SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Retail security
  • Home
  • About
  • White papers
  • Case studies
  • News
  • Expert commentary
  • Security beat
  • Round table
  • Products
  • Videos

Check out our special report on casino security

Get it now!

Check Point Software Technologies acquires Avanan, to redefine security for cloud email

1 Sep 2021

Check Point Software Technologies acquires Avanan, to redefine security for cloud email
Contact company
Contact Check Point Software Technologies Inc
icon Add as a preferred source Download PDF version

Check Point Software Technologies Ltd., a foremost provider of cyber security solutions to corporate enterprises and governments globally announced the acquisition of Avanan, the fastest-growing cloud email security company. Avanan technology provides the highest level of security for emails and SaaS collaboration suites.

Avanan will integrate into the Check Point Infinity consolidated architecture to deliver the world’s most secure email security offering. Utilising patented technology designed and built for cloud email environments, this will be the only unified solution in the market to protect the remote workforce from malicious files, URLs, and Phishing across email, collaboration suites, web, network, and endpoint.

Email technologies and security

Email technologies have evolved and transitioned from on-premise solutions to the cloud. With 95% of cyber-attacks targeting enterprise networks are caused by successful spear phishing, the cloud email threat landscape has never been wider. The number of phishing attacks doubled in 2020, with every Microsoft Office 365 user in the world being attacked at least once.

The COVID-19 pandemic and the move to remote work continue to fuel the adoption of cloud office systems and the use of other collaboration suites beyond email (e.g. Teams, Slack, OneDrive), expanding user’s exposure to cyber-attacks even more. This expanded threat landscape requires a new approach to email security since conventional solutions built for on-premises email have failed to adapt for the cloud. Legacy email solutions (SEG) impair native security tools, are blind to cloud threats, and cannot protect collaboration suites.

Cloud- e-mail security platform

With Avanan, organisations will be able to modernise legacy solutions with email SaaS and protect cloud email"

Avanan, founded in 2015, is the world’s fastest-growing cloud-email security vendor. The company developed a patented application-programming interface (API) solution to stop email threats before arriving at the inbox (inline), for both internal and external emails using AI-based engines. With over 100 employees, it protects more than 5000 customers and over 2.5 million inboxes. The solution deploys in minutes like an app and is configured in a few clicks.

“More and more businesses are moving to cloud-email platforms and with email becoming a major channel to launch devastating cyber-attacks, this acquisition represents a huge potential as organisations are looking for a new approach to email and collaboration suite security,” said Dr. Dorit Dor, Check Point’s, Chief Product Officer.

“By integrating Avanan into Check Point Infinity, organisations will be able to modernise legacy solutions with email security-as-a-service and protect cloud email and collaboration suites from the most sophisticated attacks.  We’ve been using the Avanan technology as an OEM for the last 3 years and I am confident that with this new addition, customers will enjoy the best email security with the best cyber security capabilities.”

Reinventing e-mail security

“Avanan’s journey to reinvent email security is starting a whole new chapter. By merging with Check Point Software, we are combining Avanan’s best in class A.I. that catches the sophisticated email-borne attacks everyone else misses, with Check Point Software’s unparalleled security capabilities and threat intelligence,” says Gil Friedrich, CEO, and co-founder of Avanan.

“With Check Point Software’s global organisation, we plan to bring our joint solution to all organisations, of all sizes and geographies, to anyone that needs better security for their email and collaboration suite.” Check Point Software entered into a definitive agreement to acquire Avanan and the transaction is expected to close imminently. 

Threat prevention against cyber attacks

The integration will help protect from malicious files, URLs, and phishing across email, collaborations apps, and endpoint

Check Point Infinity is the industry’s first consolidated security architecture, providing the highest level of threat prevention against both known and unknown cyber threats.

The integration of Avanan technology into the Check Point Infinity architecture is set to deliver the highest level of security to remote workforces worldwide, providing the only unified solution that will protect from malicious files, URLs, and phishing across email, collaborations apps, web, network, and endpoint.

The unified solution will allow organisations to:

  • Modernise legacy solutions (SEG) with email security as a service and protect cloud email in less than 5 minutes.
  • Stop 30% more infected emails than any conventional email security solution with best of breed malware protection and no impact on productivity: preventing phishing attacks and malicious files from landing in the inbox, eliminate hazardous clicks on emails with click time URL protection, and prevent attack expansion before any damage is evident with automatic post-attack remediation.
  • Protect email data loss (internal and external) with the most secure and flexible solution: security admins have multiple response actions to protect data before it leaves the organisation.
  • Protect SAAS collaboration suites such as OneDrive, Google Drive, Teams, Share Point, Slack, Box and more, from Malicious URLs, infected files, and data loss prevention (DLP).

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Retail surveillance
  • Industrial security
  • Commercial security
  • Security devices
  • Security tagging
  • Industrial security systems
  • Retail security
  • Network cameras
  • Security software
  • Security service
  • Physical Security Information Management (PSIM)
  • Cyber security
  • Corporate Security
  • Data Security
  • Cloud security
  • Artificial intelligence (AI)
  • COVID-19
  • Related links
  • Access Control Software Access control software
  • Related categories
  • Access control software
Related white papers
Physical access control

Physical access control

Download
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
Verkada workplace safety survey

Verkada workplace safety survey

Download
Related articles
Retail security in 2021 and beyond

Retail security in 2021 and beyond

What security technologies are impacting the retail market?

What security technologies are impacting the retail market?

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Retail security
  4. News
  5. Corporate news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec