Check Point Software

  • Getting to Know Katya Pikkarainen
    by gmcdouga on December 20, 2024 at 1:00 pm

    Katya, can you tell us a bit about yourself? I have a Bachelor of Science in Business Management from the University of Minnesota, and Iā€™m currently an Account Manager living in Minnesota, where I was born and raised. What led to your decision to join Check Point? Ā  In my last job, I worked as a Sales Engineer for a networking and connectivity company that primarily focused on Layer 2 ruggedized ethernet switches and industrialized cable and robotics equipment. However, they also had a cyber security solution, which introduced me to the world of cyber. Soon after, I realized that The post Getting to Know Katya Pikkarainen appeared first on Check Point Blog.

  • Config Chaos | How IoT and Cloud misconfigurations undermine security
    by gmcdouga on December 20, 2024 at 1:00 pm

    In an increasingly connected world, IoT and cloud infrastructures are the backbone of modern innovation. As IoT evolves, it intertwines with hybrid cloud architectures. APIsā€”essential for communication between IoT devices and the cloudā€”serve as both lifelines and attack vectors. Yet, as these technologies integrate deeper into our lives and businesses, they introduce hidden vulnerabilitiesā€”misconfigurationsā€”that few fully understand. These oversights are no longer merely technical glitches; they are amplifiers of systemic risk, creating cascading failures across the digital ecosystem and staggering costs. Human error is also a common cause for misconfiguration. According to Verizonā€™s Data Breach investigation report, human error is The post Config Chaos | How IoT and Cloud misconfigurations undermine security appeared first on Check Point Blog.

  • Check Point Recognized in the 2024 GartnerĀ® Magic Quadrantā„¢ for Vision and Execution
    by anap on December 19, 2024 at 3:16 pm

    We are honored to be recognized in the Gartner Magic Quadrant for Email Security Platforms. GartnerĀ® evaluates factors that range from overall viability, to pricing, to sales execution, to market responsiveness. Decision-makers who are looking for a market leader in cyber security will see that Check Pointā€™s products offer premium enterprise protection. The AI Advantage: Harmony Email & Collaboration ā€œThe sheer deluge of email scams requires advanced solutions that focus on AI and NLP (Natural Language Processing), ā€œ says Check Pointā€™s VP of Email Security, Gil Friedrich. Harmony Email & Collaborationā€™s AI scans for over 300 phishing indicators, from metadata, The post Check Point Recognized in the 2024 GartnerĀ® Magic Quadrantā„¢ for Vision and Execution appeared first on Check Point Blog.

  • Innovators ā€“ Join us to compete and win at Check Pointā€™s Innovation Sandbox Competitions in Vienna and Vegas!
    by gmcdouga on December 19, 2024 at 1:00 pm

    Itā€™s time for CPX again, and we invite you to compete in our 2025 Innovation Competition at our global CPX events in Vienna and Vegas, with a chance to earn a main-stage keynote slot at the event! This year, our competition format is ā€œfree formā€. You can compete on any strong cybersecurity innovation idea, anyone with a ground breaking cybersecurity innovation is invited to compete! We recommend 3 minutes for your presentation, but youā€™ll have a 5-minute timer countdown for your presentation, and when the timer ends, the microphone and screen will be turned off. And we heard your feedback The post Innovators ā€“ Join us to compete and win at Check Pointā€™s Innovation Sandbox Competitions in Vienna and Vegas! appeared first on Check Point Blog.

  • How SASE Addresses Enterprise Network Challenges
    by gmcdouga on December 18, 2024 at 1:00 pm

    Unified Security and Network Performance The proliferation of remote work, cloud services, and mobile devices has expanded the traditional network perimeter, introducing complexities in ensuring secure and efficient access to resources and the need to defend against web-based threats. All of this presents challenges to balancing flexibility, security, and performance. Enter Secure Access Service Edge (SASE), a transformative framework that converges networking and security into a unified, cloud-native service. SASE integrates wide-area networking (WAN) capabilities with comprehensive security servicesā€”such as Secure Web Gateway (SWG), Firewall as a Service (FWaaS), Zero Trust Network Access (ZTNA), and more ā€”into a single, cloud-delivered The post How SASE Addresses Enterprise Network Challenges appeared first on Check Point Blog.

