Latest news with #CheckPointSoftwareTechnologies
Yahoo
2 days ago
- Business
- Yahoo
Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point's 2025 Cloud Security Report
Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience. As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can't keep up. According to the report, 65% of organizations experienced a cloud-related security incident in the past year—up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments. 'Security teams are chasing an ever-moving target,' said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. 'As cloud environments grow more complex and AI-driven threats evolve, organizations can't afford to be stuck with fragmented tools and legacy approaches. It's time to shift toward unified, intelligent, and automated defenses designed for the realities of today's decentralized world.' Key findings from the 2025 Cloud Security Report include: Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can't keep up with these distributed infrastructures Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts Application Security Lags Behind: 61% still rely on outdated, signature-based Web Application Firewalls (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats AI is a Priority — but Defenders Aren't Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging Check Point CloudGuard and the Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider. Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, 'cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.' To access the full report and receive actionable CISO advice for safeguarding against the cloud-related issues discussed, please visit our website and read our blog. About the Survey: The 2025 Cloud Security Report, carried out by Cybersecurity Insiders in the beginning of 2025, gathered insights from 937 cyber security professionals across North America, Europe, Asia-Pacific, and other regions. Respondents included CISOs, cloud architects, security analysts, and IT leaders responsible for securing hybrid, multi-cloud, and SaaS environments. The study focused on how businesses using cloud services tackle security issues and highlight advancements, like artificial intelligence, emphasizing the complexity of modern cloud security. Follow Check Point via:LinkedIn: YouTube: About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. ( is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point's prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers. This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point's industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law. MEDIA CONTACT: INVESTOR CONTACT: Ana Perez Kip E. Meintzer Check Point Software Technologies Check Point Software Technologies press@ ir@ while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data


Time of India
3 days ago
- Business
- Time of India
Check Point launches India-based Harmony SASE instance to boost cybersecurity and compliance for enterprises
Check Point Software Technologies has launched an India-based data residency instance for its Harmony Secure Access Service Edge (SASE) platform. The initiative aims to provide cloud-delivered network security that aligns with India's regulatory requirements while offering scalable, compliant security solutions. Harmony SASE is a unified cloud security platform combining firewall-as-a-service (FWaaS), secure web gateway, zero-trust network access (ZTNA), SaaS protection, and SD-WAN. The platform, powered by Check Point's ThreatCloud, boasts a 99% threat detection rate and AI-driven security capabilities to proactively block malware, phishing, and anomalous behaviour. The hybrid security architecture, integrating on-device and cloud-based protections, promises 10x faster secure access, high-performance connectivity, and deep visibility into SaaS applications. Check Point has deployed localized infrastructure in Bangalore, Chennai, Mumbai, and New Delhi, ensuring low-latency access and adherence to India's data protection laws. The launch aligns with the Digital Personal Data Protection Act (DPDPA) and regulatory mandates from RBI, IRDAI, and TRAI, offering compliance-ready security architecture. "India is at the forefront of global digital transformation—and as the threat landscape grows more complex, security can no longer be an afterthought," said Sundar Balasubramanian, managing director, Check Point Software Technologies, India & South Asia. Cybersecurity threats in India have surged, with organizations facing over 3,200 attacks per week, surpassing the global average, according to Check Point's Threat Intelligence Report. Harmony SASE is tailored to mitigate these risks, providing enhanced security for BFSI, telecom, healthcare, and government sectors.


