Orange Egypt CEO charts new path.

Orange Egypt
charts new path

ICT minister has met
telco's new CEO.

Monday, May 21st

Check Point Technologies launches Infinity security deployment model

Check Point Technologies launches Infinity security deployment model 

Company believes it's time for corporates to fight 'fire with fire' and ensure protection levels are up to the level of sophistication and scale of Gen V cyber attacks.

From the CPX 360 annual cyber security summit and expo in Barcelona, global cyber-security solution provider Check Point Software Technologies has announced the release of Infinity Total Protection, a security consumption model based on Check Point Infinity architecture and designed to prevent fifth generation or Gen V cyber threats and attacks.

The company describes Gen V cyber attacks as large-scale and fast-moving across multiple industries, impacting enterprise environments - on-premise, mobile or in the cloud.

The protection covers APTs, unknown zero day malware, ransomware, malware prevention on iOS and Android mobile devices, rogue network identification, secure containers, data protection and document encryption, and EMM integration.

Gil Shwed, Check Point Technologies founder and CEO said, "2017 was an interesting year for all of us in cyber security, with data leaks in the cloud and in Europe, the French election as hacked, and then when we felt nothing more could go wrong, we had WannaCry and then months later, we had NotPetya, almost shutting down the country of Ukraine. It just showed us how vulnerable we are. We are at an inflection point in 2018, and cyber attacks represent two of the five most likely attacks to happen in the next two years."

Sophisticated attacks on mobile, cloud and various enterprise networks, easily bypass conventional, static detection-based defences being used by most organisations today said Check Point.

Infinity Total Protection combines real-time threat prevention, shared intelligence and advanced security, according to Check Point.

The model is released on an all-inclusive, per-user, per-subscription basis. It is described as the only subscription solution available that includes both network security hardware and software, with fully integrated endpoint, cloud and mobile protections and zero-day threat prevention – along with unified management and 24/7 premium support.

"Enterprises need to protect themselves from sophisticated - and dangerous - attacks on all fronts: network, endpoint, mobile and cloud," said Doug Cahill, group director and senior cybersecurity analyst at market research firm, Enterprise Strategy Group.

Gabi Reish, VP product management and product marketing at Check Point said cyber attacks are getting bigger, more sophisticated and more complex daily. "Yet many organisations still rely on outdated, older-generation security technologies that can only detect attacks after they have already occurred."

The company's regional leadership have warned that Africa needs to upgrade its cyber security and cyber crime detection systems to combat emerging threats.


Lighting the way forward with K8 Published on 18 May 2018

With the fully integrated business view and information provided by the newly implemented K8 system, the Lighting Warehouse was able to get closer to its customers, build profits and manage margins in a much easier and more streamlined manner.

African start-up uses blockchain to disrupt music's value chain Published on 10 May 2018

Why shokoCAST founder believes platform has the mettle to secure early traction in an ultra-competitive market.

Denial only diminishes Africa's cyber security Published on 14 May 2018

Perspective on the ability of African businesses to protect themselves from prevalent, increasingly sophisticated cyber threats.

New GSMA Report Highlights Integral Role of Mobile IoT Networks in 5G Future Published on 16 May 2018

Global Operators Including AT&T, Deutsche Telekom, KDDI, Orange and Vodafone Launching Mobile IoT Networks as Key Step in 5G Strategy; 3GPP to Complete Release 15 with NB-IoT and LTE-M as 5G Standards