  • Google Calendar Notifications Bypassing Email Security Policies
    by gmcdouga on December 17, 2024 at 1:00 pm

    Google Calendar is a tool for organizing schedules and managing time, designed to assist individuals and businesses in planning their days efficiently. According to Calendly.com, Google Calendar is used by more than 500 million people and is available in 41 different languages. Due to Google Calendarā€™s popularity and efficiency in everyday tasks, it is no wonder it has become a target for cyber criminals. Recently, cyber security researchers at Check Point, have observed cyber criminal manipulation of dedicated Google tools ā€“ namely Google Calendar and Google Drawings. Many of the emails appear legitimate because they appear to directly originate from The post Google Calendar Notifications Bypassing Email Security Policies appeared first on Check Point Blog.

  • What We Saw in Web Security in 2024 and What We Can Do About It
    by gmcdouga on December 17, 2024 at 1:00 pm

    2024 was a defining year for web security, marked by some of the most sophisticated cyber threats weā€™ve seen. As businesses continued shifting to web-based work environments ā€“ relying on SaaS platforms, cloud-based application, remote work and BYOD policies ā€“ attackers increased their focus on browsers, exploiting vulnerabilities faster than ever before. The rise of AI-powered attacks, Ransomware-as-a-Service (RaaS) and Zero-day vulnerabilities that focused on the web has made it clear that a new approach to browser security is needed. Traditional endpoint, SaaS or email security solution alone ā€“ are no longer enough. In response, advanced browser security solutions and The post What We Saw in Web Security in 2024 and What We Can Do About It appeared first on Check Point Blog.

  • Unlocking the Power of In-Context Emulation in Malware Sandboxing
    by gmcdouga on December 13, 2024 at 1:00 pm

    In the cyber security world, malware analysis is crucial for identifying and neutralizing threats. Attackers constantly evolve their methods, and defenders must stay ahead with advanced tools. One such tool is sandboxing, a controlled environment where suspicious files are executed and observed safely. At Check Point, our Threat Emulation bladeā€™s new feature ā€œIn-Context Emulationā€, improves malware detection by replicating real-world environments, addressing some of the toughest detection challenges. What is In-Context Emulation? Traditional sandboxing runs files in isolation, which helps identify basic malicious behavior. However, modern malware often requires specific files, interactions, or system configurations to activate fully. This is The post Unlocking the Power of In-Context Emulation in Malware Sandboxing appeared first on Check Point Blog.

  • Keeping Explore St. Louis Safe: How Check Pointā€™s Technology Secures a Dynamic Public Network
    by gmcdouga on December 12, 2024 at 1:00 pm

    The St. Louis Convention & Visitors Commission, known as Explore St. Louis, is the official organization in charge of promoting St. Louis City and St. Louis County for conventions, meetings, and leisure activities. It also manages the Americaā€™s Center Convention Complex. Explore St. Louis collaborates with over 750 local partnersā€”including hotels, restaurants, attractions, and service providersā€”to draw citywide conventions, single-hotel meetings, sports events, group tours, and individual tourists to the area. However, overseeing Americaā€™s Center Convention Complex and its numerous events, involves a wide range of operational and technological challenges. Darren Ison serves as the Director of IT at Explore The post Keeping Explore St. Louis Safe: How Check Pointā€™s Technology Secures a Dynamic Public Network appeared first on Check Point Blog.

  • MITRE ATT&CKĀ® Evaluations Highlights Check Point Detection
    by gmcdouga on December 11, 2024 at 2:00 pm

    In the 2024 MITRE ATT&CKĀ® Evaluations, Check Point demonstrated what world-class detection looks like. The results speak for themselves: detection of all 57 applicable tested attack steps, with an impressive 56 detections at technique level. This isnā€™t just about catching threats ā€“ itā€™s about understanding them in detail, giving security teams the insights they need to respond effectively. Two additional steps in the evaluation were marked as not applicable. Understanding the MITRE ATT&CKĀ® Evaluations The MITRE ATT&CKĀ® Evaluations provide organizations with objective insights into security solutionsā€™ detection capabilities. This vendor-independent testing program assesses how security products detect sophisticated attack behaviors The post MITRE ATT&CKĀ® Evaluations Highlights Check Point Detection appeared first on Check Point Blog.

Share Websitecyber