SAN CARLOS, California, July 22, 2020 (GLOBE NEWSWIRE) – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), today announced its economic effects by the time a quarter ended on June 30, 2020.
Second quarter 2020:
“We’ve completed solid and rated announcements so far, one quarter, thanks to strong sales developments despite the emerging influence of the COVID-1 pandemic. Higher sales across categories and segments, adding our complex technologies such as cloud, terminals and high personal network security. We’ve expanded our Infinity plate form with new Quantum devices and the newly expanded CloudGuard family,” said Gil Shwed, founder and CEO of Check Point Software Technologies. “The new CloudGuard Cloud Native Security materials, actually an automated flat form that enables consumers to take advantage of the speed and agility of the cloud, while employing an unmarried glass security control component in their paint-rated deployments and ads.” Shwed continued, “Finally, I would very much like to thank our consumers, partners and staff for their commitment to raising the cybersecurity point and achieving those classified ads in those circumstances.”
Financial highlights for the moment one quarter of 2020:
Compa Highlights
In recent months, it expanded the Infinity platinum form and provided the following products and technologies:
We announce the transformation of the security tactics of our devices into the new Quantum Security GatetacticsTM that will provide security of global elegance. The new diversity of 1five security gateway models has a trend in the Infinity architecture from branch office to data center. All out-of-the-box Quantum models will provide our highest point of threat prevention with Sandblast Zero-day protection, providing over 60 security and threat prevention services. We provide a safety point consistent with a minimum overall cargo of ownership and competitive products. Quantum is h8ly scalable with up to 1. five tera-b stations of threat prevention functionality thanks to Hyconsistent withScale technology, h8 port density and force input component of competing h8 end devices.
The COVID-19 pandemic has accelerated organizations’ rapid migration to the cloud. Current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Check Point CloudGuard Cloud Native Security is a fully-automated cloud platform that enables customers to protect their cloud deployments and workloads, and manage security through a single pane of glass. It streamlines and simplifies cloud security, is designed to prevent advanced cyber-attacks from impacting organizations’ cloud environments, and enables organizations to take full advantage of the speed and agility of cloud.
With the design in cyberattacks, the Cinput Security Operations (SOC) group station is suffering to detect and mitigate malicious activity in its complex netpainting fleets. We announced that Infinity SOC would support the security group station to reduce alert overhead, decrease network blind spots to disclose, and maximum logical cyberattacks with unmatched speed and accuracy. Infinity SOC is used through Check Point cyber search analysts to divulge and investigate the world’s most damaging and confidable cyberattacks.
COVID-1nine’s influence on cybersecurity continued until the 2020 quarter and manifested itself in new and confusing cyber threats, taking credit for the transition of organizations and staff to a “new normal.”
Earlier in the quarter we conducted a survey with 270 IT and security professionals to examine how organizations managed their cyber-security during the Coronavirus pandemic. Over 86% of respondents said their biggest IT challenge during the pandemic was moving to mass remote working, and that their biggest security concern was maintaining VPN capacity for staff. As we move to our ‘new normal’, 75% of the surveyed professionals fear further increase in cyber-attacks and exploits as they start to re-open offices, while also maintaining mass remote working.
In April, the attacks deserved the warm general’s merit with other Americans fleeing their homes, painting and resorting to aid programs and stimulus payments. This trend continued in May when our researchers documented 192,000 coronavirus-like cyberattacks consistent with the week, marking a 30% design beyond weeks.
Our researchers also tested coronavirus touch-tracking programs that delight in a central tool in hunting to mitigate the spread of the pandemic. After an initial review, we learned of Apple’s cyber dangers in those programs, adding device traceability, non-public knowledge engagement, app traffic interception, and fake fitness reports. We also discovered the security legislation in WordPress plugins, which serves as a central bureaucracy for e-learning, which has a central tool in the crown era. Vulgar talents allow students, in addition to unauthenticated users, to borrow non-public information, extract coins and/or download instructor privileges.
In June, when organizations began to resume operations, cybercriminals were new angles to exploit by diverting other last-minute information. As the global protests applicable with the “Black Lives Matter” motion peaked, we found that a malicious spam crusade connected to the motion was spam with topics like “Anonymous Vote on” Black Lives Matter “was distributing the trickbot annotated malware.
Malware and Research:
SIGRed: Resolve your way to the dressage manager: Check Point researchers recently discovered a critical vulnerability in Microcushy Windows DNS, the dressage call formula service in the Windows opescore formula. The vulnerability, called “SigRed”, is tracked as CVE-2020-1350 and earned a CVSS severity score of 10.0, which is the maximum logical severity score. The vulnerability is designated as deworming, which means it can spread to Huguy’s non-intervention devices and has the strength to compromise the entire organization. Microcushy has provided a solution for this IPS CVE blade and Check Point and Agent Sandblast in a position that provides threat protection.
