Check Point Software Technologies Inc News

Check Point Software Technologies acquires Odo Security to provide secure remote access solutions for enterprises

Check Point® Software Technologies Ltd., a provider of cyber security solutions globally, announces the acquisition of a new cloud-based technology that delivers secure remote access created by Odo Security. This technology will integrate with Check Point´s Infinity architecture, and become the easiest and most secure solution for enterprises need to enable employees´ secure remote access to any application. The COVID-19 pandemic has driven enterprise adoption of mass remote wor...

Check Point Research publishes the Global Threat Index for August 2020

Check Point Research, the Threat Intelligence arm of Check Point® Software Technologies Ltd, a provider of cyber security solutions globally, publishes its latest Global Threat Index for August 2020. Researchers found that the Qbot trojan, also known as Qakbot and Pinkslipbot, has entered the top ten malware index for the first time, ranking as the 10th most prevalent malware in August, while the Emotet trojan remains in 1st place for a second month, impacting 14% of organisations globally....

Check Point research highlights global increase in cyber-attacks against education and research institutions

Security researchers at Check Point have seen a global increase in cyber-attacks against education and research institutions, after conducting a research study on organisations in the USA, Europe and Asia regions. The USA saw the highest increase in education- and research-related attacks, according to Check Point researchers. In July and August 2020, the average number of weekly attacks per organisation in the USA education sector increased by 30%, from 468 cyber-attacks to 608, when compared...

Check Point identifies security flaws in Apache Guacamole, the widely popular remote working gateway software

Researchers at Check Point have identified security flaws in Apache Guacamole, one of the world’s most popular IT infrastructures for remote work. With over 10 million downloads, the free open-source software enables remote workers to access their company’s computer network from anywhere, by using only a web browser. Apache Guacamole software Apache Guacamole runs on many devices, including mobile phones and tablets, giving remote workers ‘constant, world-wide, unfettered acc...

Check Point introduces CloudGuard Cloud Native Security platform for securing cloud deployments and workloads

Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organisations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to...

Check Point’s research points at 30% jump in Coronavirus-related cyberattacks

In the past three two weeks, Check Point researchers have documented an average of 192,000 Coronavirus-related cyberattacks per week, marking a 30% increase compared to previous weeks. Researchers found that a majority of these attacks start with phishing emails in which criminals impersonate the WHO, United Nations, Zoom, Microsoft or Google to try and trick users into clicking on links or opening infected documents. High rate of malware attacks The World Health Organisation’s name and...

Check point announces Quantum Security Gateways series to enhance enterprise security

Check Point announces the availability of its complete Quantum Security Gateways series, which deliver unprecedented protection, scalability, and ease of deployment and control for enterprises, from their branch offices to corporate data centers. The coronavirus (COVID-19) pandemic has forced enterprises to quickly expand support for remote connectivity and home working at an unprecedented scale. Recent research by Check Point showed that 71% of enterprise IT and security professionals globally...

Check Point announces identifying new ransom-ware tactic: The ‘Double Extortion’ Process

Researchers at Check Point have identified a growing trend for a new ransom-ware tactic. In what researchers call “double extortion,” the new tactic involves threat actors adding an additional stage to a ransom-ware attack: prior to encrypting a victim’s database, hackers will extract large quantities of sensitive information, threatening the publication of it unless ransom demands are paid, placing more pressure on victims to meet the demands of threat actors. To prove the va...

Check Point SecureAcademy education initiative provides cyber security curriculum to students

Check Point announced that its SecureAcademy education initiative reached a major milestone with the 100th academic institution joining the program to provide a comprehensive cyber security curriculum to students. SecureAcademy offers an in-depth academic program to higher learning institutions worldwide, promoting educational and career opportunities in cyber security for students. SecureAcademy courses are now available at 100 universities in 40 countries, helping to shape the cyber-experts o...

Check Point unveils R80 unified security management as a cloud service to cut security operations time by 60%

Check Point has announced that its R80 unified security software is now available as a cloud service. This gives customers the quickest route to deploying Check Point’s unified security management solution across their entire network fabric from their web browser, with no deployment time needed, and no need for ongoing maintenance or manual updates. R80 Security MaaS solution The new R80 Security Management-as-a-Service (MaaS) solution extends Check Point’s Fast Track Network Secur...

Check Point’s CloudGuard cloud security platform to support Kubernetes and AWS Serverless solutions

Check Point has extended the capabilities of its CloudGuard cloud security platform to support Kubernetes computing services, including Amazon Elastic Kubernetes Service (Amazon EKS) and Amazon Elastic Container Service (Amazon ECS). CloudGuard also delivers additional security capabilities for Amazon Web Services (AWS) Serverless computing solutions, including AWS Lambda and related services like AWS Fargate, Amazon API Gateway, Amazon DynamoDB, and Amazon Kinesis. The announcement further del...

Check Point develops an online tool called GDPRate to enhance GDPR compliance strategy

New research commissioned by Check Point shows that GDPR is delivering a strong positive effect overall for European businesses – but with some significant variations between countries in terms of adopting GDPR measures. Check Point has also developed a new free online tool called GDPRate to guide businesses through the essential components of an effective GDPR compliance strategy. The study of 1,000 CTOs, CIOs, IT managers and security managers in France, Germany, Italy, Spain and the UK...