How can I help you? Start Chat

US Phone: 1-866-488-6691
International Phone: +44-2036087492

  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter
Avoid Mobile Security Breaches in Healthcare

Delivering quality care is top of mind for every medical professional. Instant, mobile access to systems and data enables practitioners, clinicians and support staff to work faster and with more accuracy, but not without risk. Just one security breach could trigger investigations, cause costly HIPAA violations, or even jeopardize patient care. Learn how an ounce of mobile prevention is worth a pound of cyberthreat cure.

Gooligan: Uncovering the Attack that Breached Over 1 Million Google Accounts

It’s enough of a risk when the security of any account is compromised, but what happens when Andorid malware like Gooligan breaches over a million Google accounts? Our smartphones and tablets are gateways to the sensitive personal and business data we keep stored on cloud services. That opportunity keeps cybercriminals hard at work and ahead of the curve. Without the right protection, these attacks can expose you and your business to significant risk right under your nose. Watch this webinar to learn about today’s cybersecurity challenges and how to secure your organization from the device to the data center.

Check Point vSEC: Comprehensive Threat Prevention Security for AWS

Organizations transitioning to a cloud-based environment can face a new set of security risks and challenges that their legacy security approaches are unable to address. Listen to Check Point and AWS talk about ways to seamlessly extend the same advanced security that protects your on-premises infrastructure to your AWS workloads. Hear about real-world examples of how enterprises have secured their AWS assets with vSEC and best practices for identifying and preventing sophisticated cyber threats from reaching your cloud workloads.

HummingBad, QuadRooter, Trident: What’s the next mobile threat?

We spend more time than ever our smartphones and tablets, but can we trust them to keep our sensitive corporate information safe? These devices hold treasure troves of valuable data, which keeps cybercriminals hard at work and sometimes ahead of the curve. Sophisticated attacks that exploit vulnerabilities in Android and iOS like QuadRooter and Trident are pervasive and persistent. Mobile malware such as HummingBad have infected millions of phones worldwide. These unique and unknown threats are the ones you should worry about most. Without the right protection, these can expose you and your business to significant risk right under your nose.

Best Practices for Defending the Endpoint

Understanding today’s rapidly evolving endpoint technology landscape positions businesses like yours to implement solutions best suited to defend endpoints, detect and block constantly evolving threats, and quickly understand and mitigate business impact.
Mike Rothman, Analyst & President of Securosis shares his view of the current state of endpoint protection technology and how it has evolved. Mike provides valuable insight into advanced endpoint defense strategies and solutions designed to reduce attack surface, detect and prevent attacks, and enable rapid response to cyber threats. Orli Gan, Check Point Head of Threat Prevention Products joins him to discuss how Check Point SandBlast Agent can protect your endpoints, stop the spread of malware post-infection, and get your organization back to business quickly after an attack. Watch this video to see how your business can stay one step ahead of today’s most advanced threats.

Pegasus & Trident: Government-grade Espionage on iOS in the Wild

iOS devices are increasingly targeted by cybercriminals with new, sophisticated ways of stealing sensitive information. Pegasus, a lawful government cyberespionage tool being misused by entities beyond the law enforcement community, and Trident, a series of three iOS exploits cybercriminals use to install Pegasus are the latest examples. Users of iPhone and iPad devices assume their data is secure, but these new threats clearly prove how you and your business can be exposed to significant risk. Watch our webinar to learn how threats like Pegasus and Trident work, what information on iPhones and iPads could be exposed, and how Check Point Mobile Threat Prevention detects and remediates attacks like these.

Best Practices to Securing the Hybrid Clouds and SDDC

Organizations are rapidly embracing cloud technologies to lower costs, simplify operations, and accelerate application deployment. However, cloud technologies aren’t well understood and most organizations lack the right skills to effectively respond to security incidents or address the risks associated with moving data to the cloud. Watch this webinar to learn more about this strategy and its profound effect on cyber security.

SandBlast Agent for Browsers webinar replay

Web browsing introduces an array of security risks to all organizations. Malware hidden in web-downloaded content, phishing and social engineering attacks and even the reuse of corporate passwords by your employees for non-business web services puts your organization at risk. To further complicate matters, hackers constantly evolve these attacks to evade detection by traditional signature-based solutions. Watch the on-demand webinar where we discuss how Check Point SandBlast™ Agent has expanded to help protect your employees at the browser and maintain business productivity and security.

How to Keep Mobile Threats at Bay

As smartphones and tablets become more powerful, keeping devices and data protected is critical, but more than half of decision makers in a recent IDC survey experienced security and compliance issues during mobility rollouts. With savvy cybercriminals using vulnerabilities in apps, networks, and operating systems to gain control of mobile devices, businesses need mobile security that integrates with existing systems for continuous protection. Watch this webcast to learn why comprehensive mobile security is needed, how the cloud helps reduce complexity and increase visibility and control, and the role Check Point plays in preventing advanced attacks on iOS and Android.

Advanced Threat Prevention for Office 365™ Cloud Email

Join us as we discuss how Check Point is expanding the award-winning SandBlast™ Zero-Day Protection solution suite to protect the users in your Office 365 environment. Discover how SandBlast Threat Emulation delivers the highest catch rate for known and unknown malware, proactively preventing attacks. In addition, learn how SandBlast Threat Extraction provides safe content to end-users without compromising delivery speed. Be sure to attend our presentation for information about how the SandBlast suite provides advanced threat prevention as a pure cloud solution that is transparent to end-users and is easy to deploy and manage.

The Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware

As ransomware attacks continue to mature both in frequency and intensity, their impact on business has grown exponentially. Hackers have encrypted hundreds of thousands of files, including shared network storage, incapacitating users and often taking whole networks hostage. They demand payment of ransom in return for decryption keys to enable you to regain access to your files. To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. Watch the webinar to learn how ransomware targets your end users and infiltrates your network. Also see real-life examples of ransomware attacks and discover best practices to protect your organization.

A New Model for Security Management

Faced with the barrage of connected devices, new technologies like cloud computing and continuous waves of sophisticated threats, is it a challenge for your security team to keep pace? Join us for this webcast to understand the trends that are disrupting the way security is managed today. Learn new approaches to managing security that can help you be more organized, efficient and effective in protecting your users and your business.

Mobile Attacks Storm the Doors of the Enterprise: Are You Ready?

Cyber thieves are banging on smartphones and tablets with terrible brute force. They know the mobile devices your employees use for personal and work purposes are treasure troves of valuable, unprotected data. But bolstering your security to protect against new, unknown mobile threats is tricky. Join our webinar to hear how security experts at Samsung Research America use Check Point Mobile Threat Prevention to protect mobile devices and data.

Closing the Loop – Advanced Endpoint Protection and Forensics with SandBlast Agent

As threats evolve to capitalize upon alternative threat vectors and security gaps, such as laptops roaming outside the network perimeter and malware originating on a USB device, organizations must find means to continuously detect and prevent attacks and respond quickly to limit damages. You need access to the insights required to understand and triage attacks to quickly identify source and scope, and to determine the best path of resolution.

Understanding SandBlast – A Technical Overview of Check Point Zero-Day Protection

Check Point SandBlast protects organizations against unknown malware, zero-day threats and targeted attacks, and prevents infections from undiscovered exploits. By combining CPU-level detection with our industry leading OS-level sandboxing, Check Point has made a significant leap in enterprise security. Threat Extraction, a part of SandBlast, preserves business agility and continuity.

Making Mobile Security Stepping Stones Out of Cybercrime Stumbling Blocks

Today’s cyber thieves are particularly sneaky. They work long and hard at finding new ways to steal sensitive data from the devices we use and trust the most: our smartphones and tablets. These data-rich devices are quickly replacing laptops and PCs as our primary screens at work too, making it more important than ever to defend them against new, advanced mobile threats. But how do you step ahead of sophisticated cyber thieves without stumbling over security or the end-user experience?

When a CISO Closes a Door, a Cyber Thief Opens a Window

Staying one step ahead of sophisticated cyber thieves isn’t easy. They work as hard at finding new ways to steal sensitive information as you do to keep it protected. And as smartphones and tablets rapidly replace laptops and PCs, cyber thieves know their best opportunity — and your greatest risk — is the valuable data on mobile devices. But what if those trusted to help keep mobile data safe, like device makers and mobile carriers, were giving thieves the keys to your front door? Certifi-gate, a set of Android vulnerabilities recently uncovered by Check Point is exactly that kind of threat. It exposes hundreds of millions of devices right out of the box to clever cyber thieves right under your nose.

Watch this Webinar to learn how mobile devices have shifted the security paradigm and threat landscape, how vulnerabilities like Certifi-gate work and how they can leave you exposed, best practices for mitigating mobile risks and threats, and how Check Point and MobileIron work together to help detect and stop threats before they expose your enterprise data.

Staying One Step Ahead with SandBlast Zero-Day Protection

Today cybercriminals identify and strategically attack the most vulnerable organizations using highly targeted and customized attacks. In the ongoing battle between hackers and security professionals, attackers are creating new malware variants aimed at bypassing traditional signature-based security solutions, and evading first generation sandboxing solutions.

Watch this webcast to learn about Check Point SandBlast Zero-Day Protection, an innovative approach to stop unknown malware, zero-day and targeted attacks from infiltrating networks. The webcast features Mike Stiglianese, Managing Director, Axis Technology, LLC and former Chief Information Technology Risk Officer for Citigroup.