Check Point Software Technologies Whitepapers


Sort by: Date | Company | Title


Forrester Research : Use Actionable Threat Intelligence to Protect your Digital Business.
By Check Point Software Technologies | 14/12/2014

How do you ensure you are choosing the right threat intelligence solution for your organization?

The recent Forrester Research, Inc. report, “Use Actionable Threat Intelligence to Protect Your Digital Business,” describes the characteristics of effective threat intelligence and what to look for in a threat intelligence vendor (August 2014).

Download this now


The Impact of Mobile devices on Information Security
By Check Point Software Technologies | 14/12/2014

The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.

Download this now


Gartner Magic Quadrant for Mobile Data Protection (MDP)
By Check Point Software Technologies | 14/12/2014

Gartner has positioned Check Point as a Leader in the Mobile Data Protection (MDP) Magic Quadrant for the eighth consecutive year.1 Gartner evaluates each company’s MDP offerings on a scale of completeness of vision and ability execute.

Read the full report to see which vendors made it to the Magic Quadrant, compare their strengths and cautions, and see what Gartner says about Check Point.

Download this now


Miercom Advanced Threat Prevention with Sandbox Analysis Testing Report
By Check Point Software Technologies | 14/12/2014

Protecting against known, and new, advanced, unknown threats requires the most rapid and precise detection and protection technologies. With multiple solutions available, finding the best one can be challenging. Independent testing firm Miercom took on this challenge and tested network-based advanced threat prevention solutions that use virtual sand boxing. They found the solution delivering the fastest, most accurate and efficient solution against known and unknown threats.

Download this now


Software Defined Protection - The Enterprise Security Blueprint
By Check Point Software Technologies | 11/3/2014

In a world with high-demanding IT infrastructures and networks, where perimeters are no longer well defined and where threats grow more intelligent every day, we need to define the right way to protect enterprises in the ever-changing threat landscape. Download today to define your security blueprint.

Download this now


What is Threat Emulation Technology
By Check Point Software Technologies | 14/11/2013

Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.

Download this now


Guide to the TCO of Encryption
By Check Point Software Technologies | 5/9/2013

While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!

Download this now


Handheld Wireless Security
By Check Point Software Technologies | 5/9/2013

Smartphones are rapidly becoming an indispensable communication and computing tool for the world’s expanding mobile workforce. As Smartphones and other handheld wireless communication devices become an integral part of the modern business landscape, the advances in flexibility, power, and mobile access come with a risk. Find out how to stay competitive in a changing business world and leverage technology to meet future needs.

Download this now


Federal Guide to the Value of Encryption
By Check Point Software Technologies | 5/9/2013

Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Find out which encryption solutions are best to automatically obscure digital files and make them unreadable by unauthorized users. Click to download

Download this now