Techday NZ
28-05-2025
- Business
- Techday NZ
Check Point to acquire Veriti, boosting threat management suite
Check Point Software Technologies has entered into a definitive agreement to acquire Veriti Cybersecurity, expanding its offering in threat exposure and risk management. The acquisition aims to strengthen Check Point's Infinity Platform with Veriti's automated, multi-vendor platform for pre-emptive threat exposure and mitigation. Veriti is recognised for introducing pre-emptive exposure management that delivers automated remediation of threat exposure risks across more than 70 security vendors, without disrupting ongoing operations. Nadav Zafrir, Chief Executive Officer at Check Point Software Technologies, said, "The acquisition of Veriti marks a significant step toward realising our hybrid mesh security vision. It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape." The announcement addresses the growing challenge of AI-enabled cyber attacks and the complexities brought about by hyperconnected IT environments in modern enterprises. As organisations distribute their assets across clouds, datacentres, and endpoints, the risk of cyber attacks grows due to an expanded attack surface. Traditional reactive security methods are considered inadequate to address these increased risks effectively. Veriti's platform continuously identifies, prioritises, and remediates risk in multi-vendor security environments through automated patching and collaborative threat intelligence. The company, founded in 2021, has pioneered the Preemptive Exposure Management (PEM) category by actively discovering and mitigating risks that can be hidden in gaps between disparate security tools. The technology continuously monitors logs, threat indicators, and vulnerabilities present in an organisation's environment, and then coordinates protections in real time. Its integrations cover more than 70 security vendors, enabling security teams to detect and prevent attacks promptly without business disruption. Veriti's core capabilities to be integrated into the Check Point Infinity Platform include automated, cross-vendor virtual patching, which instantly applies non-disruptive protections based on vulnerabilities identified by security platforms such as CrowdStrike, Tenable, and Rapid7. This approach can reduce patching time from several weeks to a matter of minutes. The platform also enables real-time threat intelligence enforcement by verifying threat indicators from any connected tool, and orchestrating automated protection across firewalls, endpoints, web application firewalls, and cloud platforms. This coordination is designed to improve response times and effectiveness in multi-vendor security scenarios. An additional aspect of Veriti's offering is its seamless integration with existing environments through an API-based architecture, which does not require software agents or cause operational disruptions. The platform is compatible with more than 70 security vendors and supports a wide ecosystem. Veriti also extends its synergy with Wiz by ingesting Wiz's cloud exposure insights, such as information on unpatched servers or applications, and enables safe, automated virtual patching via Check Point or other vendors' network gateways. The platform's context-aware remediation analyses an organisation's exposures, configurations, and existing protections to apply appropriate controls in a manner that does not impair operations. Adi Ikan, Chief Executive Officer and co-founder of Veriti, said, "Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines." He added, "We founded Veriti to help organisations not just see risk, but remediate it safely, at scale, and most importantly - without disruption." By joining Check Point, we're accelerating that mission. Together, we'll help organisations reduce their exposure faster through the security tools they already trust." Upon completion of the transaction, Veriti's capabilities will be incorporated into Check Point's Infinity Platform as part of its Threat Exposure and Risk Management suite. Combined with Check Point's recent External Risk Management solution, Veriti enhances the company's ability to address internal and external exposures across the complete enterprise attack surface. The finalisation of the acquisition is subject to customary closing conditions and is expected by the end of the second quarter of 2025.


Channel Post MEA
28-05-2025
- Business
- Channel Post MEA
Check Point Acquires Veriti
AI-fueled attacks and hyperconnected IT environments have made threat exposure one of the most urgent cybersecurity challenges facing enterprises today. In response, Check Point Software Technologies has announced a definitive agreement to acquire Veriti Cybersecurity, the first fully automated, multi-vendor pre-emptive threat exposure and mitigation platform. 'The acquisition of Veriti marks a significant step toward realizing our hybrid mesh security vision,' said Nadav Zafrir, CEO at Check Point Software Technologies. 'It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape.' AI has brought cyber security to a tipping point, enabling the launch of attacks at scale. At the same time, enterprises are hyperconnected, with assets spread across clouds, datacenters, and endpoints, vastly expanding their attack surface. Traditional reactive security is too slow. Veriti continuously identifies, prioritizes, and remediates risk across your multi-vendor environment through automated patching and collaborative threat intelligence, all without disrupting business. Founded in 2021, Veriti pioneered the Preemptive Exposure Management (PEM) category—actively discovering and mitigating risks across siloed tools. Veriti continuously monitors logs, threat indicators, and vulnerabilities identified across the environment and propagates protections in real time. With integrations into over 70 vendors, it empowers security teams to detect, understand, and prevent attacks without delay. Core capabilities Veriti brings to the Check Point Infinity Platform: Automated, cross-vendor virtual patching: Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Veriti instantly applies risk-free, non-disruptive protections across dozens of third-party tools, based on vulnerabilities identified by platforms like CrowdStrike, Tenable, and