Check point Software technologies
-
Check Point Software Declares Hosting of Endpoint & Mobile Solutions
Check Point Software Technologies has declared the hosting of Check Point Harmony Endpoint and Mobile solutions in India as part…
Read More » -
RICOH Allies with Macroview Telecom & Check Point
RICOH Hong Kong has introduced network security solution by entering into strategic cooperation with well-known information security solution providers Macroview…
Read More » -
Sundar N Balasubramanian, New MD of Check Point Software Technologies, India & SAARC
Check Point Software Technologies appoints Sundar N Balasubramanian as Managing Director for the India and SAARC region. Wherein, Bhaskar Bakthavatsalu…
Read More » -
No Environment is Immune to Cyber Attacks – Check Point Research
Check Point Software Technologies has released its “Cyber Attack Trends: 2019 Mid-Year Report”, revealing that no environment is immune to cyber-attacks. Threat actors…
Read More » -
Check Point Software Releases New Security Analytics Solution
Check Point Software Technologies has released CloudGuard Log.ic – a solution which delivers cloud-native threat protection and security intelligence. Log.ic…
Read More » -
Check Point Announces Integration With Microsoft AIP
Check Point Software Technologies announced that it has integrated Check Point security appliances and the Check Point R80 SmartConsole security…
Read More » -
April 2019’s Most Wanted Malware: Cybercriminals up to Old ‘TrickBots’ Again
In April 2019, banking trojan Trickbot re-appeared in the top ten most wanted malware list for the first time in…
Read More » -
February 2019’s Most Wanted Malware: Coinhive Quits While Still at the Top
Check Point Research, the Threat Intelligence arm of Check Point Software Technologies has published its latest Global Threat Index for February 2019. The…
Read More » -
Cloud, Mobile Deployments, the Weakest Links in Enterprise Networks – Report
Check Point Software Technologies has published the third instalment of its 2019 Security Report. It highlights how threat actors are increasingly targeting…
Read More »