Check Point South Africa

Tel:
Fax:
Email: rrogers@checkpoint.com
www: www.checkpoint.com
more information about Check Point South Africa

Cloud and mobile deployments are the weakest links
April 2019, Cyber Security
Report highlights the cloud and mobile attack vectors used to target enterprises: nearly one in five organisations experienced a cloud security incident in the past year.

Read more...
37% of organisations impacted by cryptomining
February 2019, Cyber Security
New report shows 20% of companies globally continue to be hit by cryptomining attacks every week; 33% of companies were hit by mobile malware, and just 4% by ransomware in the past 12 months.

Read more...
Check Point announces CloudGuard SaaS
November 2018, Cyber Security, IT infrastructure, Products
Check Point Software Technologies announced the general availability of CloudGuard SaaS, a cloud suite designed to prevent sophisticated security threats that target SaaS applications.

Read more...
The dark side of the Internet
June 2018, Editor's Choice, Cyber Security
Research from Check Point Software Technologies shows that Telegram may be the new channel of choice for conducting cybercrime anonymously.

Read more...
New cloud security technology
April 2018, Editor's Choice, Cyber Security, Security Services & Risk Management
We have moved past a threshold where the traditional security approaches don’t fit with the dynamic nature of the cloud, leaving businesses exposed to a whole host of new threats.

Read more...
There is no Internet of Things. It’s all the Internet of Things.
April 2017, PinnSec, Technews Publishing, CCTV, Surveillance & Remote Monitoring
The physical security industry is receiving a baptism of fire into the world of cyber security since the appearance of the Mirai botnet. But it's only the beginning.

Read more...
Profitable ransomware
October 2016, Security Services & Risk Management
Check Point researchers unravel complex money trail of ‘Cerber,’ one of the world’s largest active ransomware campaigns, building decryption tools regain control of infected computers.

Read more...
Are you a whale?
October 2016, Cyber Security, IT infrastructure
Whaling attacks, also called Business Email Compromise, is a form of elaborate spear phishing, usually targeting C-level executives, i.e. the ‘big fish’.

Read more...



      Page 1 of 1