All resources sponsored by:

Check Point Software Technologies Ltd.

1 - 25 of 26 Matches
Check Point 2015 Security Report
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Based on how bad 2014 was from a cyber security perspective, it's clear that cybercriminals are not slowing down. Read this extensive report that explains the benefits of implementing a three-layer security approach and highlights the threats your enterprise may fall victim to without implementing it.
Posted: 28 Jun 2016 | Published: 31 Dec 2015
Get This Now


Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE:One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016
Get This Now


Removing Malware and Undetectable Windows AppLocker
sponsored by Check Point Software Technologies Ltd.
EGUIDE:A Windows command-line utility dating back to XP reportedly enables a simple and virtually undetectable Windows AppLocker whitelist bypass. How can you ensure your organization is protected against this vulnerability, and other types of malware? Access this e-guide for best practices from security experts.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
Get This Now


Make Ransomware Attacks Less Dangerous
sponsored by Check Point Software Technologies Ltd.
EGUIDE:It's only a matter of time before a hacker infiltrates your system and holds your files hostage. What then? You can't defeat ransomware, but there are strategies you can adopt to make attacks less dangerous for your organization. Find out what your security options are in this e-guide.
Posted: 14 Jun 2016 | Published: 08 Jun 2016
Get This Now


Gain Capabilities to help you Protect, and Insight to Understand
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:As threats evolve, organizations must find ways to continuously detect, prevent, and respond quickly to attacks on the endpoint in order to limit damages. Discover a strategy that can help you protect endpoint devices against advanced and zero-day threats.
Posted: 10 Jun 2016 | Published: 10 Jun 2016
Get This Now


Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST:You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016
Get This Now


Evolution of Crypto Attacks: Understanding, Detecting, and Preventing Ransomware
sponsored by Check Point Software Technologies Ltd.
WEBCAST:To successfully prevent ransomware attacks against your organization, you need to understand their nature, how they work, and how you can detect and stop them. View this resource to learn more about best practices to protect your organization from ransomware.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016
Get This Now


Video: Advanced Endpoint Protection & Forensics
sponsored by Check Point Software Technologies Ltd.
VIDEO:This video invites you to uncover key strategies for continuously preventing even the most sophisticated attacks. Tune in and learn how to respond quickly to limit damages on endpoint devices.
Posted: 24 Mar 2016 | Premiered: 08 Feb 2016
Get This Now


Unknown Malware - What You Can't See Can Hurt You
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This infographic provides some essential statistics on the rise of unknown malware and gives advice for defeating it. Discover how you can fight the unknown and keep your organization secure.
Posted: 17 Nov 2015 | Published: 31 Dec 2014
Get This Now


Malicious Email Files: The Growing Digital Weapon
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This infographic delivers some fast facts on email-based cyber-risks and how you can defend against them. Discover how advanced hackers are leveraging email against you and what you can do to stop them.
Posted: 17 Nov 2015 | Published: 17 Nov 2015
Get This Now


Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO:This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Read on to discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015
Get This Now


Multi-Layered Defense for an Evolving Threat Landscape
sponsored by Check Point Software Technologies Ltd.
WEBCAST:Access this webcast to learn how you can protect against both known and unknown malware and to make today's difficult cybersecurity landscape just a little bit easier.
Posted: 16 Nov 2015 | Premiered: Oct 13, 2015
Get This Now


How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO:This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015
Get This Now


Staying One Step Ahead with Zero-Day Protection
sponsored by Check Point Software Technologies Ltd.
WEBCAST:This webcast examines how you can stop today's advanced hackers. Watch and learn how sandboxing, CPU-level detection and more can keep your organization secure from even the most sophisticated threats.
Posted: 16 Nov 2015 | Premiered: Sep 22, 2015
Get This Now


Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015
Get This Now


How to Stop Today's Advanced Hackers
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This white paper discusses how you can protect against any threat today's advanced hackers throw at you.
Posted: 13 Nov 2015 | Published: 19 Aug 2015
Get This Now


Combat the Rise of Malware
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This resource discusses the growing malware threat and gives suggestions for combatting zero-day attacks, non-executable attacks, and more.
Posted: 13 Nov 2015 | Published: 26 Oct 2015
Get This Now


A Strategic Approach to Combatting Security Threats Featuring ESG Analyst Jon Oltsik
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This paper discusses how organizations can take a more strategic approach to threat management by moving to a tightly integrated and centrally managed defense-in-depth architecture.
Posted: 12 Nov 2015 | Published: 31 Oct 2015
Get This Now


How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015
Get This Now


How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015
Get This Now


Evaluating the Next Generation of Threat Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This white paper looks at a next-generation threat prevention tool, evaluating the effectiveness of this form of technology and the practicality of implementing it.
Posted: 10 Nov 2015 | Published: 10 Nov 2015
Get This Now


Check Point Abra: A Virtual Secure Workspace
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Read this paper to learn how Abra provides a convenient secure access to the corporate workspace, while pre­venting data loss and malicious activity from remote systems — at a significantly reduced cost over traditional endpoints.
Posted: 28 Jun 2010 | Published: 28 Jun 2010
Get This Now


The New Face of Intrusion Prevention
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.
Posted: 29 Sep 2009 | Published: 12 Jun 2009
Get This Now


Deliver Application-level Security at Data Center Performance Levels
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security.
Posted: 08 Sep 2008 | Published: 08 Sep 2008
Get This Now


Unified Threat Management: The security you need, the simplicity you want
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER:This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot.
Posted: 08 Sep 2008 | Published: 08 Sep 2008
Get This Now


1 - 25 of 26 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement