PARTNER NEWSFEED

Discover our partner news

Stay up to date with what we have been doing with our partners, how we're working with them to help our customers and what our partner experts are saying.

Filter:

  • Adobe
  • AMD
  • Apple
  • AppSense
  • Aruba
  • ASUS
  • Belkin
  • Brother
  • Bullitt
  • CAT Phones
  • Checkpoint
  • Cisco
  • Cisco (Featured)
  • Cisco Energy Management
  • Cisco Energy Management (Featured)
  • Cisco>Cisco
  • Citrix
  • Clearswift
  • Clearswift (Featured)
  • Cloud
  • Commvault
  • COVID-19
  • Cyber
  • Dell
  • Digital Workplace
  • EMC
  • EMC (Featured)
  • EPOS
  • Epson
  • F5
  • F5 (Featured)
  • Featured-1
  • Fortinet
  • Hitachi (Featured)
  • Hitachi Data Systems
  • HP
  • HP (featured)
  • HP>HP Converged Systems (Featured)
  • HP>HP PC
  • HP>HP PC (Featured)
  • HP>HP Print
  • HP>HP Print (Featured)
  • HPE
  • HPE>HP 3Par Storage
  • HPE>HP 3Par Storage (Featured)
  • HPE>HP Converged Systems
  • Hybrid Infrastructure
  • Hypertec
  • IBM
  • IBM (Featured)
  • IBM>IBM Business Analytics
  • IBM>IBM Business Analytics (Featured)
  • IBM>IBM Emergency Response Services
  • IBM>IBM Emergency Response Services (Featured)
  • IBM>IBM Mobile Device Management
  • IBM>IBM Mobile Device Management (Featured)
  • IBM>IBM Power 8 Systems
  • IBM>IBM Power 8 Systems (Featured)
  • IBM>IBM Smarter Storage
  • IBM>IBM Smarter Storage (Featured)
  • iiyama
  • Industry
  • Infrastructure
  • Intel
  • Ivanti
  • Lenovo
  • Lenovo>Lenovo Data Centre Group (DCG)
  • Lenovo>PC
  • LG
  • Logitech
  • Microsoft
  • Microsoft (Featured)
  • Mimecast
  • Mimecast (Featured)
  • MobileIron
  • MobileIron (Featured)
  • NEC
  • NEC (Featured)
  • NetApp
  • NetApp (Featured)
  • Nutaix
  • Nutanix
  • Nuvias & Riverbed
  • Oracle
  • Oracle (Featured)
  • Oracle>Oracle Converged Infrastructure
  • Oracle>Oracle Converged Infrastructure (Featured)
  • Oracle>Oracle Systems Consolidation
  • Oracle>Oracle Systems Consolidation (Featured)
  • Palo Alto
  • Philips
  • Philips (Featured)
  • Plantronics
  • Polycom
  • Product
  • Product (Featured)
  • Qlik
  • Quest
  • Recent-Home
  • Red Hat
  • Remote working
  • RES
  • RSA
  • Samsung
  • SanDisk
  • SCC News
  • Security
  • Software
  • Symantec
  • Symantec (Featured)
  • Toshiba
  • Uncategorised
  • Uncategorized
  • VCE
  • VCE (Featured)
  • Veeam
  • Veritas
  • VMware
  • VMWare (Featured)
  • ZAGG
  • Zebra
    BlackBerry and Check Point Software Announce a Global Partnership to Mitigate Cybersecurity Threats
      BlackBerry Limited and Check Point Software Technologies Ltd  announced the companies have entered a global ISV (Independent Software Vendor) partnership. The strategic agreement is the first of its kind for Check Point, and includes joint go-to-market planning and selling of Check Point’s market-leading mobile threat defense solution, SandBlast Mobile, along with BlackBerry UEM and...

    BlackBerry and Check Point Software Announce a Global Partnership to Mitigate Cybersecurity Threats

    August 2018’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat
      Check Point® Software Technologies Ltd. a leading provider of cyber-security solutions globally, has published its latest Global Threat Index for August 2018, revealing a significant increase in attacks using the Ramnit banking trojan. Ramnit has doubled its global impact over the past few months, driven by a large scale campaign that has been converting...

    August 2018’s Most Wanted Malware: Banking Trojan Attacks Turn up the Heat

    Faxploit: New Check Point Research Reveals How Criminals Can Target Company & Private Fax Machines to Take Over Networks and Spread Malware
    New research from Check Point Software Technologies Ltd, a leading provider of cyber-security solutions globally, has shown how organizations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions of fax devices globally. A fax number is all an attacker needs to exploit...

