Latest news with #VasilyDyagilev


TECHx
01-05-2025
- Business
- TECHx
Check Point Joins GISEC Global 2025 with Key Partners
Home » Emerging technologies » Cyber Security » Check Point Joins GISEC Global 2025 with Key Partners Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a global cybersecurity provider, has confirmed its participation at GISEC Global 2025 in Dubai. The company will exhibit in Hall 6, Booth C113 alongside its partners: AWS, WIZ, Radware, and TechBridge Distribution MEA. At the event, Check Point will showcase its latest advancements in AI-powered threat prevention, designed for today's hybrid IT environments. Its solutions aim to help organizations reduce risk, speed up response times, and strengthen compliance with regional regulations. Check Point's growing presence in the UAE reflects a broader regional strategy. The company is working to support national cyber resilience, develop local partnerships, and deliver cybersecurity solutions tailored to the needs of UAE businesses. According to its latest threat intelligence report, organizations in the UAE have been targeted 1,743 times per week on average over the past six months. These numbers highlight the rise in both frequency and complexity of cyberattacks in the region. In response, Check Point is expanding its investment across the Middle East. This includes: Increasing support teams Enhancing local threat research Strengthening collaboration with technology partners Supporting MSSPs (Managed Security Service Providers) Check Point will also lead several speaking sessions during GISEC Global 2025. Company executives will be joined by representatives from AWS, WIZ, and Radware to discuss emerging cybersecurity challenges. Key topics will include multi-cloud security, AI-driven automation, and real-time threat intelligence. Confirmed speakers include: Vasily Dyagilev , Regional Director, Middle East and RCIS , Regional Director, Middle East and RCIS Ram Narayanan , Country Manager, Middle East , Country Manager, Middle East Prashant Menon, Channel Leader, UAE Through these sessions, the company aims to foster discussion around integrated security solutions that meet the needs of modern enterprises. Beyond technology, Check Point is also investing in local talent development. Its SecureAcademy program is training the next generation of cybersecurity professionals in the region. The company is also working to support innovation through regional technology alliances. 'The UAE is a hub for digital innovation, which makes it a target for cyberattacks,' said Ram Narayanan, Country Manager at Check Point. 'We're focused on building trust, supporting the ecosystem, and helping organizations move from reactive defence to proactive resilience.' Check Point invites attendees to experience its full suite of cybersecurity solutions at GISEC Global 2025, taking place in Dubai. Visitors can meet the team and partners at Booth C113 in Hall 6 to learn more about defending against evolving cyber threats.


Channel Post MEA
30-04-2025
- Business
- Channel Post MEA
Check Point Announces Participation At GISEC 2025
Check Point Software Technologies has announced its participation at GISEC Global 2025. Check Point will be present in Hall 6, Booth C113 along with its partners, where it will showcase its latest advancements in threat prevention and AI-powered security. The company's growing presence in the UAE reflects a broader strategy to support national cyber resilience, drive local partnerships and deliver tailored solutions to meet the evolving needs of businesses across the country. At GISEC 2025, Check Point Software, in collaboration with its partners AWS, WIZ, Radware and TechBridge Distribution MEA, will engage with public and private sector leaders to address emerging risks with intelligent, automated cyber security solutions designed for complex hybrid environments. Through this collaboration, the company is enabling faster response times, stronger security postures and better alignment with local compliance mandates. According to Check Point Software's latest threat intelligence report, organizations in the United Arab Emirates have been targeted 1,743 times per week on average over the last six months, highlighting the intensity and sophistication of the region's cyber threat landscape. As a response, Check Point Software is doubling down on its regional investments by expanding support teams, advancing regional threat research, fostering ecosystem collaboration and delivering tailored solutions to address the unique needs of local organizations. 'The UAE stands at the forefront of digital innovation and that also makes it a prime target for advanced cyberattacks,' said Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East. 'Our commitment is not just technological. 'Our commitment goes beyond technology. It's about building trust, strengthening local partnerships and empowering organizations to shift from reactive defence to proactive cyber resilience.' Speaking Engagements and Industry Collaboration Check Point Software's leadership team, including Vasily Dyagilev, Regional Director for the Middle East and RCIS; Ram Narayanan, Country Manager for the Middle East; and Prashant Menon, Channel Leader for the UAE, along with representatives from AWS, Radware, and WIZ, will lead multiple speaking sessions, exploring topics such as AI-driven security automation, multi-cloud resilience, and threat intelligence. These joint discussions aim to shed light on current cybersecurity challenges and showcase integrated solutions. Check Point Software's growing role in the UAE includes efforts to build cyber security talent through its SecureAcademy program, enhance support for managed security service providers (MSSPs) and foster innovation with local technology alliances. These investments reflect the company's continued leadership in the region and its vision for enabling secure digital transformation. 0 0


