Tag Archives: Cyber security

Silobreaker awarded ISO 27001 certification

Security and threat intelligence technology company, Silobreaker, has today announced it has achieved ISO 27001 certification, underscoring its market credibility and ongoing commitment to service excellence, while recognising its adherence to the highest standards of information security.

As an international benchmark for Information Security Management Systems (ISMS), ISO 27001 ensures that organisations implement and maintain rigorous security controls and procedures, in order to protect their customers’ sensitive data and ensure business continuity. Part of Silobreaker’s ongoing strategy to continually bolster its security position, this latest certification demonstrates the company’s ability to withstand attack and deliver the best possible service to its customers.

“At Silobreaker, we enable our customers to identify and mitigate risks to their operations at scale, and in the quickest possible timeframe; it’s paramount that our services are always available and working optimally,” said Andy Grayland, CISO, Silobreaker. “This new ISO 27001 certification reflects our ongoing dedication to cyber security and service excellence, and shows that our customers can depend on us to provide the intelligence they need to safeguard their businesses from all types of threats, each and every day.”

Check Point Software Technologies Achieves Highest Ranking in Miercom Next Generation Firewall Benchmark Report

Check Point Software, a leading provider of cybersecurity solutions globally, today announced that its Check Point Quantum Cyber Security Platform achieved a near perfect score with a 99.7% malware block rate and 99.9% phishing prevention rate in Miercom’s Next Generation Firewall (NGFW) Security Benchmark 2023 report. The average malware block rate for tested competitors was 54.1%. Miercom, a leading independent network and security testing organization, put the industry’s top four firewalls through a series of intense malware and phishing prevention tests to rate the security efficacy of each product.

The first 24 hours of a malware campaign are the most critical. Preventing an attack at this point can immediately stop widespread damage. A security system with a higher block rate during the first day of discovery means an organization will spend less resources and energy responding to and remediating infected servers and endpoints. Check Point achieved the highest position across all key firewall tests against competitors Palo Alto Networks, Fortinet, and Cisco. When put through the Zero+1 Day* Malware Test, Check Point prevented over 99.7% of new malware downloads from a large set of files and file types, surpassing all other tested vendors’ solutions.

“Miercom conducted rigorous testing to determine the strengths and weaknesses of each enterprise firewall. It is apparent that some key competitor solutions have significant gaps in their ability to prevent malware, even after the malware was known to the industry for at least three days. In some cases, they did not block the malware that they detected.” Eyal Manor, VP of Product Management at Check Point Software said. “The report validates the effectiveness of our prevention-first, collaborative approach to Cyber Security. Check Point Quantum Cyber Security Platform Titan solution and its position in the market, revolutionizes threat prevention and security management.”

Check Point Software’s performance in the competitive test earned Check Point Quantum Next-Gen Firewall Miercom’s Certified Secure Award. This is Miercom’s highest award for achievement in competitive, hands-on testing.

“Based on our test findings and observations, we can see that Check Point Quantum excels in all the security efficacy testing categories. Check Point Quantum Next-Gen Firewall was superior in advanced threat prevention and offers the best protection against the latest generation of cyberattacks including Zero+1 Day Malware Malware based on recent competitive testing,” said Rob Smithers, CEO at Miercom. “The solution demonstrated the highest detection and prevention efficacy against a blend of malicious samples, indicating well-rounded protection from multiple attack vectors. As a result, we proudly award Check Point with the Miercom Certified Secure certification in recognition of their superior competitive performance and exceptional value.”
Other Check Point highlights from the report include:

• Best Block Rate at 99.7%: In the Zero+1 Day Malware Prevent (First to Block) Results Check Point led with a 99.7% prevention rate while competitors were as low as 43%.
• Lowest False Positive Rate at 0.13%: In False Positive Malware Detection Tests, where content is falsely reported as malicious, Check Point had the highest accuracy versus competitors that were up to 2 times lower.
• Top phishing prevention at 99.9% with the lowest miss rate at .01%: In Phishing Prevention Tests, Check Point led with the lowest miss rate of 1 per 1,000. Tested competitors miss rate were over 10 times higher, with some missing as many as 720 per 1000 phishing emails.

Check Point Research has determined that the volume of global cyberattacks increased by 38% in 2022 compared to 2021. This is due to a combination of geopolitical unrest with the Russo-Ukrainian war, the increased exploitation of legitimate tools by cybercriminals and the widening cyber skills-gap leaving organizations more vulnerable. Enterprise Firewalls with advanced threat prevention offer the best protection against the latest generation of cyberattacks.

Check Point® Software Technologies Enhances Endpoint Security with Intel vPro Platform

Bolstering Check Point Harmony Endpoint with Intel® Threat Detection Technology enables customers to take advantage of expanded protection surface and processor level security

Check Point Software, a leading provider of cyber security solutions globally, today announced an extended collaboration with Intel Corporation to offer enhanced anti-ransomware capabilities for Check Point Harmony’s customers. As ransomware attacks increase in scale and sophistication, integrating the Intel vPro(R) platform’s Threat Detection Technology (TDT) within Check Point Harmony Endpoint helps provide enterprises with processor level anti-ransomware security at both the hardware and software levels, at no extra cost.

Cyber criminals are becoming more creative in their attacks. Data from CPR’s mid-year security report revealed a 42% global increase in cyberattacks placing ransomware as the number one threat. Prevention-first continues to be the best cyber security strategy, as once an attack happens, it can be challenging to repair the damage to both the company and its reputation. The extended collaboration will lead to a new integration which will be available to customers in early 2023.

“Through our collaboration with Intel, customers will benefit from processor level security that starts at the silicon level and provides anti-ransomware capabilities allowing for earlier prevention and expansive attack surface coverage,” said Ofir Israel, VP of Threat Prevention at Check Point Software Technologies. “Together with Intel we have the technology and expertise to prevent operational and financial damage caused by the influx of ransomware attacks.”

Check Point Harmony Endpoint prevents endpoint threats with capabilities that identify, block, and remediate the full attack chain. Intel’s TDT technology, available on the Intel vPro platform, allows Harmony Endpoint to employ AI and ML to analyze CPU telemetry and recognize ransomware encryption commands early in the attack flow, raising the barrier against advanced threats.

Together, they will strengthen prevention and security measures for customers around the world. “It’s essential for organizations of all sizes to invest in technology to prevent cyber-attacks,” Carla Rodríguez, Vice President and General Manager, Ecosystem Partner Enabling at Intel. “The Intel vPro platform contains hardware-based security features, including Threat Detection Technology specifically designed to detect ransomware and other advanced threats. When paired with Check Point’s security solutions, customers can be confident knowing their endpoints are better protected at both the hardware and software layers.”

Additional details about the enhanced anti-ransomware capabilities this partnership brings will be announced in the coming weeks.

Don’t be fooled by Cyber Scrooges this Christmas

• Christmas is a time for gift giving and spending more time with loved ones, but that does not stop cybercriminals from trying to get your data.
• In the first half of 2022, attacks increased 44% over the same date in 2021, according to Check Point Software’s Mid-Year Report.
• On shopping dates such as Amazon Prime Day, attacks increase even more, reaching peaks of more than 35% compared to the average.

Christmas is a special time for millions of people around the world as heart-felt gifts are exchanged and families spend time with loved ones. But it is also a special season for cybercriminals as they take advantage of these shopping days to increase their phishing attacks, ransomware, and even dropping malware into emails.

During this time of frenzied shopping for the perfect last-minute Christmas gifts or grabbing Boxing Day and New Year bargains, cyberattacks are intensified. According to Check Point Software, on Amazon’s Prime Day, for example, attacks related to the US company increased by 37% compared to the average for June. In their Brand Phishing Report for Q3 2022, Check Point also found that DHL, the parcel delivery company, was the most impersonated company, setting up shoppers for cybercrime.

At a time when online shopping is busier than ever, consumers need to be especially careful. That is why Check Point is raising awareness for the telling signs of a scam, and how people can better protect themselves.

1. Always buy from an authentic and reliable source: Before making a purchase, it’s important to authenticate the site you are using to make the purchase. Instead of following a link sent through on email or text message, go directly to the retailer by searching for them on your selected browser and locating the promotion directly. Those extra few steps will ensure you are not clicking on any fraudulent links, and you can make your purchase with confidence.

2. Be alert to similar domain names: Many scam websites will often use a domain name similar to the brand they are trying to replicate, but with additional letters or misspellings. To ensure that you are not handing over your banking information to scammers, pay attention to the URLs to check if there anything usual or unfamiliar. By taking a minute to look for tell-tale signs that a website may be fraudulent, you can quickly determine its legitimacy.

3. Look for ‘too good to be true’ offers: Often phishing scams promise extremely good discounts on very popular items. If you receive an offer that does appear to be too good to pass up, don’t rush to buy it before it sells out. Chances are it is a scam. Instead, check that the seller is authentic by checking other websites to see if they are offering similar discounts.

