Check Point Software Technologies Whitepapers


Sort by: Date | Company | Title


The plastic breach - Protecting the retail sector
By Check Point Software Technologies | 28/4/2015

Who would have thought that a small piece of plastic measuring a mere 2.125 inches by 3.370 inches could open a window to so much mayhem? Find out to safe guard your PoS terminals from cyber criminals hacking retail networks.

Download this now


The myths of mobile security
By Check Point Software Technologies | 28/4/2015

Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization’s road warriors, but also create freedoms for all employees to stay connected whether at a conference, working from home, or even sitting in an airport terminal.

Download this now


Check Point: A Gartner Magic Quadrant Leader in Enterprise Network Firewalls Since 1997
By Check Point Software Technologies | 28/4/2015

For the eighteenth consecutive year, Check Point has been positioned in the "Leaders" quadrant in the Magic Quadrant for Enterprise Network Firewalls1. Gartner evaluates each vendor’s Enterprise Network Firewall offerings on a scale of completeness of vision and ability to execute.

Download this now


Stopping the next massive cyberattack
By Check Point Software Technologies | 28/4/2015

Cybercrime is now a leading menace of 21st century businesses. Perhaps even more unsettling, many cybercrime victims have been breached despite sizeable security investments and best-of-breed product deployments. For this reason, the sophistication of recent attacks has created a widespread sense of fear and distrust among consumers.

Download this now


Cyber Security Guide - 10 Steps to a More Secure Business
By Check Point Software Technologies | 9/3/2015

Just as we’ve learned to tune out car alarms, so have we become impervious to the headlines of cybercrime. That’s despite cybercriminals stealing over 500 million identities1 in 2014, alone. According to a December 2014 Computer Weekly article2, “The production of malware continues on an industrial scale, with exploit kits and malware services putting sophisticated attack methods in the hands of relatively unskilled cyber criminals.” And unfortunately, ignoring the issue will not make it go away.

Download this now


Network boundaries have gone mobile
By Check Point Software Technologies | 15/12/2014

Today’s employees carry smartphones, tablets and laptops and rarely think twice about using their personal devices for work or work devices for personal activities. The mobile workforce will surpass 1.3 billion people, or 37% of the world’s overall workforce, by 2015 according to IDC.1

Download this now


Security Check Up Analysis Report
By Check Point Software Technologies | 15/12/2014

This document provides the findings of a recent security analysis of your infrastructure. The document represents a summary of these findings and presents a set of recommendations for addressing the detected events.

Download this now


Bridging the Enterprise Mobility Gap
By Check Point Software Technologies | 14/12/2014

Mobile computing is no longer a “fad”—recent ESG research data shows that 87% of enterprise organisations say mobile computing is either “critical” or “very important” for supporting business processes and employee productivity. In fact, ESG research indicates that 42% of enterprises are actively developing a significant number of mobile applications themselves. Report the full report today.

Download this now


Zero Second Day? More like Zero Second
By Check Point Software Technologies | 14/12/2014

What can malware do in 60 seconds? One minute can change everything for a business. The speed of business is all about being responsive to customers and stakeholders. So what happens when the speed of business is overtaken by the speed of malware? Given the unprecedented growth in the number of security threats that focus on stealing data, sabotaging business continuity and damaging a company’s reputation, what should organizations do to ensure the speed of malware doesn’t disrupt the speed of business? T

Download this now


The 300 Unknown Malware Test
By Check Point Software Technologies | 14/12/2014

New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company’s reputation.

Download this now