Rapid7, dramatically reducing patching time from weeks to minutes. Real-time threat intelligence enforcement: Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Veriti verifies threat indicators from any connected tool and automatically orchestrates protection across firewalls, endpoints, WAFs, and cloud platform, enabling fast, coordinated, multi-vendor threat response. Seamless integration with 70+ security vendors: Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Built with a fully API-based architecture, Veriti integrates into existing environments without agents or disruption, supporting the broadest security ecosystem in the market. Stronger synergy with Wiz: Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Veriti ingests Wiz's cloud exposure insights, such as vulnerable, unpatched cloud servers or applications, and enables automatic, safe virtual patching of those assets through Check Point gateways (and other vendors' as well), enhancing Check Point's ability to execute on its strategic partnership with Wiz. Safe, context-aware remediation: Veriti analyzes each customer's environment, including exposures, configurations, and existing protections, to apply the right controls safely, and without operational impact. 'Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines,' said Adi Ikan, CEO and co-founder of Veriti. 'We founded Veriti to help organizations not just see risk, but remediate it safely, at scale, and most importantly – without disruption. By joining Check Point, we're accelerating that mission. Together, we'll help organizations reduce their exposure faster through the security tools they already trust.' Following the closure of the transaction, Veriti's capabilities will be integrated into the Check Point Infinity Platform as part of the Threat Exposure and Risk Management offering. Combined with the recently added External Risk Management (ERM) solution, Veriti enhances Check Point's ability to deliver complete risk lifecycle coverage—proactively managing both internal and external exposures across the entire attack surface. The closing of the transaction is subject to the customary closing conditions and is expected to occur by the end of Q2 2025. 0 0


Techday NZ
28-05-2025
- Business
- Techday NZ
Check Point to acquire Veriti Cybersecurity for threat exposure
Check Point Software Technologies has reached a definitive agreement to acquire Veriti Cybersecurity, a platform focused on fully automated, pre-emptive threat exposure and mitigation across multi-vendor environments. The move comes as organisations face increasing cyberattacks, particularly driven by artificial intelligence and the growth of hyperconnected IT networks, making it more challenging to manage cyber risk and reduce the attack surface. Nadav Zafrir, Chief Executive Officer at Check Point Software Technologies, said: "The acquisition of Veriti marks a significant step toward realising our hybrid mesh security vision. It strengthens the Infinity Platform's open-garden approach, enabling seamless, multi-vendor remediation across the entire security stack. With Veriti, we're advancing preemptive, prevention-first security – an imperative in today's AI-driven threat landscape." Veriti, established in 2021, introduced the Preemptive Exposure Management (PEM) category, developing technology to actively discover and remediate risks within complex environments where security controls from multiple vendors may be deployed in parallel. The platform continuously analyses logs, threat indicators, and vulnerabilities across the IT ecosystem, providing organisations with real-time visibility. Integrating with more than 70 security vendors, Veriti enables security teams to detect and respond to threats without delay, while seeking to eliminate gaps that might arise from tools working in isolation. Veriti's main capabilities include automated, cross-vendor virtual patching, where it applies protective measures across various third-party tools based on threat data from platforms such as CrowdStrike, Tenable, and Rapid7. This process reduces time to patch from weeks to minutes, aiming to close exposure windows quickly and prevent attacks. Another feature of Veriti is its real-time threat intelligence enforcement, allowing it to verify threat indicators and coordinate the application of protections across firewalls, endpoints, web application firewalls, and cloud platforms amongst different vendors' products. In addition, Veriti is built on a fully API-based architecture, allowing integration into existing IT environments without the need for agents or operational disruption, which is designed to make the adoption process straightforward for organisations using a diverse array of security solutions. Veriti also extends support for partners by ingesting exposure data from cloud security providers such as Wiz. This allows for the automatic remediation of vulnerabilities found in cloud servers or applications, using Check Point or third-party gateways, further aligning with Check Point's strategic relationships. An important aspect of Veriti's approach is safe, context-aware remediation, seeking to apply security measures tailored to each organisation's specific environment, exposures, and existing protections in an effort to avoid operational disruption. Adi Ikan, Chief Executive Officer and co-founder of Veriti, commented: "Security teams today suffer from a lack of action: exposures aren't just detected, they're compounding, hiding in the gaps between tools, teams, and timelines. We founded Veriti to help organisations not just see risk, but remediate it safely, at scale, and most importantly - without disruption. By joining Check Point, we're accelerating that mission. Together, we'll help organisations reduce their exposure faster through the security tools they already trust." After the acquisition is completed, Veriti's technology will become part of the Check Point Infinity Platform under the Threat Exposure and Risk Management portfolio. It will work alongside Check Point's recently introduced External Risk Management (ERM) solution to manage both external and internal risk across the entire attack surface. The completion of the transaction remains subject to customary closing conditions and is expected by the end of the second quarter of 2025.