The Latest Check Point News
Product and Solution Information, Press Releases, Announcements
Visionary Check Point Research Reveals Massive Increase in New and Unknown Malware on Enterprise Networks | |
Posted: Thu May 08, 2014 01:54:40 PM | |
Check Point 2014 Security Report Details Threat Trends Pulled From Over 9,000 Security Gateways Deployed Across Enterprise Organizations Globally. San Carlos, CA -- May 8, 2014 -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today issued its 2014 Security Report, the company’s second annual report uncovering the major threat trends that impacted organizations across the world. In a world of ever-changing cyber threats, organizations must understand the nature of the latest exploits, and how their networks are potentially impacted. Enterprises need to arm themselves with both cyber threat awareness and the appropriate security architecture to address these evolving challenges. The 2014 Security Report reveals the prevalence and growth of threats on enterprise networks, through information obtained over the course of 2013. This report is based on collaborative research and in-depth analysis of over 200,000 hours of monitored network traffic, from more than 9,000 Threat Prevention gateways, across organizations in 122 countries. Key findings include:
“Our 2014 Security Report provides a bird’s eye view into the degree of infiltration and sophistication of new threats. We found that organizations are often surprised by the severity of bot infections and the various threats that lurk on their networks,” said Amnon Bar-Lev, president of Check Point Software Technologies. “It is clear that customers need an architectural approach to deal with these issues. Customers can rely on our revolutionary security architecture Software-defined Protection (SDP) to prevent the spread of attacks, and protect in real-time against new and existing threats.” Check Point offers unparalleled network protection through industry-leading security solutions for organizations of all sizes, providing best-in-class software and hardware against all the types of threats identified in this year’s Security Report. By consolidating security into a single, integrated solution, organizations have the flexibility to customize their security infrastructure based on the protection and performance needed in their environments. Check Point security appliances start with the 600 appliances, offering big security to small businesses, up to the 61000 appliance model, the industry’s fastest security system. Users are able to choose from a wide variety of advanced security capabilities as part of Check Point’s award-winning Software Blade Architecture™, with four pre-defined security packages including Next Generation Firewall, Next Generation Threat Prevention, Next Generation Data Protection and Next Generation Secure-Web Gateway. As part of Check Point’s industry leadership, our experts regularly conduct Security Workshops, to analyze and review a customer’s security architecture as well as the usage of their security solutions. Through these workshops, Check Point can offer valuable strategies for deployment of effective security architectures and mitigation of threats. Security Workshops are preceded by a Security Checkup, where a customers’ traffic is monitored for several days. |