    Faxploit: New Check Point Research Reveals How Criminals Can Target Company & Private Fax Machines to Take Over Networks and Spread Malware

    Check Point Announces SandBlast Mobile 3.0, the First to Provide Threat Prevention Technology to Enterprise Mobile Devices
    Check Point Software Technologies Ltd a leading provider of cybersecurity solutions globally, announced new capabilities for its industry-leading mobile threat defence solution, SandBlast Mobile. SandBlast Mobile 3.0 becomes the only solution in the category to offer threat prevention technology for the enterprise, allowing employees to safely conduct business using their mobile devices. The new SandblastMobile 3.0...

    Check Point Announces SandBlast Mobile 3.0, the First to Provide Threat Prevention Technology to Enterprise Mobile Devices

    Step Up to Gen V Cyber Security
    Introduction into Gen V Cyber Security and Check Point Infinity 2017 was a global wake-up call to get serious about addressing the cyber threat landscape. Unprecedented levels of cyber attacks played out as large-scale, multi-vector mega-attacks that inflicted major damage on business and reputation. As a result, we find ourselves in the midst of the...

    Step Up to Gen V Cyber Security

    Check Point Security Credentials Validated with Cyber Essentials Plus Awards
    Check Point is proud to announce that we have received two ‘Cyber Essentials Plus’ awards under the British Government’s Cyber Essentials Accreditation Scheme. The British Ambassador to Israel, David Quarrey, officially presented the accreditations as part of the UK Government’s Cyber Essentials Scheme. Launched in 2014, the Cyber Essentials Scheme serves as part of the...

    Check Point Security Credentials Validated with Cyber Essentials Plus Awards

    What Lies Ahead? Check Point Cyber-Security Predictions for 2018.
    Arnold H. Glasow famously quipped that “the trouble with the future is that it usually arrives before we’re ready for it.”  The past year certainly took us by surprise when the WannaCry and Petya ransomware outbreaks hit businesses globally, causing unprecedented disruption, while serious new vulnerabilities such as BlueBorne were discovered in almost every connected...

    What Lies Ahead? Check Point Cyber-Security Predictions for 2018.

    KRACK Attack: How Secure is Your Wi-fi Connection?
    A cyber security researcher of KU Leuven in Belgium, Mathy Vanhoef, has revealed a flaw in Wi-Fi’s WPA2’s cryptographic protocols. The discovery is alarming as the WPA2 protocol, the most common and secure Wi-Fi access protocol since 2004, is trusted by all for keeping Wi-Fi connections safe. The attack, known as a ‘KRACK Attack’ (Key...

    KRACK Attack: How Secure is Your Wi-fi Connection?

    Check Point vSEC for Azure Stack seamlessly secures the hybrid-cloud
    Using the hybrid cloud is much like streaming a movie on a home theatre system. Pulling the film from the cloud to your big screen TV, the home theatre experience marries the benefits of the public cloud with the comfort of not having to leave the house and overpay for popcorn. The hybrid cloud, with...

    Check Point vSEC for Azure Stack seamlessly secures the hybrid-cloud

    ‘Get rich or die trying’ – Check Point Researchers Uncover International Cyber Attack Campaign
    A Nigerian national based near the country’s capital masterminded a wave of attacks on over 4,000 companies in oil & gas, mining, construction and transportation sectors. San Carlos, CA  —  Tue, 15 Aug 2017 Check Point® Software Technologies Ltd. (NASDAQ: CHKP) has today revealed the identity of the criminal behind a series of what appeared...

    ‘Get rich or die trying’ – Check Point Researchers Uncover International Cyber Attack Campaign

    June’s Most Wanted Malware: RoughTed Malvertising Campaign Impacts 28% of Organisations
    Check Point’s latest Global Threat Impact Index revealed that 28% of organisations globally were affected by the Roughted malvertising campaign during June. A large-scale malvertising campaign, RoughTed is used to deliver links to malicious websites and payloads such as scams, adware, exploit kits and ransomware. It began to spike in late May before continuing to...

    June’s Most Wanted Malware: RoughTed Malvertising Campaign Impacts 28% of Organisations

    Microsoft Beefs Up Enterprise Mobility With Check Point Tie Up
    Is your mobile enterprise protected effectively? Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading mobile threat defence (MTD) solution, with Microsoft’s Intune enterprise mobility management (EMM) platform, provides businesses with a comprehensive approach...

    Microsoft Beefs Up Enterprise Mobility With Check Point Tie Up

    CONTACT US
    Scroll to Top