logo
#

Latest news with #CheckPointSoftwareTechnologies

Pax8 expands cybersecurity offerings with Check Point suite
Pax8 expands cybersecurity offerings with Check Point suite

Techday NZ

time10-06-2025

  • Business
  • Techday NZ

Pax8 expands cybersecurity offerings with Check Point suite

Pax8 has announced that Check Point Software Technologies is expanding its cybersecurity portfolio on the Pax8 Marketplace, giving managed service providers enhanced access to a range of AI-powered, cloud-delivered security solutions. Portfolio expansion The expansion will make a broad suite of Check Point security solutions available to Pax8 partners worldwide. The newly integrated offerings include Harmony Email & Collaboration, Harmony SASE, Harmony Endpoint, Harmony Mobile, Harmony Browse, and Infinity MDR. According to the company, Harmony Email & Collaboration delivers email security with what the companies state are 99.2% catch rates for threats using both artificial intelligence and human intelligence. Harmony SASE offers internet security, Zero Trust Access, and optimised SD-WAN performance, as well as mobile, browser, and SaaS security. Harmony Endpoint consolidates EPP, EDR, and XDR capabilities within a single client. Harmony Mobile addresses mobile device protection across apps, files, networks, and operating systems. Harmony Browse is aimed at web threat prevention across devices. Infinity MDR provides infrastructure monitoring and incident response through access to Check Point's analysts and incident response staff. Partner access Oguo Atuanya, Corporate Vice President of Vendor Experience at Pax8, said the expansion would strengthen the company's global partner ecosystem, enabling managed service providers (MSPs) to access the majority of Check Point's security solutions. "The expansion of Check Point's portfolio on our Marketplace represents a significant milestone in our partnership and underscores our commitment to delivering enterprise-level security solutions to our MSPs," said Atuanya. "Our partners will now have access to the majority of Check Point's security ecosystem - from email and endpoint protection to cloud security and SASE solutions - all managed through a single, intuitive platform. This unified approach enables MSPs to deliver cybersecurity strategies to their SMB clients, while streamlining operations and driving greater profitability." Technology integration The company says all products will be delivered through the Check Point Infinity Platform, a central interface enabling management and monitoring of security operations, tracking threats and attacker behaviours, and managing incidents across network, endpoint, email, cloud, and IoT environments. Shahar Divon, Director of WW MSSP & SMB Sales at Check Point, commented on the partnership's aim to support MSPs. "This integration demonstrates our commitment to supporting MSPs with enterprise-grade security solutions," said Divon. "By bringing our technologies to Pax8's single Marketplace, we're empowering partners to deliver cybersecurity strategies that protect their clients across all attack vectors, while simplifying management and driving business growth." Follow us on: Share on:

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report

Yahoo

time05-06-2025

  • Business
  • Yahoo

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report

Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience. As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can't keep up. According to the report, 65% of organizations experienced a cloud-related security incident in the past year—up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments. 'Security teams are chasing an ever-moving target,' said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. 'As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world.' Key findings from the 2025 Cloud Security Report include: Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can't keep up with these distributed infrastructures Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts Application Security Lags Behind: 61% still rely on outdated, signature-based Web Application Firewalls (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats AI is a Priority — but Defenders Aren't Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging Check Point CloudGuard and the Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, 'cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.' To access the full report and receive actionable CISO advice for safeguarding against the cloud-related issues discussed, please visit our website and read our blog. About the Survey: The 2025 Cloud Security Report, carried out by Cybersecurity Insiders in the beginning of 2025, gathered insights from 937 cyber security professionals across North America, Europe, Asia-Pacific, and other regions. Respondents included CISOs, cloud architects, security analysts, and IT leaders responsible for securing hybrid, multi-cloud, and SaaS environments. The study focused on how businesses using cloud services tackle security issues and highlight advancements, like artificial intelligence, emphasizing the complexity of modern cloud security. Follow Check Point via:LinkedIn: YouTube: ​​​About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. ( is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point's prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers. This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point's industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law. MEDIA CONTACT: INVESTOR CONTACT: Ana Perez Kip E. Meintzer Check Point Software Technologies Check Point Software Technologies press@ ir@ while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data