4. Always look for the padlock: A quick way to see whether a website is secure is to look at whether the URL start with HTTPS. This is an indicator it is compliant with international security standards, and it is usually partnered with a padlock to reflect this. If these are missing, then it’s a strong indication the website is fraudulent and should be avoided.

5. Use endpoint security: While we do see an uplift in scam emails during popular shopping periods, phishing emails are used by cybercriminals all year round. That’s why everyone should be looking to implement email security solutions to prevent them landing in our inboxes in the first place.

6. Be wary of password reset emails: Hackers will always be looking for ways to get into people’s shopping accounts often by credential stuffing, where details have been obtained as part of a separate breach. As a result, consumers should be cautious of password reset emails that could be fraudulent. If you do receive one, always visit the website directly (do not click on the links) and change your password.

“Research suggests that cyberattacks increase around the festive season, with both ransomware and phishing the order of the day for companies and individuals,” says Ian Porteous, Regional Director, Security Engineering, UK&I at Check Point Software. “We all want to have a happy Christmas buying gifts for family and friends and maybe even grab a bargain ourselves. But cybercriminals do not take holidays, and that is why you have to be very cautious, even more so at this time of year.”

Softcat study reveals priority tech investments for smarter digital transformation

A new report by leading providers of IT infrastructure, Softcat, offers an exclusive look at the tech investments businesses are prioritising in the year ahead for smarter digital transformation.

The findings are based on the views of more than 1,800 customers in the UK and Ireland, across 27 corporate and public sectors.

The report, which is produced annually, reveals organisations are now prioritising Cyber Security above all other technology areas, with 62% of organisations saying that it is their focus over the next 12 months.

 

Adam Louca, Softcat’s Chief Technologist for Security, explained: “This figure is understandable. More organisations are recognising the vital role cyber security plays in enabling their tech adoption and unlocking further opportunities for innovation. Rising investment levels and C-suite buy-in reflect this evolving mindset, one that is moving away from an ad-hoc reactive threat response.

“It’s clear from the report’s findings that organisations understand that cyber security must underpin every part of digital transformation and investment needs to be a long-term strategy. This ensures that gains made are not lost as hybrid working and cloud approaches evolve.”

After Cyber Security, Devices is the second most cited technology investment area for the next year as organisations continue to invest in the digital workspace (46% of respondents).

At a time of skills shortages and the great resignation, equipping staff with the right devices and tools they need to work well from anywhere will deliver productivity gains and a high-quality and secure employee experience.

Hybrid Infrastructure is the third most important technology investment area, with 21% of customers citing Datacentre and Private Cloud as a priority area over the next 12 months, followed by Public Cloud (17%) and Managed Infrastructure and Support Services (16%).

Over the past few years of on-off disruption, cloud technologies have proven they’re enterprise-ready, offering organisations the scalability, flexibility, and greater efficiency. But modernising in the right way is key to releasing the true value when investing in cloud solutions.

In response, organisations are moving towards a hybrid approach to ensure the user and customer experiences are consistent, deliver value and achieve the required business outcomes.

It’s clear from the survey findings that sustainability is moving higher up the agenda for many businesses, large and small, with 19% of respondents citing it as a priority this year, up from 9.6% in 2021.

 

Richard Wyn Griffith, Chief Commercial Officer, commented on the findings:

“The past year has been one of transition and adjustment for our customers after the disruption and uncertainty of recent years.

“Today, organisations are focused on switching off ‘emergency’ digital transformation mode and turning on smarter digital transformation, setting a clear and concise roadmap for the deployment of new technologies.

“This will help them to remain agile in the face of new headwinds – from rising inflation to skills shortages and supply chain delays – as well as taking positive action towards our shared sustainability goals. 

“One thing is certain; it will be the digitally mature businesses who prosper in the future.”

 

The full findings from the 2022 Softcat Business Tech Priorities Report, including expert analysis, can be downloaded here. 

Check Point Software Celebrates Success of its Irish Channel Partners at Awards Gala with Guest Speaker Rob Kearney

Channel partners recognised for their outstanding achievements over the last 12-months at event in Dublin

Check Point Software, a leading provider of cybersecurity solutions globally, has once again celebrated the achievements of its partners at the annual Irish Partner Awards Gala, held in Dublin on the 20th October.

Speaking at the event, Seamus McCorry, Ireland Country Manager at Check Point said: “The volume of incidents in Ireland is alarming, with an organisation being attacked on average 822 times per week in the last 6 months. We understand the challenges that SMBs face in the fight against cybercrime with fewer resources and manpower dedicated to threat prevention. That is why our channel partners are so valuable as an extension of these businesses, building resilience and consolidating cybersecurity without the need for in-house SOC teams.

“There has been a countrywide drive from the National Cyber Security Centre (NCSC) and the Garda National Cyber Crime Bureau (GNCCB) to help business owners recognise and mitigate cyberattacks as hackers move away from bigger targets. It is our responsibility, and that of our partners, to support companies as they navigate this changing threat landscape.

“Our partners have worked tirelessly over the last twelve months to deliver another strong period of growth, and I want to personally thank them for their contribution in Ireland. We are proud to celebrate their success at our first in-person awards gala.”

 

The partner awards

The event took place at the Medley Private Dining and Events Space in Dublin. The Check Point Software Partner Day and Award Ceremony honours the input of Check Point’s affiliate companies and celebrates the growing partner community in Ireland.

During the evening, there was a fundraiser in support of Women’s Aid, with a total of over €1100 raised in donations. Guests were also treated to a talk by Rob Kearney, Ireland’s most decorated rugby player. His list of achievements for Leinster and Ireland includes being in Ireland’s top ten most-capped players of all time, two Six Nations Grand Slams and three Rugby World Cups. Rob was on hand to present the partner awards in various categories, including:

 

Award Winner
Partner of the Year Integrity360
Project of the Year IP Options
Growth Partner of the Year Presidio
Emerging Technology Partner of the Year Pentesec
Distribution Partner of the Year Data Solutions
Sales Champion of the Year Kevin Carragher – Integrity360
Marketing Champion of the Year Aisling Bolger & Anna Zdun – Presidio
Technical Champion of the Year Ernesto Cabello – Presidio
Channel Champion of the Year Stewart Grant – Integrity360

 

Check Point has been making significant steps in the Irish market, having recently partnered with Ireland’s Health Service Executive (HSE) to help upskill staff in cybersecurity, both within the HSE and across the broader health sector. The partnership with Check Point MIND’s SecureAcademy is part of a large-scale digital transformation program within Ireland’s health service to accelerate the adoption of digital technologies and solutions.

Check Point has also launched its new global Managed Security Service Provider (MSSP) Program which gives partners access to a fully integrated security portfolio and automated processes to remove administrative burden and empower a partner service-led approach. Under the new program, MSSPs can provide global SOC-as-a-Service without upfront investment and address major security incidents with streamlined onboarding and flexible pricing. The program includes Check Point’s prevention-first security operations suite Check Point Horizon, which partners can co-brand or white-label.

IT company reveals how to guard against hackers in Cyber Security Awareness Month

To mark Cyber Security Awareness Month an Oxford based company has issued key advice on how to protect against becoming a victim of digital fraudsters.

OX IT Solutions has issued five top ways for organisations and people to stop criminals hacking into websites, social media platforms and bank accounts. As part of Cyber Security Awareness Month, it is offering all businesses free, remote cyber security reviews to help them identify weaknesses within their IT infrastructure.

The Kidlington based company helps NHS trusts, schools and businesses across the UK protect against cyber security attacks.

Using unique passwords, additional security levels like two factor authentication, regularly backing up data and managing software updates are some of the areas people need to consider when using computers, tablets and smart phones.

Earlier this year the government’s latest Cyber Security Breaches Survey estimated 72% of large firms and 48% of small firms in the UK had been victim of a cyber security attack in the last 12 months. This month OX IT Solutions will post top tips on social media to remind people how to stay safe online.

Chris Cope, OX IT Solutions director said: “Most people are online daily both for work and leisure and lead busy lives, so it is easy to forget or be complacent about cyber security.

“But the smallest gap in the armour is how hackers break into websites, cloud storage, email, social media accounts and bank accounts to issue ransom notes, steal identities and data to sell on the dark web and even take money.

“They rely on security settings not being up to date – it is like leaving the front door of your home unlocked, open and unattended. Cyber Security Month is a good way of reminding people of the issue and some simple steps they can take to protect themselves to stay one step ahead of hackers.”

Here are OX IT Solutions top five tips to be cyber safe.

  1. Install anti-malware software

Malware is malicious software that looks to infect, corrupt and disable networks and devices. It can come in the form of a virus, ransomware or spyware. Installing anti-malware protection across all devices should significantly reduce the threat of a breach.

