Check Point Press Releases

Media Alert: Check Point to Present at Bloomberg Cybersecurity Conference

Redwood City, CA  —  Wed, 11 Apr 2012

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced the company’s participation at the Bloomberg Cybersecurity Conference on April 19, 2012. Check Point Security Evangelist, Tomer Teller, will be speaking about the security implications of Web 2.0 and mobile computing, and the importance of security education and awareness amongst businesses. The session, “Security Threats from Within” will take place at 4:30 p.m. EST at Bloomberg L.P. Headquarters in New York, NY.

“As companies combat traditional Internet threats, security issues with Web 2.0, mobile devices and other emerging technology trends contribute to the growing list of priorities for business leaders,” said Tomer Teller, security evangelist at Check Point Software Technologies. “This rising concern is causing organizations to change the way they think about security, encouraging them to involve employees in the security process and better align IT security with business needs.”

WHAT: The session, “Security Threats from Within”, will invite speakers and audience members to engage in a discussion about the security implications for businesses within an evolving threat environment. Topics to be discussed include:

  • Protecting intellectual property in a global, mobile workplace
  • Securing remote access to corporate data
  • The impact of Web 2.0 and social networks on enterprise security
  • Weighing the dangers and benefits of allowing social media in the workplace
  • The importance of educating employees on cybersecurity threats
WHO: Teller is at Security Evangelist at Check Point, responsible for a variety of large-scale projects in security research and development. In addition, he is a lecturer at Check Point headquarters in Tel Aviv, Israel, and has been a speaker at multiple IT security conferences. Specializing in both high-level and low level software engineering, Teller devotes his free time to original security research. He holds a B.S. in computer science and is a proud owner of a patent in the field of browser exploitation.
WHEN: Thursday, April 19, 2012 from 4:30 – 5:00 p.m.
WHERE: Bloomberg L.P. Headquarters
731 Lexington Avenue at 58th Street, 7th Floor
New York, NY 10022


About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (, the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

About Bloomberg Cybersecurity Conference
The Bloomberg Cybersecurity Conference will examine the increasingly complex network of threats facing public and private enterprises from state and non-state actors and how governments and corporations are defending critical information and infrastructure. The Bloomberg Cybersecurity Conference will bring together senior information technology professionals and corporate chief security officers for a program that will evaluate current and looming threats to infrastructure, networks and the cloud, and strategies to counter threats to enterprise data security.


This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.