Check Point reveals hidden security risks on enterprise networks

Infotech Lead America:  Check Point Software Technologies 2013 Security Report reveals major security risks that impact organizations worldwide.

Most of the serious threats stayed hidden from network administrators. Criminal hackers keep changing their techniques and employees unintentionally indulge in risky online activities that make the corporate network vulnerable. To strengthen the security blueprint, organizations need to be aware of and fully understand the activities occurring on their networks.

According to the report, cyber attacks will continue to evolve this year and will impact organizations of all sizes. The research revealed that 63 percent of organizations were already infected with bots. More than half were infected with new malware at least once a day.

Top threats include botnets, top malware location by country, top vendor vulnerabilities and exposures, and SQL injection events by source country.

Increased use of web 2.0 applications has given criminal hackers even more options to penetrate corporate networks. The research found 91 percent of organizations used applications with potential security risks. Some risky web applications listed in the report are frequency and usage of anonymizers, P2P applications, file storage and sharing applications, and top social networks.

More than half of the organizations surveyed reported at least one potential data loss incident. The report enlists the different types of sensitive data leaked and lost, including PCI related information as well as HIPAA-protected health information. It also gives information about which industries have the highest tendency toward data loss.

Check Point’s portfolio of products provides organizations with multi-layered security to combat all types of threats identified in the report. Check Point Security Gateways running Check Point Software Blades can detect and prevent the latest threats. Check Point ThreatCloud provides software blades real-time intelligence and signatures.

Check Point DLP Software Blade helps organizations pre-emptively protect sensitive information from unintentional loss and leakage. Check Point Secure Web Gateway blocks access to malware infested websites and usage of high risk applications.

Network security appliance and software revenue grew 7% in Q3 2012

According to Infonetics Research, global network security appliance and software revenue grew 7 percent in Q3 2012 from the year-ago quarter. Check Point was the second largest player, its revenue increased 3.2 percent during this period.

[email protected]