  1. Keep software up to date

Hackers look to gain access through old or out of date software by exploiting vulnerabilities. Staying up to date with patch management and the latest software will minimize weaknesses in infrastructure.

  1. Staff training

Email phishing is the single largest cause of cyber security attacks in the UK. Luckily, with the right training, most attacks are easy to spot. Promoting vigilance and education amongst staff seriously reduces the number of low-level breaches.

  1. Don’t share passwords

Up to 80% of data breaches involve stolen or weak passwords as the main vulnerability. Never use the same password across multiple accounts and, where possible, implement multi factor authentication.

  1. Back up data

Valuable data can be lost or destroyed as a result of a cyber security breach. Making regular backups through the cloud or external storage will reduce downtime in the event of an attack. “Data theft and cyber security attacks are growing at an alarming rate year on year and becoming increasingly sophisticated,” added Chris. “We hope Cyber Security Month can help ensure more people are better protected online.”

OX IT Solutions specialises in providing network, infrastructure and cyber security solutions. It works with major blue-chip companies, healthcare institutions, local authorities and SMEs. Its clients include the Royal College of Nursing, NW London NHS Trust and Molton Brown.

Corelight Co-founder Dr. Vern Paxson Receives Prominent USENIX Security Test of Time Award

Paxson’s 1998 paper “Bro: A System for Detecting Network Intruders in Real-Time” honored for its profound impact on the field of security and privacy

Corelight, the leader in open network detection and response (NDR), today announced company co-founder, and creator of Zeek®, Dr. Vern Paxson has received the distinguished USENIX “Test of Time” award for his work entitled “Bro: A System for Detecting Network Intruders in Real-Time published in 1998. The paper marked the official launch of open source technology Bro (now known as Zeek), which has since become the de-facto standard for network security monitoring and network visibility.

“Dr. Paxson’s work in creating Bro marked a turning point in how organizations could get a handle on, and gain better access to, the traffic that was coming into their networks at a time when the Internet was still in its infancy,” said Dr. Kevin Fu, associate professor of EECS at the University of Michigan and USENIX steering committee member. “The committee felt strongly that this paper should stand as a ‘must read’ classic paper for any graduate computer security course.”

The USENIX “Test of Time” award is intended to recognize papers that have had a lasting impact on their respective fields and that were presented at its respective conference at least 10 years ago.

“In the late 1990s, effective ways to monitor and analyze traffic over the Internet were virtually nonexistent. That left sites unable to distinguish malicious traffic from harmless traffic,” said Paxson. “Bro/Zeek was designed as a means of identifying possible intrusions on a network right as they were happening, by analyzing in detail the traffic flying by on high-speed network links. By open sourcing the code, the hope was that it would both benefit the community and in turn benefit from community efforts to enhance it.

“More than 20 years later it is a thrill to see how not only how expansive the Bro/ Zeek, community has grown, but also to see how the thousands of contributions to it over the years have made it one of the most powerful and reliable network security offerings today,” he continued. “I have long had roots in the USENIX community, so I’m particularly honored to receive this recognition.”

USENIX “Test of Time” award recipients received recognition at the 31st USENIX Security Symposium. The USENIX Security Symposium brings together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security and privacy of computer systems and networks.

About USENIX

Since 1975, USENIX has brought together the community of engineers, system administrators, SREs, researchers, and technicians working on the cutting edge of the computing world. USENIX conferences have become the essential meeting grounds for the presentation and discussion of the most advanced information on the development of all aspects of computing systems. For more information, visit https://usenix.org.

About Corelight

Corelight provides security teams with network evidence so they can protect the world’s most critical organizations and companies. Corelight’s global customers include Fortune 500 companies, major government agencies, and large research universities. Based in San Francisco, Corelight is an open-core security company founded by the creators of Zeek®, the widely-used network security technology. For more information, visit https://corelight.com or follow @corelight_inc.

WeDo Business Services continues expansion with takeover of Lucid Networks

Fast-growing WeDo Business Services has expanded with the acquisition of Manchester-based IT services consultancy Lucid Networks.

Lucid is being integrated into the group’s WeDo Digital business, which has a team of more than 50 specialists providing digital innovation, design, development and support services.

The acquisition of Lucid brings to the group a range of IT services, from complex infrastructure projects and cyber security through to back-up hosting solutions and day-to-day IT strategy delivery.

Lucid, which was founded in 2010, was owned by James Balderstone and was based at Manchester Science Park. The business has built a long-standing customer base across the UK. Its workforce has transferred to WeDo Digital’s offices at MediaCityUK in Salford.

