Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Company Directory
Check Point
Unit 4 Lindenwood, Crockford Lane,
Chineham Business Park, Chineham
Basingstoke, Hampshire
RG24 8QY
[t] +44 1256 374560
[f] +44 1256 708565
Single point of control for security management
04 March, 2016
The R80 security platform from Check Point provides corporate IT security managers with single point security management
Zero day endpoint protection
12 February, 2016
SandBlast Agent from Check Point brings advanced zero day protection directly to endpoint devices regardless of their mobility
TV streaming stick leaves home networks vulnerable
12 January, 2016
Check Point uncovers vulnerability that allows hackers to infiltrate home network through a TV streaming stick
Top Malware families for October
01 December, 2015
Conficker at the top of the list by Check Point of the most frequently seen malware families being used in attacks on businesses
Holistic threat protection for Wolverhampton College
19 November, 2015
Midlands education centre protects its network with holistic security system incorporating firewall, application controls and anti malware software
Mobile threat protection for iOS and Android
10 August, 2015
Users of Android and Apple mobile devices now have access to mobile security software for threat detection and resolution
Security appliance for industrial control systems
27 May, 2015
Check Point is now providing SCADA security with its new 1200R appliance that provides protection to industrial control systems from cyber attacks
Vulnerability discovery in e-commerce platform
22 April, 2015
Check Point discovers vulnerability affecting a popular web e-commerce platform used by online auction site
Proactive document threat detection
11 March, 2015
Check Point Threat Extraction takes a new approach to eliminating the threats posed by infected documents
Pre-infection threat detection acquisition
19 February, 2015
Check Point goes to the next step of threat detection with the acquisition of a company which provides CPU-level malware prevention technology
Sandbox analysis report acclaims advanced threat prevention product
24 November, 2014
Miercom tests Next Generation Threat protection and cloud based threat emulation service from Check Point with positive results
Wordpress fixes plug-in vulnerability
05 November, 2014
A vulnerability in the LiveSupporti WordPress plug-in has been fixed after Check Point raises the issue with the CMS supplier
Seamless business data security on mobile devices
30 October, 2014
Check Point has developed the Capsule product for use on mobile devices to ensure commercial data security in BYOD programmes
WebUI vulnerabilities expose system admin portals
22 October, 2014
Security experts at Check Point have discovered WebUI vulnerabilities in System Admin Portals enabling administrator credential theft
Future Android attacks could exploit the Binder
20 October, 2014
Messaging passing mechanism in Android smartphone devices exposed as a potential vulnerability in next generation attacks
Shellshock protection for Check Point Software
29 September, 2014
Users of Check Point Software products gain protection against Shellshock vulnerability after company issues IPS protection
Flawless detection rate in unknown attack testing
18 September, 2014
Benchmark testing using unknown malicious files gives Check Point Threat Prevention highest mark in protection against internet attacks
Gateways available for data centre security
28 July, 2014
Two appliances have been released by Check Point aimed at high end data centres to provide a secure gateway
Malware attack strikes energy companies
02 July, 2014
Check Point comments on the vulnerability of infrastructure objects after malware strikes energy companies across Europe and the USA
Poor threat intelligence leads to growth in successful attacks
23 June, 2014
Check Point reveals the growth in successful malware attacks resulting from increasing software sophistication and lack of threat intelligence
Threat intelligence platform for preventing attacks
23 May, 2014
The ThreatCloud IntelliStore from Check Point gathers threat intelligence from multiple sources to provide enhanced threat protection
Cyber threat visibility management system
24 April, 2014
Check Point releases new security management and monitoring appliances for improved threat visibility in big data environments
Undiscovered threat protection in latest anti-malware release
04 April, 2014
ZoneAlarm gains an upgrade for 2015 with a redesign aimed at fighting web-based malware and protecting from undiscovered threats
High performance block rates for zero day malware
20 March, 2014
Benchmarking tests have shown the efficiency of sandboxing technology from Check Point in protecting users from new malware and targeted attacks
New architecture enables immediate protection from latest threats
27 February, 2014
Check Point has further reduced the time for converting threat intelligence into immediate protection with the development of its software defined protection architecture
Wiki site vulnerability discovered
31 January, 2014
Remote code execution discovery on Wiki platform patched on basis of recommendation by Check Point to prevent malware code injection
Security gateway module for data centres
23 January, 2014
High performance protection available with the latest blade module from Check Point for high speed networks and data centres
Small organizations just as vulnerable as corporates
06 September, 2013
Check Point discusses the significance of company size relating to the need for strong IT security and concludes that smaller companies are just as vulnerable
UK businesses concerned over security complexity
30 July, 2013
A survey by Check Point reveals the concerns held by UK businesses over the increasing complexity of security
Mobile security report shows high incident rate
05 June, 2013
Check Point's mobile security incident report reveals extent of BYOD vulnerability through poor management of corporate information on employee owned devices
New malware variant drives phishing attacks
16 May, 2013
Threat emulation technology from Check Point has identified a malware variant responsible for phishing e-mail attacks
LivingSocial hack results in continued risks
29 April, 2013
Check Point is warning of extended risk to LivingSocial users who should beware of unsolicited e-mails
Phishing alert follows Evernote hacking
05 March, 2013
Check Point is advising caution to recipients of potential phishing e-mails which may appear to come from the recently compromised Evernote service
High speed firewall and IPS for data centres
21 February, 2013
Check Point releases a new 2U appliance for data centres operating at 25Gbps for network intruder protection
Star Wars analogy illustrates the IT security jungle
08 November, 2012
Check Point looks into the lessons provided by the Star Wars fantasy in user authentication and Data Loss Prevention for IT security
Swedish Organisations Hit By Hacktivist DDoS Attack
08 October, 2012
Check Point comments on the recent DDoS attacks that affected several government and business organisations in Sweden
Check Point Survey Examines Greatest IT Security Challenges in UK industry
06 September, 2012
Preventing external cyber attacks and accidental data loss through employees account for over 50% of the challenge facing UK IT Security professionals
Free Antivirus and Firewall From ZoneAlarm
03 May, 2012
Check Point is now producing its combined firewall and antivirus package available as a free download
Using QR Codes For Malicious Purposes
31 January, 2012
Check Point provides some background on emerging Quick Response codes and how they can be used to exploit browser curiosity and lead them to exploit sites
Security Incidents Involving Mobile Devices Increasing
19 January, 2012
Check Point report confirms increased concern about the use of mobile devices on corporate networks with a rise in the number of security incidents related to them
Data Loss Prevention Across Distributed Network
11 January, 2012
Check Point is providing data loss protection to internation law company using R75 Software Blades
People Factor Forms Essential Part Of Next Generation Security Policies
09 January, 2012
Check Point details the human factor in planning for a successful corporate security policy for the future
Check Point Software Blades Useable On Amazon Web Services
05 January, 2012
Virtual security software appliances now available to users of Amazon Web Services cloud protection
Providing Corporate IT Users With More Security Responsibility
20 July, 2011
Terry Greer-King of Check Point examines the security problem resulting from the consumerisation of IT in the workplace and suggests placing more responsibility on the user of such devices
Learning From The Year's Most Significant Security Breaches
24 June, 2011
Check Point analyses the year so far with a trend for more sophisticated and targeted attacks and what companies and organisations can learn from them
Unencrypted Laptop Disappears From NHS
16 June, 2011
Check Point comments on the essential requirement for strong encryption on mobile computers following the large scale loss of patient records from an unprotected NHS laptop computer
Support Centre Site From Check Point Picks Up Award
01 June, 2011
Best Web Support Site Award for 2011 has been awarded to Check Point Software for the company's support centre
Swiss Bank Takes Data Loss Prevention Solution From Check Point
17 March, 2011
DLP Solution From Check Point provides Bank Leumi with protection from data loss incidents as the bank improves safeguards of customer data
Securing Personal Laptops For Business Use
07 March, 2011
With the increasing trend of companies providing a stipend to employees to buy their own laptops for both business and personal use, Nick Lowe of Check Point examines the security implications of this cost-saving measure
Software Blad Based Network Security Suite
09 February, 2011
Check Point releases R75 bringing 3D security vision to network environments making use of the company's Software Blade Architecture
First | Prev  | 1 | 2 | 3  | Next  | Last