Check Point launches India-based Harmony SASE instance to boost cybersecurity and compliance for enterprises
Check Point launches India-based Harmony SASE instance to boost cybersecurity and compliance for enterprises

Time of India

time04-06-2025

  • Business
  • Time of India

Check Point launches India-based Harmony SASE instance to boost cybersecurity and compliance for enterprises

Check Point Software Technologies has launched an India-based data residency instance for its Harmony Secure Access Service Edge (SASE) platform. The initiative aims to provide cloud-delivered network security that aligns with India's regulatory requirements while offering scalable, compliant security solutions. Harmony SASE is a unified cloud security platform combining firewall-as-a-service (FWaaS), secure web gateway, zero-trust network access (ZTNA), SaaS protection, and SD-WAN. The platform, powered by Check Point's ThreatCloud, boasts a 99% threat detection rate and AI-driven security capabilities to proactively block malware, phishing, and anomalous behaviour. The hybrid security architecture, integrating on-device and cloud-based protections, promises 10x faster secure access, high-performance connectivity, and deep visibility into SaaS applications. Check Point has deployed localized infrastructure in Bangalore, Chennai, Mumbai, and New Delhi, ensuring low-latency access and adherence to India's data protection laws. The launch aligns with the Digital Personal Data Protection Act (DPDPA) and regulatory mandates from RBI, IRDAI, and TRAI, offering compliance-ready security architecture. "India is at the forefront of global digital transformation—and as the threat landscape grows more complex, security can no longer be an afterthought," said Sundar Balasubramanian, managing director, Check Point Software Technologies, India & South Asia. Cybersecurity threats in India have surged, with organizations facing over 3,200 attacks per week, surpassing the global average, according to Check Point's Threat Intelligence Report. Harmony SASE is tailored to mitigate these risks, providing enhanced security for BFSI, telecom, healthcare, and government sectors.

Check Point to acquire Veriti, boosting threat management suite
Check Point to acquire Veriti, boosting threat management suite

Techday NZ

time28-05-2025

  • Business
  • Techday NZ

Check Point to acquire Veriti, boosting threat management suite

Check Point Software Technologies has entered into a definitive agreement to acquire Veriti Cybersecurity, expanding its offering in threat exposure and risk management. The acquisition aims to strengthen Check Point's Infinity Platform with Veriti's automated, multi-vendor platform for pre-emptive threat exposure and mitigation. Veriti is recognised for introducing pre-emptive exposure management that delivers automated remediation of threat exposure risks across more than 70 security vendors, without disrupting ongoing operations. Nadav Zafrir, Chief Executive Officer at Check Point Software Technologies, said, "The acquisition of Veriti marks a significant step toward realising our hybrid mesh security vision. It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape." The announcement addresses the growing challenge of AI-enabled cyber attacks and the complexities brought about by hyperconnected IT environments in modern enterprises. As organisations distribute their assets across clouds, datacentres, and endpoints, the risk of cyber attacks grows due to an expanded attack surface. Traditional reactive security methods are considered inadequate to address these increased risks effectively. Veriti's platform continuously identifies, prioritises, and remediates risk in multi-vendor security environments through automated patching and collaborative threat intelligence. The company, founded in 2021, has pioneered the Preemptive Exposure Management (PEM) category by actively discovering and mitigating risks that can be hidden in gaps between disparate security tools. The technology continuously monitors logs, threat indicators, and vulnerabilities present in an organisation's environment, and then coordinates protections in real time. Its integrations cover more than 70 security vendors, enabling security teams to detect and prevent attacks promptly without business disruption. Veriti's core capabilities to be integrated into the Check Point Infinity Platform include automated, cross-vendor virtual patching, which instantly applies non-disruptive protections based on vulnerabilities identified by security platforms such as CrowdStrike, Tenable, and Rapid7. This approach can reduce patching time from several weeks to a matter of minutes. The platform also enables real-time threat intelligence enforcement by verifying threat indicators from any connected tool, and orchestrating automated protection across firewalls, endpoints, web application firewalls, and cloud platforms. This coordination is designed to improve response times and effectiveness in multi-vendor security scenarios. An additional aspect of Veriti's offering is its seamless integration with existing environments through an API-based architecture, which does not require software agents or cause operational disruptions. The platform is compatible with more than 70 security vendors and supports a wide ecosystem. Veriti also extends its synergy with Wiz by ingesting Wiz's cloud exposure insights, such as information on unpatched servers or applications, and enables safe, automated virtual patching via Check Point or other vendors' network gateways. The platform's context-aware remediation analyses an organisation's exposures, configurations, and existing protections to apply appropriate controls in a manner that does not impair operations. Adi Ikan, Chief Executive Officer and co-founder of Veriti, said, "Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines." He added, "We founded Veriti to help organisations not just see risk, but remediate it safely, at scale, and most importantly - without disruption." By joining Check Point, we're accelerating that mission. Together, we'll help organisations reduce their exposure faster through the security tools they already trust." Upon completion of the transaction, Veriti's capabilities will be incorporated into Check Point's Infinity Platform as part of its Threat Exposure and Risk Management suite. Combined with Check Point's recent External Risk Management solution, Veriti enhances the company's ability to address internal and external exposures across the complete enterprise attack surface. The finalisation of the acquisition is subject to customary closing conditions and is expected by the end of the second quarter of 2025.

