Check Point Software Technologies Inc - Experts & Thought Leaders

Latest Check Point Software Technologies Inc news & announcements

MetTel's mobile threat defense solution

MetTel, a pioneer in digital transformation and managed mobility solutions, announces a strategic partnership with Check Point Software Technologies to deliver an advanced mobile threat defence solution for enterprise customers. MetTel’s fully managed Mobile Threat Defense solution, powered by Check Point Harmony Mobile, provides comprehensive protection against mobile cyber threats, ensuring secure access to corporate data without compromising user experience or privacy. Mobile security In the recent work-from-anywhere world, mobile security is no longer optional In the recent work-from-anywhere world, mobile security is no longer optional. With employees accessing more sensitive corporate information via mobile devices, organisations face growing risks from phishing attacks, malicious apps, OS vulnerabilities, and network-based threats. According to market research, 47% of organisations experienced significant repercussions—such as data loss or operational downtime— due to security incidents involving mobile or IoT devices. Mobile Threat Defense solution MetTel’s new Mobile Threat Defense solution combats these challenges by delivering end-to-end protection across all mobile attack vectors — apps, files, networks, and operating systems. It leverages static and dynamic threat analysis to detect known and unknown threats, blocks infected devices, and prevents man-in-the-middle attacks. “Mobile security ranks as the top technology concern for enterprise buyers and MetTel is uniquely positioned to give them confidence that their mobile workforce will be protected from all threats,” said Max Silber, VP of Mobility and IoT at MetTel. “By integrating Check Point Harmony Mobile into our managed mobility ecosystem, we’re providing customers with a seamless, scalable solution that enhances their security posture while maintaining operational efficiency.” Fully managed offering for seamless deployment MetTel’s Mobile Threat Defense solution is delivered as a fully managed service, simplifying deployment, management, and support for enterprise customers. Key features include: Streamlined setup and policy configuration based on industry best practices, with bulk enrolment for company-owned devices. Monitoring and Support: Real-time threat monitoring, end-user troubleshooting, and escalation paths to Check Point for advanced support. Seamless integration with existing mobile device management (MDM) platforms. “With over 60% of internet traffic coming from mobile devices, they’ve become one of the largest — and most vulnerable — targets in today’s cyber threat landscape,” said Gil Friedrich, GM of Workspace Security at Check Point. “Our partnership with MetTel brings AI-powered mobile threat prevention to the forefront, empowering enterprise customers to protect their data and operate with confidence, no matter where their work happens.” Advanced technology Check Point Harmony Mobile leverages patent-pending algorithms and detection techniques to identify mobile device risks and trigger automatic defence responses. Key components include: Mobile Application: Suitable for all mobile operating systems, the application performs analysis on activity on the device, including application downloads and network access, without impacting user privacy and productivity Behavioural Risk Engine: Automatically detects and mitigates suspicious mobile activity using in-depth threat analysis. ThreatCloud AI Intelligence: Provides real-time, global threat intelligence to power anti-phishing, safe browsing, and anti-bot technologies. Mobile Gateway and Dashboard: Offers centralised management, provisioning, and monitoring of devices, policies, and alerts through the Check Point Infinity Portal.

Check Point & Illumio: Zero trust security partnership

Check Point Software Technologies Ltd., a pioneer in cybersecurity solutions, and Illumio, the breach containment company, announced a strategic partnership to help organisations strengthen security and advance their Zero Trust posture. Illumio Segmentation and Insights The integration between the Check Point Infinity Platform and the Illumio Platform delivers rapid identification and mitigation of lateral movement risks across hybrid and multi-cloud environments using advanced microsegmentation enforcement. This collaboration empowers customers to combine Check Point Quantum Force Firewalls, Infinity Threat Cloud AI, and AI-Powered Security Management with Illumio Segmentation and Illumio Insights to neutralise threats by halting lateral movements and strengthening overall cybersecurity.   Zero Trust strategies "Stopping lateral movement is critical to breach prevention," says Itai Greenberg, Chief Revenue Officer at Check Point Software. "Our partnership with Illumio delivers unmatched visibility and adaptive policy enforcement, empowering organisations to contain threats fast. It also demonstrates the strength of our hybrid mesh architecture, which we envision as an open garden, and our commitment to driving Zero Trust strategies with industry pioneers." Check Point’s AI Security Management software Check Point Quantum Force firewalls serve as critical enforcement points, efficiently blocking malicious traffic Check Point Quantum Force firewalls serve as critical enforcement points, efficiently blocking malicious traffic. When threats are detected, Check Point’s AI Security Management software uses a dynamic policy layer to notify Check Point Firewalls how to block the latest threat. The integration with Illumio provides additional AI-driven insights to identify risks and attack routes, enabling quick containment. This combination stops unauthorised lateral movement, protects essential assets, and ensures consistent Zero Trust security across hybrid environments.  Key benefits of the integration  Collaborative approach to Zero Trust: Protect critical assets with effective microsegmentation across hybrid environments without deployment complexity, making Zero Trust adoption faster and simpler.  Proactive threat prevention to prevent lateral movement: Reduce breach risk and the associated costs by catching attacks earlier and preventing them from spreading laterally across networks, clouds, and resources to reach critical assets  Advanced Threat Intelligence: Utilize combined threat intelligence data from ThreatCloud AI and Illumio Insights to mitigate risk and minimise security incidents   Integration of Illumio and Check Point Illumio Segmentation contains breaches, protects critical assets, and enables instant response “This powerful collaboration between Illumio and Check Point marks a significant step forward in cybersecurity threat intelligence and breach containment," says Andrew Rubin, CEO and Founder of Illumio. "The integration of Illumio and Check Point represents a shift towards smarter, more adaptive cybersecurity by enhancing visibility, enabling real-time threat detection and response, and providing adaptive security measures that align with Zero Trust principles. Our proactive approach helps security teams connect the dots and uncover hidden threats more efficiently to avoid cyber disasters."  CDR built on an AI security graph Illumio Insights and Illumio Segmentation are integral components of the Illumio Platform, the first cybersecurity platform focused on breach containment. The world’s first CDR built on an AI security graph, Illumio Insights helps organisations quickly identify and detect threats.  Illumio Segmentation contains breaches, protects critical assets, and enables instant response. Together, these solutions help identify and mitigate risks, contain attacks, and enhance overall cyber resilience. Security and policy management Quantum product line is part of Check Point’s Infinity Platform, which is uniquely AI-powered Check Point's Quantum Force is a series of AI-powered, cloud-delivered security gateways that provide unified security and policy management across on-premises, cloud, and Firewall-as-a-Service environments, simplifying operations and enhancing security efficacy. The Quantum product line is part of Check Point’s Infinity Platform, which is uniquely AI-powered, and cloud-delivered, to protect your enterprise against cyber-attacks, from the data centre, cloud to the branch office through unified management. Integration of Check Point Quantum Force Firewall To witness the integration of Check Point Quantum Force Firewall with Illumio Insights, visit the Illumio booth in the North Hall (#5670) at the RSA Conference in San Francisco, happening from April 28 to May 1st. While at RSA, stop by the Check Point North Hall booth #6072 or attend one of the following RSAC activities. For additional details about Illumio at RSAC, explore their other sponsored activities. 

