Prevention-first approach to cybersecurity

Issue 1 2023 News & Events, Information Security, Security Services & Risk Management

Check Point Software Technologies kicked off its annual customer and partner event, CPX 360, in Munich this March. The three-day showcase brings together leading experts from the sector to explore the latest solutions and strategies that protect organisations against the most sophisticated cybersecurity threats.

Gil Shwed, Founder and CEO of Check Point Software Technologies took to the stage to explore key themes set to shake up the industry. During his keynote ‘Level Up to the Best Security’, Shwed called 2023 ‘the year of AI.’

Shwed explained, “Every few years, the industry experiences a major shift and we are currently in the midst of the AI revolution. For a decade, Check Point has consistently been investing and building it into our systems, with more than half of our threat engines using this technology to ensure complex infrastructures can stay protected. For me, 2023 is the tipping point for AI as we begin to become more dependent on its capabilities in daily life, and it cements itself as an integral part of how we defend our evolving networks.”

Shwed elaborated on what he had observed over the last year and how businesses can prepare for this shift. He stated that the continued commitment to hybrid working has resulted in more than a 50% increase in the number of digital devices used per person. This coincides with a rise in both the number of cyberattacks and the level of sophistication, with Check Point seeing a 38% increase in cyberattacks globally.

He added, “For many businesses, the problem is that their products don’t work together, it’s simply too complex. We need to ensure that all systems are communicating with each other to contain the risk if breached. This isn’t currently standard practice and in 2023, that will make businesses vulnerable.”

Shwed’s vision is reflected in the company’s prevention-first approach to cybersecurity, delivered through the three Cs of best security: Comprehensive, Consolidated and Collaborative. Organisations deserve a solution that covers all vectors to prevent an incident from occurring in the first place, can consolidate architecture to enhance security coordination and effectiveness, and integrate with third-party systems to deliver the most accurate real-time data.

During the event, Check Point’s Vice President of Product Management, Eyal Manor also shared the latest product enhancements designed to protect against the threats observed by Check Point Research. Specifically, the launch of Check Point Infinity Global Services, an end-to-end security service that will help organisations prevent advanced cyber threats, respond to widespread attacks and enhance every aspect of their security resilience. Manor highlighted how this launch has stemmed from the growing complexity of cybersecurity and the lack of qualified professionals to manage it, with a skills gap of 3.4 million in the industry.

Maya Horowitz, Vice President of Research, was also in attendance and took the audience on a journey through history, reflecting on Check Point’s ability to meticulously decode, analyse and pivot through data to identify new threats and find ways to block them rapidly. She referenced Queen Monarchs of the past to illustrate the complexities of hacking groups such as Conti, the increased tension of geopolitics which have now moved into the cyber dimension, as well as the shift from attacking individuals to critical infrastructure that is cause for concern.

Customers, employees and partners also heard from several other Check Point executives, including Ofir Israel, Vice President of Threat Prevention, who continued the conversation around the impact of AI, looking at cyber warfare and how this technology has changed the world of cybersecurity.

Find out more at www.checkpoint.com.




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Navigating a modern, layered security landscape
News & Events Perimeter Security, Alarms & Intruder Detection Smart Home Automation
The convergence of perimeter control and access automation is driving demand for solutions that work together. This is the focus of HomeSec Expo 2026, which takes place on 4th and 5th March 2026 at the Gallagher Convention Centre in Johannesburg.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Phishing and social engineering are the most significant risks
News & Events Information Security
ESET Research found that phishing accounted for 45,7% of all detected cyberthreats in South Africa, with higher-quality deepfakes, signs of AI-generated phishing websites, and short-lived advertising campaigns designed to evade detection.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
From the editor's desk: It’s all about data
Technews Publishing News & Events
      Welcome to the SMART Access and Identity Handbook 2026. We have slightly changed the handbook this year, specifically the selection guides, but there is still a lot of industry information inside, and ...

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Protecting high-value data from AI
CASA Software Infrastructure Information Security Products & Solutions
As artificial intelligence accelerates the speed and sophistication of cyberattacks, protecting high-value data, such as financial records, legal files, patient data, intellectual property, and compliance records, has never been more urgent.

Read more...
Reshaping South Africa’s built environment
Securex South Africa Facilities & Building Management News & Events Commercial (Industry)
FM teams are responsible for the overall operational environment of a building, while security teams focus on protection, control, and incident response. Increasingly, both rely on the same data streams, infrastructure, and digital tools.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.