Check Point Acquires Veriti
Check Point Acquires Veriti

Channel Post MEA

time28-05-2025

  • Business
  • Channel Post MEA

Check Point Acquires Veriti

AI-fueled attacks and hyperconnected IT environments have made threat exposure one of the most urgent cybersecurity challenges facing enterprises today. In response, Check Point Software Technologies has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. 'The acquisition of Veriti marks a significant step toward realizing our hybrid mesh security vision,' said Nadav Zafrir, CEO at Check Point Software Technologies. 'It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape.' AI has brought cyber security to a tipping point, enabling the launch of attacks at scale. At the same time, enterprises are hyperconnected, with assets spread across clouds, datacenters, and endpoints, vastly expanding their attack surface. Traditional reactive security is too slow. Veriti continuously identifies, prioritizes, and remediates risk across your multi-vendor environment through automated patching and collaborative threat intelligence, all without disrupting business. Founded in 2021, Veriti pioneered the Preemptive Exposure Management (PEM) category—actively discovering and mitigating risks across siloed tools. Veriti continuously monitors logs, threat indicators, and vulnerabilities identified across the environment and propagates protections in real time. With integrations into over 70 vendors, it empowers security teams to detect, understand, and prevent attacks without delay. Core capabilities Veriti brings to the Check Point Infinity Platform: Automated, cross-vendor virtual patching: Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Real-time threat intelligence enforcement: Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Seamless integration with 70+ security vendors: Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Stronger synergy with Wiz: Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Safe, context-aware remediation: Veriti analyzes each customer's environment, including exposures, configurations, and existing protections, to apply the right controls safely, and without operational impact. 'Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines,' said Adi Ikan, CEO and co-founder of Veriti. 'We founded Veriti to help organizations not just see risk, but remediate it safely, at scale, and most importantly – without disruption. By joining Check Point, we're accelerating that mission. Together, we'll help organizations reduce their exposure faster through the security tools they already trust.' Following the closure of the transaction, Veriti's capabilities will be integrated into the Check Point Infinity Platform as part of the Threat Exposure and Risk Management offering. Combined with the recently added External Risk Management (ERM) solution, Veriti enhances Check Point's ability to deliver complete risk lifecycle coverage—proactively managing both internal and external exposures across the entire attack surface. The closing of the transaction is subject to the customary closing conditions and is expected to occur by the end of Q2 2025. 0 0

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store