Zawya
30-04-2025
- Business
- Zawya
Check Point Software elevates cyber resilience in the UAE with strategic partnerships and AI-powered security at GISEC 2025
DUBAI, UAE – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader in cyber security solutions, has announced its participation at GISEC Global 2025. Check Point will be present in Hall 6, Booth C113 along with its partners, where it will showcase its latest advancements in threat prevention and AI-powered security. The company's growing presence in the UAE reflects a broader strategy to support national cyber resilience, drive local partnerships and deliver tailored solutions to meet the evolving needs of businesses across the country. At GISEC 2025, Check Point Software, in collaboration with its partners AWS, WIZ, Radware and TechBridge Distribution MEA, will engage with public and private sector leaders to address emerging risks with intelligent, automated cyber security solutions designed for complex hybrid environments. Through this collaboration, the company is enabling faster response times, stronger security postures and better alignment with local compliance mandates. According to Check Point Software's latest threat intelligence report, organizations in the United Arab Emirates have been targeted 1,743 times per week on average over the last six months, highlighting the intensity and sophistication of the region's cyber threat landscape. As a response, Check Point Software is doubling down on its regional investments by expanding support teams, advancing regional threat research, fostering ecosystem collaboration and delivering tailored solutions to address the unique needs of local organizations. 'The UAE stands at the forefront of digital innovation and that also makes it a prime target for advanced cyberattacks,' said Ram Narayanan, Country Manager at Check Point Software Technologies, Middle East. 'Our commitment is not just technological. 'Our commitment goes beyond technology. It's about building trust, strengthening local partnerships and empowering organizations to shift from reactive defence to proactive cyber resilience.' Speaking Engagements and Industry Collaboration Check Point Software's leadership team, including Vasily Dyagilev, Regional Director for the Middle East and RCIS; Ram Narayanan, Country Manager for the Middle East; and Prashant Menon, Channel Leader for the UAE, along with representatives from AWS, Radware, and WIZ, will lead multiple speaking sessions, exploring topics such as AI-driven security automation, multi-cloud resilience, and threat intelligence. These joint discussions aim to shed light on current cybersecurity challenges and showcase integrated solutions. Check Point Software's growing role in the UAE includes efforts to build cyber security talent through its SecureAcademy program, enhance support for managed security service providers (MSSPs) and foster innovation with local technology alliances. These investments reflect the company's continued leadership in the region and its vision for enabling secure digital transformation. Follow Check Point via: LinkedIn: X: Facebook: Blog: YouTube: About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. ( is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services. Legal Notice Regarding Forward-Looking Statements This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point's industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law. MEDIA CONTACT: Zayyen 10 Communications LLC zayyen@


Mid East Info
19-02-2025
- Health
- Mid East Info
Check Point Software: PRotecting Hospitals from IoT Threats
By: Vasily Dyagilev, Regional Director, Middle East, RCIS at Check Point Software Technologies Ltd. In today's healthcare landscape, the integration of Internet of Medical Things (IoMT) devices has revolutionized patient care. However, this technological advancement also introduces significant cyber security risks. One such threat has been highlighted by the US Cybersecurity and Infrastructure Security Agency (CISA), which warns that Contec CMS8000 devices, widely used for patient monitoring, contain a backdoor that sends patient data to a remote IP address and could download and execute files on the device. Technical details aside, human safety is always paramount. Addressing this type of vulnerability ensures that clinicians make care decisions on accurate data, thereby ensuring patients get proper care. As noted by CISA, '…a malfunctioning monitor could lead to improper responses to vital signs displayed by the device'. This article explores how Check Point's IoT Protect solution can help hospitals defend against such threats, leveraging insights from the 2025 Check Point State of Cyber Security Report and addressing the broader issue of IoMT security. The Threat: Contec CMS8000 Backdoor The Contec CMS8000 patient monitoring devices have been found to include a backdoor that poses severe risks to patient data security and device integrity. This backdoor allows unauthorized access to patient data, sending it to a remote IP address, and enables the download and execution of files on the device. Such vulnerabilities can lead to data breaches, unauthorized data manipulation, and potential disruptions in patient care. How Check Point IoT Protect Can Help Check Point's IoT Protect solution offers a comprehensive approach to securing IoT devices within healthcare environments. Here's how it can specifically address the threat posed by the Contec CMS8000 backdoor: Firmware risk assessment: IoT Protect offers Firmware Scanner that scans the device's firmware, discovering security