Westcon-Comstor has signed a worldwide distribution agreement with Check Point Software Technologies, a provider of cybersecurity solutions globally, to unlock new growth opportunities for partners seeking to capitalise on rising Managed Security Service Provider (MSSP) demand. The agreement sees Westcon-Comstor become the first company to put pen to paper on …
Read More »Check Point Software Technologies appoints Sherif Seddik as president of EMEA sales
Check Point Software Technologies has appointed Sherif Seddik as president of EMEA Sales. In his role, Seddik will focus on leading the growth operations across the region, reinforcing the company’s commitment to delivering innovative cybersecurity solutions and ensuring prevention and cyber resiliency in today’s evolving threat landscape. Most recently, prior …
Read More »New Check Point Horizon XDR/XPR
Check Point® Software Technologies Ltd. , a provider of cyber security solutions globally, announces the launch of Check Point Horizon XDR/XPR, a collaborative cybersecurity solution that effectively defends organizations against evolving cyber threats by intelligently correlating data and stopping attacks across all vectors, minimizing the impact of threats and providing …
Read More »Check Point Software Introduces Quantum SD-WAN
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a provider of cyber security solutions globally, has today introduced Check Point Quantum SD-WAN, a new software blade in the Check Point Quantum Gateways. Check Point Quantum SD-WAN combines the highest level of security with optimized network and internet connectivity to protect branch …
Read More »Check Point CISO Appointed to Scotland’s National Cyber Resilience Advisory Board
Check Point Software Technologies Ltd.’s Field CISO EMEA, Deryck Mitchelson has become a member of Scotland’s National Cyber Resilience Advisory Board (NCRAB). Before joining Check Point, Mitchelson was National Digital and Chief Information Security Officer for NHS Scotland. He has more than 30 years’ experience and has been recognised as one …
Read More »“Booby-trapped” images could help hackers access networks via fax machines
“We found several critical vulnerabilities in all-in-one printers which allowed us to ‘faxploit’ the printer and take complete control over it by sending a maliciously crafted fax.”
Read More »