Overview
Explore
Expertise
Ecosystem
10 results found
What Is NGFW? A Primer on the Third Generation of Firewalls
Learn about the competitive difference NGFW has over traditional firewalls, types of organizations that benefit most from NGFS and competitive vendors in the space.
Article
• Jun 3, 2023
Partner POV | From Phish to Phish Phishing: How Email Scams Got Smart
As AI technology advances, both attackers and defenders will engage in an ongoing arms race, with AI-powered security solutions and advanced threat detection becoming crucial. The future of phishing is uncertain but will undoubtedly be more challenging.
Partner Contribution
• Aug 20, 2024
Partner POV | 5,000 Fake Microsoft Emails that Your Employees Could Fall For
To combat frequently impersonated emails by scammers, organizations should implement user awareness training, AI-powered email security, and keep software up-to-date.
Partner Contribution
• Oct 24, 2024
My Favorite Next-Generation Firewall Security Features
A review of the features that differentiate today's hottest NGFW solutions.
Article
• Jun 3, 2023
Partner POV | Fight Back with AI-Powered Prevention
Check Point has developed "Deep PDF," an AI-powered engine that uses deep learning to analyze PDF structures and detect hidden threats.
Partner Contribution
• Aug 16, 2024
Partner POV | The Future of Cybersecurity in the Age of Generative AI
Insights and projections from recent ESG research.
Partner Contribution
• Apr 12, 2024
Partner POV | Microsoft Defender for Endpoint is Integrated with Check Point Horizon XDR/XPR
Learn how Check Point Horizon XDR/XPR consolidates events and alerts from across your security estate to power intelligent correlation
Partner Contribution
• Feb 5, 2024
5 key traits of highly effective CISOs
Is your CISO a highly effective top performer and how can your CISO further improve when it comes to being highly effective.
Partner Contribution
• Oct 13, 2022
Partner POV | Zero Trust Security in Action: Meet the New CheckPoint CloudGuard
Zero Trust is an important security measure used to protect against credential-based attacks and reduce the risk of security breaches. Learn more about Check Point's CloudGuard as a central component of a Zero Trust security strategy, offering features such as Cloud Identity and Entitlement Management (CIEM) and Code Security.
Partner Contribution
• Dec 15, 2023
Partner POV | The Escalation of Web API Cyber Attacks in 2024
The landscape of cyber security is continuously evolving, and the existence of "shadow" APIs and the adoption of third-party APIs pose additional risks.
Partner Contribution
• Apr 12, 2024