vulnerabilities and backdoors such as suspicious domains and IP addresses listed in the program, secrets that are exposed in the device, and provide you a comprehensive analysis of potential risks from the device. Use this service to validate your supply chain before adding products to your environment. – Autonomous device discovery and risk analysis: IoT Protect autonomously identifies and maps all IoT devices connected to the network, including patient monitoring devices like the Contec CMS8000. This visibility is crucial for detecting unauthorized devices and assessing their risk profiles. – Zero Trust segmentation: By enforcing Zero Trust policies, IoT Protect prevents unauthorized access to and from IoT devices. This segmentation ensures that even if a device is compromised, the threat cannot spread laterally across the network. – Real-time threat intelligence and virtual patching: IoT Protect leverages real-time threat intelligence to block known and zero-day attacks. The solution's virtual patching capabilities shield devices from known vulnerabilities without the need for physical updates, which is essential for devices like the Contec CMS8000 that may have embedded backdoors. – IoT Protect nano agent for manufacturers: Check Point offers manufacturers to embed nano agent inside their devices, with active device-level protection against the most sophisticated cyber attacks. Nano agent helps to comply with FDA requirements for connected medical devices. Healthcare Threat Landscape: Insights from the 2025 Check Point State of Cyber Security Report The 2025 Check Point State of Cyber Security Report highlights the increasing cyber threats faced by the healthcare sector. In 2024, healthcare became the second most targeted industry, with a 47% increase in attacks year-over-year. The report underscores the need for robust cyber security measures to protect sensitive patient data and ensure the integrity of medical devices. Key findings from the report include: – Ransomware Evolution: Data exfiltration and extortion have overtaken encryption-based attacks as the primary ransomware tactics, simplifying operations and maximizing payouts. – Supply Chain: Technology supply chain attacks have increased significantly. Hardware & semiconductors increased by 179% and software by 109%, raising the risk that IoMT devices could have vulnerabilities introduced by their supply chain. The Broader Issue of IoMT Security The Internet of Medical Things (IoMT) encompasses a wide range of connected medical devices that improve patient care but also introduce significant cybersecurity challenges. As highlighted in the Check Point blog, IoMT devices often lack built-in security features, making them vulnerable to cyber attacks. Ensuring the security of these devices is critical, as breaches can lead to data theft, compromised patient safety, and operational disruptions. To address these challenges, healthcare organizations must adopt a multi-layered security approach that includes: – Comprehensive device visibility: Continuously monitoring and mapping all connected devices to identify potential vulnerabilities. – Zero Trust security models: Implementing strict access controls to prevent unauthorized access and lateral movement within the network. – Proactive threat intelligence: Leveraging real-time threat intelligence to stay ahead of emerging threats and apply virtual patches as needed. Conclusion The integration of IoMT devices in healthcare offers numerous benefits but also introduces significant cyber security risks. The Contec CMS8000 backdoor threat exemplifies the vulnerabilities that can compromise patient data and device integrity. Check Point's IoT Protect solution provides a robust defense against such threats, ensuring the security and reliability of healthcare IoT devices. By adopting comprehensive cybersecurity measures, healthcare organizations can protect patient data, maintain operational integrity, and deliver safe, high-quality care. For more information on how Check Point Quantum IoT Protect can secure your healthcare facility, contact Check Point for a demo today. References Contec CMS8000 Contains a Backdoor – CISA IoT Security for Networks and Devices – Check Point Software IoT Security Solutions – Check Point Software The State of Cyber Security Report, 2025 IoT – The key to connected care excellence


Mid East Info
27-01-2025
- Business
- Mid East Info
6 Cyber Security Challenges Emerge from World Economic Forum, Check Point Research on 2025 Threats - Middle East Business News and Information
6 Cyber Security Challenges Emerge from World Economic Forum, Check Point Research on 2025 Threats – Vasily Dyagilev, Regional Director, Middle East, RCIS at Check Point Software Technologies As we step into 2025, the cyber security landscape continues to be as complex as ever for security leaders looking to protect their organizations from increasingly injurious cyber threats. The World Economic Forum (WEF) detailed some of the most challenging threats in its Global Cyber security Outlook 2025, with some critical areas of concern mirroring those in our own State of Cyber security Report 2025. Both reports emphasize the growing sophistication of cyber threats, the integration of emerging technologies to make cyber threats harder to detect and deter, and the outsized influence of global geopolitical factors influencing cyber security threats. Following are six trends and areas of emphasis that both the WEF and Check Point Research see as critical challenges for cyber security leaders in 2025 and beyond. 