Endpoint security insights from AV-Comparatives' EPR test

AV-Comparatives, the globally recognised authority in independent cybersecurity testing, has released its 2024 Endpoint Prevention and Response (EPR) Comparative Report, showcasing the exceptional performance of pioneering cybersecurity solutions. The report evaluates the ability of these products to detect, prevent, and respond to advanced threats in real-world scenarios. MITRE ATT&CK® framework AV-Comparatives' rigorous assessment covered products from Bitdefender, Check Point, CrowdStrike, ESET, Kaspersky, Palo Alto Networks, and VIPRE, measuring each against a broad spectrum of complex attack vectors, such as PowerShell Empire, Metasploit Framework, and Commercial Attack Frameworks. The testing utilised the MITRE ATT&CK® framework, ensuring that the results provide invaluable insights for organisations looking to bolster their endpoint security. AV-Comparatvies' EPR Test AV-Comparatvies' EPR Test is designed to evaluate the efficacy of these solutions in countering complex Endpoint Protection Products (EPP), Endpoint Detection and Response (EDR), and Extended Detection and Response (XDR) solutions are vital components of enterprise security, providing defences against targeted threats such as advanced persistent threats (APTs).  AV-Comparatvies' Endpoint Prevention and Response (EPR) Test is designed to evaluate the effectiveness of these solutions in countering complex, multi-stage attacks that target an organisation's entire infrastructure. Top performers (in alphabetical order) Bitdefender had strong detection and response capabilities, delivering consistent protection across various threat scenarios. Check Point demonstrated reliable and comprehensive threat prevention, proving its effectiveness in mitigating complex cyber risks. CrowdStrike delivered a strong performance, showing reliable threat detection and response capabilities, ensuring minimal disruption to operations. ESET provided well-rounded defense strategies, particularly effective in handling advanced and emerging threats. Kaspersky offered a robust set of protection tools, proving reliable in both the detection and prevention of targeted attacks. Palo Alto Networks delivered a solid performance, reinforcing its capabilities in proactive threat detection and security innovation. VIPRE delivered efficient protection, providing reliable defense mechanisms at a competitive cost. These vendors achieved outstanding results by demonstrating their ability to protect against and respond to advanced persistent threats (APTs), ransomware, and other complex cyberattacks. This year's evaluation highlighted their continual evolution in response to the growing complexity of attack tactics, techniques, and procedures (TTPs). Comprehensive evaluation The testing spanned several months, from June to August 2024, with products undergoing assessments in multiple phases, from Initial Access and Lateral Movement till Exfiltration and Impact. Each product was tested in real-world attack scenarios to simulate the high-stakes environments that enterprises face today. AV-Comparatives emphasized the importance of these evaluations: "As cyberattacks grow more sophisticated, it is critical for organisations to rely on solutions that can offer not only prevention but also rapid and effective response capabilities. Our 2024 EPR report serves as a benchmark for IT professionals and cybersecurity analysts to assess and choose the most effective cybersecurity solutions." Endpoint security solutions AV-Comparatives EPR Test and MITRE Engenuity have their merits, each providing insights into endpoint security keys The difference between AV-Comparatives' EPR Test and MITRE ATT&CK Engenuity. Both the AV-Comparatives EPR Test and MITRE Engenuity have their merits, each providing useful insights into endpoint security solutions. Understanding the differences between these two tests is essential for IT managers, CISOs, and other tech-savvy professionals looking to select endpoint security solutions that will effectively protect their environments. Key takeaways for CISOs and cybersecurity analysts For CISOs and cybersecurity analysts, the 2024 EPR Comparative Report provides a data-driven perspective on the capabilities of pioneering vendors. It offers an in-depth analysis of how each product performs under pressure, which is essential for making informed decisions about endpoint security investments. Given the evolving threat landscape, selecting the right EPR solution can significantly reduce the risk of breaches and improve overall incident response.

Quick poll
How likely is it that companies will invest in cloud-based physical security solutions in the next 5 years?