19 Impact: Cyber Criminals Target Zoom Domains

While the world is struggling with the Coronavirus outbreak, many countries have implemented precautionary measures. Schools are being closed, communities are asked to shelter-in-place, and many organizations have enabled their employees to work remotely. As a result, video communication platforms…

AWS Lambda Stateless & Ephemeral?

By, Hillel Solow, Serverless Security R&D With AWS Lambda, the stateless and ephemeral nature of serverless functions shifts the way attackers approach these systems. Some of the key ramifications of this shift are: The move to repetitive stateless attacks, where…

Highlights of CloudGuard IaaS R80.40 Latest Release

By Hezi Bahry, Product Manager, CloudGuard IaaS, published March 16, 2020 At Check Point we continually improve our products with new features and functionality. Some of these improvements are as a result of customer requests. Some are needed to ensure…

Top Tips for Secure Remote Working

Practical tips to enable employees to work safely from home during the Coronavirus outbreak Are we facing an unprecedented pandemic, or will our fears be unfounded? It’s impossible to say right now, but global concerns over the current spread of…

Serverless Architecture = What Cloud Should Be

By Hillel Solow, Serverless Security R&D Serverless enables you to shift even more infrastructure management responsibilities to your cloud provider. Serverless architectures provide you automation and the benefit of experiencing unlimited scale potential. Very little stands between developers and deployed…

Embracing the Benefits and Challenges of Digital Transformation

By Gui Alvareng, Product Marketing Manager, published March 4th, 2020 Digital transformation and technology trends have shaped how we live, communicate, and do business.  Organizations are becoming more agile, embracing technologies like artificial intelligence (AI), machine learning (ML), mobile and…

Is the Google Play Store Safe? Not Yet.

By Ran Schwartz, Product Manager, Threat Prevention Over recent years, there has been a lot of activity on Google’s part to improve the security of its Google Play app store.  Why?  Because millions of users have inadvertently downloaded thousands of…

All Things Mobile Security @RSA 2020

By Yael Macias, Product Marketing Manager, Threat Prevention RSA is fast approaching, and we have many exciting things going on during the event in San Francisco next week! One of the topics you will be able to learn about in…

Plenty More Phish in the Sea….

Yaffa Finkelstein, Product Marketing Manager, CloudGuard SaaS, published February 12, 2020 Hands up if you’ve ever received one of these emails? “Dear Sirs, A person with the same family name as you, died last week in deepest Peru. You are…

Valentine’s & Chocolate Don’t Always Equal Love

With Valentine’s Day approaching, lovers around the world are working on finding the best way to celebrate with their loved ones. Meanwhile – cyber criminals around the world also seem to be caught up in the spirit of this unique…

Check Point Research Brand Phishing report – Q4

Facebook tops the list, Technology industry is prime target Summary According to Check Point Research analysis, Facebook leads the top 10 phishing brands in Q4 2019 and Technology is the most common industry for which attackers try to imitate brands.…

Cloud Visibility Challenges

By Gui Alvarenga, Product Marketing Manager, published January 31 2020 Today’s enterprises have typically reached high levels of cloud maturity, including distributed application architectures that are based on advanced cloud technologies such as containers and FaaS (Function as a Service,…

The Challenge of Compliance in the Cloud

By Trisha Paine, Head of Cloud Marketing Programs, published January 22 2020 Compliance programs are designed to address perceived threats or risks to an industry or community. Typically, an industry authority (e.g., government or industry consortium) sets regulatory standards in…

The Challenge of Compliance in the Cloud

By Trisha Paine, Head of Cloud Marketing Programs, published January 22 2020 Compliance programs are designed to address perceived threats or risks to an industry or community. Typically, an industry authority (e.g., government or industry consortium) sets regulatory standards in…

Cloud Native Security: What it Means

Published January 17, 2020 What are Cloud Native Applications? Cloud-native applications are built purposefully for deployment and operation in a cloud environment. They consist of small, independent microservices, such as serverless functions and containers, and utilize services that cloud providers…

Taking Security to the Next Level with MITRE ATT&CK

By Moshe Hayun and Kobi Eisenkraft, Threat Prevention R&D This is the first installment of a three-part series about how Check Point employs the MITRE ATT&CK framework to prevent cyberattacks. What is MITRE ATT&CK? MITRE ATT&CK™ is a globally-accessible knowledge…

Fast Track Your Network Security at CPX 2020

By Michael A. Greenberg, Product Marketing Manager, Security Platforms A lot of exciting news coming out of Check Point’s premier cyber security summit and expo: CPX 360  starting in Bangkok, Thailand on January 15th.. This year’s 2020 event revealed some…

Why are we still talking about email security?

Yaffa Finkelstein, Product Marketing Manager, CloudGuard SaaS, published January 13, 2020 Do you know when the first email was sent? It was 1971 when Roy Tomlinson sent the first email across a network. Almost 40 years ago, he used the…

Your Apps Have Gone Serverless. Has Your Security?

Whether walking around re:Invent earlier this month or sitting in the sessions, one thing was clear; serverless is here to stay. It is no wonder why, there are many benefits to moving to a serverless architecture – cost, efficiency, agility,…