WeDo Digital is led by tech entrepreneurs Luke Pilfold-Thomas and Lee Turver, who have more than 25 years’ industry experience between them.

Luke said the acquisition of Lucid further expands the capabilities of WeDo Digital and bolsters the offering of the wider group. Further recruitment for the division is under way in the digital business.

Luke said: “Lee and I recently joined the group to spearhead the development of WeDo Digital, and we are thrilled to bring in the team from Lucid Networks and managed IT services expertise as the next stage in our growth.

“We were looking to increase our digital offering to include more traditional IT managed services and wanted to acquire a north west business with a strong record of customer retention. Lucid has developed and maintained an excellent business and client base over the years, with many of its customer relationships spanning more than a decade, so it fitted the bill perfectly.

“We will continue to offer the highest level of service and technology innovation across applications and infrastructure to its customers to help them build and grow their own businesses, as well as being able to offer this expertise to clients of the wider WeDo group.”

Andrew Livesey and Matthew Catterall, of north west law firm Taylors Solicitors, advised WeDo on its acquisition of Lucid Networks.

Andrew said: “We were very pleased to be asked to continue to provide legal support and advice to WeDo as it continues its expansion with the acquisition of the Lucid Networks business.

“WeDo is continuing to make headlines with its innovative approach to business and it is a great to be trusted advisers to the group. We look forward to working with the team in the future as the business continues to expand.”

Founded in 2019 by Mark Lindsay and Chris Robinson with just four staff, WeDo Business Services has grown organically and through acquisitions.

It now employs almost 100 people across its headquarters in Oldham and offices in Colchester, Sheffield, Swindon and Salford.

The group provides a range of services to small and medium-sized companies, including invoice and trade finance, start-up funding, HR, back office and payroll support, as well as IT and digital services.

Check Point Software celebrates World Youth Skills Day by highlighting the cybersecurity workforce shortage

  • At present, the global shortage of cybersecurity workers is estimated at 2.7 million people.
  • Girls, young people with disabilities, young people from the poorest households, rural communities, indigenous peoples, and minority groups, as well as those living in unstable countries, continue to be excluded due to a combination of factors.

 

Today marks World Youth Skills Day which, since its declaration by the UN in 2014, has served as a reminder of the importance of equipping young people with the skills they need to find a good career or to become an entrepreneur. Since that time, World Youth Skills Day has provided a unique opportunity for dialogue between young people, technical and vocational education and training (TVET) institutions, enterprises, employers’ and workers’ organizations, policy makers and development partners.

That is why Check Point Software, a leading provider of cybersecurity solutions globally, wants to highlight the current shortage of cybersecurity staff (around 2.7 million workers globally, according to a study by the Information System Security Certification Consortium (ISC).) Check Point also wants to emphasize the need to give young people the tools to enter the industry, regardless of their situation.

As a result of the COVID -19 pandemic most of the world had to go through a rapid shift to digital for which both infrastructure and institutions were not fully prepared, or at least not prepared to allow this to be done at pace. Many people had to adapt to working from home with all the dangers that this entails. The situation was made worse by the fact that there is a distinct shortage of cyber security experts around the world to keep cyber criminals at bay.

 

Collaboration between Check Point SecureAcademy and institutions around the world

To prepare students with the vital technology skills they need to secure the future, Check Point SecureAcademy was created to provide cybersecurity education worldwide through partnerships with third-party institutions under Check Point’s cybersecurity training umbrella known as: Check Point MIND, offering educators and students vital cybersecurity skills, learning resources and certifications through a “revenue-free” education programme.

Some 45,000 students at over 120 higher education institutions in 53 countries are currently using Check Point SecureAcademy’s free learning content, including the Cyber Range and HackerPoint simulation courses, to improve their knowledge of cybersecurity. Another offering is the Check Point SmartAwareness solution, which delivers cyber security awareness training for businesses that aims to prepare every employee with industry-leading training so that they are ready to deal with a real attack when it happens.

 

“This is a very important day to assert the rights of students around the world to have chance to pursue a career in the field they are most interested in, even if they are in environments where there is a lack of opportunity,” said Ian Porteous, Regional Director, Security Engineering, UK&I at Check Point Software.“For our part, we are alarmed by the lack of available talent in a field like cybersecurity which offers so many quality career opportunities. We hope that with our efforts and those of the rest of the international community, we will be able to turn the situation round in the coming years.”