Bringing VandaTheGod back to Earth: exposing the individual to a 7-year hacktivism campaign: Check Point researchers have discovered the identity of a single hacker guilty of the degradation of thousands of official government network sites around the world. Active since 2013, the hacker identifies itself as “VandaTheGod”, aimed at one or more countries, adding the United States, Brazil, Dominican Republic, Trinidad and Tobago, Argentina, Thailand, Vietnam and New Zealand, among others.
IR case: The Florentine Banker Group: a confusing cybercrime gang, called “The Florentine Banker,” has focused on transforming three British equity companies. For months, the Florentine banker focused on his target, manipulating correspondence by email, recording similar names and charging in phases. In total, four separate bank movements attempted to move 1.1 million euros to unidentified bank accounts.
Naikon APT: Cyber Espionage Reloaded: Check Point Reseek has exposed new evidence of an ongoing cyberespionage operation opposed to several government entities throughout the Asia-Pacific region. First reported in 201five, the crowd, called Naikon, was blamed for attacks on high-level government agencies and similar organizations in countries circulating through the political intelligence of the South China Sea. Our research team showed that the crowd has not only been active for five years, but has also accelerated its cyberespionage activities in 201nine and the first quarter of 2020.
We continue to specialize in advocacy through innovation, advertising studies and recognition, including:
Check Point Software receives the Frost Radar Best Practices: Check Point award to this year’s Frost Radar Best Practices award for growth, innovation and leadership in the European mobile threat defense (MTD) market. The Frost Radar Award recognizes the competitive positioning of MTD responses in Europe and Check Point SandBlast Mobile has been rated as “comprehensive cellular threat defense responses”.
Reducing complexity to security: Check Point, through Dimensional Research, listed 411 IT and security professionals to inspect security leaders’ attitudes toward consolidation. These effects demonstrate that unique, unincorporated responses make business security difficult. About 69% of respondents agreed that the concern given to supplier consolidation would lead to greater security.
Conference Call and Internet Broadcast Information Check Point will make a conference call with net investors on July 22, 2020 at 8:30 a.m. ET/ 5:30 a.m. PT. To pay carefully for live video streaming or playback, visit the website: www.checkpoint.com/ir.
Third Quarter Investor Conference Participation Schedule:
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cybersecurity responses to governments and companies around the world. Their responses protect consumers from cyberattacks with a rate of capture of malware, ransomware and other bureaucracy from attacks in the industry. Check Point provides a multi-tiered security architecture that defends enterprise cloud-stored data, netpaintings, and mobile devices, as well as the most comprehensive and intuitive checkpointing formula. Check Point protects more than 100,000 organizations of all sizes.
© 2020 Chec Point Software Technologies Ltd. All rights reserved.
Disclaimer Relating to Forward-Looking Statements This press release includes forward-looking statements within the meaning of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. A friend’s forward-looking statements are instinctively reviewed due to a long-term party or our long-term economic situation. or pershapeance opescore. The forward-looking statements contained in this press release come with, however, not limited to statements regarding our expectations regarding our products and solutions, expectations beyond our new channel assignments, and our participation in investor meetings during the 3rd. 2020 quarter. Our expectations and ideology related to these disorders may not materialize, and genuine effects or parts are a problem of dangers and uncertainties that can also cause genuine effects or parties to differ to best friends from assigned ones. These hazards come with our ability to continue expanding captalents and platshape solutions; Customer acceptance and acquisition of our existing and new solutions; The position of the IT security market continues to grow; Competition of other products and centres and general conditions of market position, policies, economic and commercial. The prospective search statements contained in this press release are also a problem for other hazards and uncertainties, adding those described in more detail in our Securities and Exposure Password filings, adding our Annual Report on Form 20-F filed with the Securities and Exposure Hiring on April 2, 2020. The direct search statements contained in this press release are based directly on Check Point as of the date hereof, and Check Point waives the obligation to update Apple’s direct search statements, unless required by law.
Use of economic data that are not GAGA In addition to reporting directly on economic announcements classified according to the unconditionally accepted accounting principles, or GACCP, Check Point uses non-GAGA measures of inconsistent source of currencies, net source of coins in and diluted gains consistent with participation, which are changes in GAGA-based effects to exclude , where applicable, share-based repayment expenses, amortization of intangible assets, and expenses similar to acquisitions and similar tax effects. Check Point control believes that the non-GAAP economic data obtained in this press release are favorable to the low reputation and assessment of core business investors and Check Point’s long-term prospects. Historically its best friend, Check Point has also publicly presented those additional non-GAGA economic measures to support net investors, see the combined apple “through the eyes of control” and therefore convert the low prestige of its inconsistent consistency with compliance. The presentation of this non-GAGA economic data is never intended to be such an isolated or alternative concept for the effects prepared according to GAGs. The economic statements contained in this press release include a reconciliation of non-rogue GAGA economic measures in this press release with the maximum economic measures directly comparable GAGA. Management uses GAAP and non-GAAP information directly to compare and act on inconsistent deceptions or interpretations and, as such, has made the decision that this wisdom is the source of investors.