Check Point Blog - RSS Feed

Check Point Software Blog

Latest articles

Driving Automated Threat Prevention & Security Policy Orchestration

Join Check Point and Ansible virtually at AnsibleFest 2021, Sept 29-30th The dramatic increase in cyberattacks like ransomware, zero day, and supply chain are fundamentally changing how we should be approaching cybersecurity.  Targeted advanced persistent threats place high demands on security staff who have to remediate the effects of those threats....

Cloud enabled Network Security as a Service with Check Point Harmony Connect and Harmony Email and Office

As more applications move to the cloud, business users increasingly rely on these applications to do their jobs. From virtual meetings to file-sharing to collaboration through tools, including voice and video traffic, they require consistent, high-quality bandwidth, all the time. For IT organizations that are managing remote and branch offices, it can...

Amid vaccine mandates, fake vaccine certificates become a full blown industry

Black market for fake vaccine certificates booms Check Point Research (CPR) continues to monitor the black market in which fake COVID-19 vaccine certificates are being sold to anyone willing to pay. Black market for fake vaccine certificates expands globally, now selling certificates in 29 countries, 9 of which are new Including: Austria, Brazil, Latvia,...

August 2021’s Most Wanted Malware: Formbook Climbs into First Place

Check Point Research reports that the infostealer, Formbook, is the most prevalent malware while the banking trojan, Qbot, has dropped from the list all together. Our latest Global Threat Index for August 2021 has revealed that Formbook is now the most prevalent malware, taking over Trickbot, which has fallen into second following a three-month long…...

E-REDES Secures Mission-Critical Substation Environments with Next-Generation Security from Check Point Software

By Amit Sharon, Head of Global Customer Community & Market Intelligence, Check Point Software Digitalization is introducing new capabilities into energy distribution and power grids. Intelligent technologies offer far greater visibility and control, but they also open the door to new cybersecurity risks. Learn how E-REDES built next-generation security...

Check Point Cloud Security Wins High Praise as Leader in G2 Reviews

By Amit Sharon, Head of Customer Experience, Check Point Software Check Point customers express their enthusiasm for industry-leading Check Point CloudGuard products on a leading software review site, G2. Check Point CloudGuard helps thousands of customers crush the challenges of managing cloud security and support transformational initiatives across...

Check Point Harmony: A secure solution for remote users

By, Jessica Reece, Manager of Regional Telco Sales The business world has comprehensively shifted over the last year into remote work, a way of life that may be permanent for many organizations. Staying connected at a time of widespread change is paramount, as your employees must be able to work from anywhere on any device,… The post Check Point Harmony:...

Check Point CloudGuard Network Security is a Launch Partner for Amazon VPC Enhanced Routing

By Jeff Kopko, Cloud Alliance Architect and Jonathan Maresky, Cloud Product Marketing Manager, published August 31, 2021 In my previous blog post I wrote about the three pillars of CloudGuard: “Security · Automated · Everywhere”, and explained the importance of the “Automated” pillar. Good automation is vital for all cloud solutions and especially cloud...

How to Maintain PCI-DSS Compliance for E-commerce Applications

By, Gui Alvarenga, Product Marketing Manager While retailers and online stores continue to be targets for hackers due to the large financial gains, it is surprising that many are struggling to meet the demands of payment card security. In fact, according to the 2020 Verizon Payment Security Report, only 27.9% of organizations are currently able… The...

Preventing Multi-Stage Attacks – Case in Point

By: Danielle Guetta, Product Marketing Manager & Amir Helinger, Product Manager On our blog post from January of this year we shared how multi-stage attacks work and how our Threat Emulation technology is able to stop them. To that end, we would like to share a real life multi-stage attack that we blocked recently through… The post Preventing...

Discover, share and read the best on the web

Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters! Get unfiltered news feeds or filter them to your liking.

Get Inoreader
Inoreader - Follow RSS Feeds, Blogs, Podcasts, Twitter searches, Facebook pages, even Email Newsletters!