1. Geopolitical Tensions and Cyber security Strategy According to WEF research, nearly 60% of organizations report that geopolitical tensions have directly influenced their cyber security planning. The increasing use of AI in cyber warfare, particularly for disinformation campaigns, is creating new challenges. Check Point Research reported that nation-state actors are employing AI tools to amplify fake news, create deepfakes, and manipulate public opinion. As these technologies become more advanced and widely used, the ability to manipulate media, elections, and public sentiment is growing, making it harder to differentiate between truth and fictitious content. State-affiliated hacktivism is also becoming a more serious issue. Cyber attacks are increasingly being used as a tool to further geopolitical agendas, leading our researchers to concluded more sophisticated and sustained cyber conflicts with long-term impacts may soon become the norm. 2. Supply Chain Vulnerabilities and Ecosystem Risks Both our report and WEF researchers highlight supply chain vulnerabilities as one of the top cyber security risks for organizations. The increasing complexity and interdependencies of global supply chains, alongside a lack of visibility into the security practices of third-party vendors, has made supply chain attacks a critical hot spot for cyber criminals. Fifty-four percent of large organizations identified supply chain risks as a major barrier to cyber resilience, according to the WEF report. This is further compounded by a marked shift in ransomware tactics with cyber criminals now stealing sensitive data (data exfiltration) and threatening to release it, further ratcheting up pressure on businesses. The healthcare, financial services, and education sectors will be most impacted by these threat strategies 3. AI-Driven Threats and Vulnerabilities AI is transforming the cyber security landscape in both positive and negative ways. While AI offers significant potential for improving security systems, its adoption is also introducing new vulnerabilities that are only just starting to emerge onto the scene. The WEF reports that 66% of organizations expect AI to have the greatest impact on cyber security in 2025, yet only 37% have processes in place to assess the security of AI tools before deployment – a large risk for these organizations. Generative AI, in particular, is enhancing cyber criminal capabilities, enabling more sophisticated social engineering attacks and an increase in phishing attempts. Our research looks at AI in terms of its use in amplifying cyber warfare, particularly in disinformation campaigns and data manipulation. As AI continues to evolve, it will be critical for cyber security strategies to address both the defensive and offensive capabilities of this technology. 4. Edge Device Vulnerabilities Security professionals know that the cloud edge presents an area of unique vulnerability for bad actors. And in 2025 both WEF and Check Point Research note edge devices, including IoT devices and remote work hardware, as an area of increased intrusion and exploit. Our research predicts a rise in zero-day vulnerabilities in edge devices, which can be less secure and harder to monitor than network-connected or cloud-based endpoints. 5. Rising Compliance Challenges and Regulatory Fragmentation With the proliferation of cyber regulations worldwide, compliance has become a top concern for cyber leaders – and a major burden. WEF research notes that fragmented regulations across jurisdictions have become a significant challenge, with 76% of Chief Information Security Officers (CISOs) reporting difficulty maintaining compliance. While regulations are important for improving cyber security posture and building trust, their lack of harmonization creates significant complexity for organizations operating across multiple regions, especially for organizations with a deep security stack. While our research didn't touch upon compliance as a major challenge in and of itself, we did note that the growing complexity of managing hybrid cloud environments, and the risks of misconfigured cloud settings can expose sensitive data – a huge back door for skilled attackers. 6. Cyber Skills Gap and Workforce Challenges A major theme in both reports is the widening cyber security skills gap. WEC research found that two-thirds of organizations report moderate-to-critical skills gaps, making it difficult to meet security demands. Additionally, 49% of public-sector organizations indicated a shortage of necessary cyber security talent, a figure that has increased by 33% from 2024. This shortage is now being compounded by the rapid adoption of new technologies (including AI) which require specialized skills to properly assess and implement secure systems. Our own research acknowledged this critical skills gap – adding another layer to the message that a prevention-first approach to stopping threats from entering the network would go far in alleviating this harrowing situation for the industry. Fewer SOC false positives and fewer threats that bypass an organization's cyber stack mean fewer security professionals to respond to alerts and threats. Both reports make it clear that cyber security in 2025 is becoming increasingly complex, driven by geopolitical tensions, AI advancements, supply chain vulnerabilities, and a growing threat from cyber criminals. As organizations face more sophisticated and targeted attacks, from ransomware and AI-driven cyber warfare to info-stealers and edge device vulnerabilities, a proactive and prevention-first approach is essential. Investing in emerging technologies, securing the workforce, and staying ahead of regulatory changes will be critical to ensuring resilience in the face of these challenges. By understanding and responding to these key cyber security trends, organizations can better prepare for the risks that lie ahead, safeguarding their operations, data, and reputation from the next wave of cyber threats.