Check Point will be monitoring and accessing the Shellshock vulnerability to issue continuous protection for their partners as well as customers....  more>>
Thursday, November 13, 2014
Check Point’s Malware and Vulnerability Research Group have exposed Misfortune Cookie, the most widespread vulnerabilities in present years, detected at almost 12 millions devices connected to internet in multiple countries across the globe....  more>>
Tuesday, January 6, 2015
Check Point Software Technologies, a provider of hardware and software products for IT security, has announced that it has cracked the code of DirCrypt –a type of ransomware...  more>>
Wednesday, January 7, 2015
Check Point Mobile Threat Prevention can detect, assess and eradicate cyber invasion on critical business data rest and transit on iOS and Android mobile devices....  more>>
Monday, August 17, 2015
In a quest to deliver enhanced web security solutions, Wavecrest Computing, a provider of web security management and reporting solutions, partnered with Check Point Software Technologies, a pure-play security vendor....  more>>
Tuesday, August 18, 2015
cronis, a global provider of data protection software is collaborating with Check Point Software Technologies, a provider of security solutions,...  more>>
Tuesday, September 15, 2015
Check Point Software Technologies, provider of software and combined hardware and software products for IT security, has introduced Check Point SandBlast....  more>>
Wednesday, September 16, 2015
Check Point Software Technologies, a pure-play security vendor, joins AirWatch Mobile Security Alliance (MSA) as a founding member. Through its participation, it looks forward to extend enhanced mobile security solutions....  more>>
Friday, October 16, 2015
Check Point’s Threat Intelligence and Research Area reports identification of cyber-espionage activity targeting individuals and organizations in the Middle East, Europe and United States....  more>>
Friday, November 13, 2015
A common thread among most breached organizations is the entry point for attackers was unknown, deemed too fragile to patch, unimportant, or was considered low risk because it didn't hold or process regulated data....  more>>
Tuesday, December 1, 2015
<<Previous  1   2   Next>>