News

There are no articles in this category. If subcategories display on this page, they may contain articles.

Check Point Software Technologies Reinforces Leadership Team for Greater Execution and Innovation

Nataly Kremer joins Check Point as Chief Product Officer and Head of R&D, Dr. Dorit Dor becomes Chief Technology Officer, and Rupal Hollenbeck is promoted to President

 

SAN CARLOS, CA  —  Tue, 28 Feb 2023
 
 

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, today announced significant leadership changes to bolster crucial business areas and continue providing top-class security. The company has hired Nataly Kremer as Chief Product Officer and Head of R&D, appointed Dr. Dorit Dor as Chief Technology Officer, and promoted Rupal Hollenbeck to President of Check Point. These changes come as Check Point accelerates its technology and business performance.
 

“We are excited to have Nataly on board and confident that her expertise will be invaluable to our products organization,” said Gil Shwed, Founder and CEO at Check Point Software Technologies. “We are also proud to have Dorit take on the role of Chief Technology Officer and continue leading our rocket initiatives, and we congratulate Rupal on her well-deserved promotion to President of Check Point.”
 

Nataly Kremer brings extensive R&D and leadership experience to Check Point. She joins the company after 12 years with AT&T, where she led its Software and Delivery organization and was the General Manager of AT&T´s R&D center in Israel. As the new Chief Product Officer and Head of R&D, Nataly will oversee all product and technology units and use her proficiency in delivering network, security, and cloud technologies for large enterprises to meet customer needs.
 

Dr. Dorit Dor, one of the most senior women in the cyber security industry, has been instrumental in building Check Point into a leading player for over 27 years. As Chief Technology Officer, Dor will continue to spearhead Check Point’s rocket initiatives.
 

Rupal Hollenbeck, a technology leader with 28 years of experience in some of the world’s largest companies, has been promoted to President of Check Point. As Chief Commercial Officer, Rupal has been integral to creating the strategy and work plans to achieve the company’s goal of accelerated growth. She will continue to oversee the go-to-market operations, with a focus on delivering the best security experience to organizations worldwide.
 

“The combination of strengthening our leadership team with highly accomplished leaders, the unmatched experience and expertise people like Dorit represent, and the organizational changes designed to leverage our capabilities, are crucial to our efforts in accelerating our technology and business performance. Together, we will continue to deliver industry leading cyber security and help make the world a safer place,” said Shwed.

阅读全文

Nozomi Networks Innovates to Deliver the Industry’s First OT and IoT Endpoint Security Sensor

Nozomi Arc improves operational resiliency by significantly extending visibility across endpoint attack surfaces, dramatically reducing security threats and speeding deployments across all assets and sites.

SAN FRANCISCO, January 24, 2023 — Nozomi Networks Inc., the leader in OT and IoT security, today introduced Nozomi Arc™, the industry’s first OT and IoT endpoint security sensor designed to exponentially speed time to full operational resiliency. Built to automatically deploy across large numbers of sites and devices anywhere an organization needs visibility, Nozomi Arc adds crucial data and insights about key assets and network endpoints. This data is used to better analyze and deter threats, as well as correlate user activity, all without putting a strain on current resources or disrupting mission-critical networks.

Arc is a game-changer when it comes to complete asset visibility, deployment speed and reach across complex and remote OT and IT networks. Nozomi Arc is designed to:

  • Analyze endpoint vulnerabilities,
  • Identify compromised hosts,
  • Be deployed remotely; and
  • Accelerate monitoring deployments in mission critical systems.

“Operational resiliency is the top business priority for critical infrastructure organizations, which can only be achieved by lowering cyber risks and increasing security,” said Nozomi Networks Co-founder and Chief Product Officer (CPO) Andrea Carcano. “Nozomi Arc accelerates time to resiliency by transforming every computer on the network into an OT security sensor. It quickly extends visibility to attack surfaces and threats inside endpoint hosts and their local network. With Nozomi Arc, users can quickly corollate more information from more sources for better diagnostics and faster time to response.”  

According to the most recent SANS ICS security report, two of the biggest challenges facing security professionals center on the lack of security resources and the inability to track industrial control devices and applications. Nozomi Networks Arc is purpose-built to address both issues, while complementing the network-based analysis provided by Nozomi Networks’ Vantage and Guardian platforms.

With Nozomi Arc, users benefit from:

Faster Time to Resiliency: Nozomi Arc eliminates time, resource, geographic and internal policy constraints that come with network-based deployments. It gets new sites online quickly and makes it possible to monitor and analyze once unmanaged or unreachable connections and networks.

Lower Cyber Risk and Increased Security: Nozomi Arc is the only OT solution in the market to detect malicious hardware. It’s the first solution to provide continuous visibility into (active and inactive) network assets and key endpoint attributes as well as information about who is using them. With access to the full attack surface of host systems, Arc provides more complete threat analysis and monitors potential attack entry points than is possible with a network-based sensor alone. Additional points of visibility include attached USB drives and log files.

Extended Visibility and Context: In addition to shining a light on more assets and devices and potential vulnerabilities, Arc identifies process anomalies as well as any suspicious user activity. This reduces the potential for insider threats or compromised hosts. Arc also adds continuous monitoring capabilities for endpoint assets, monitoring that is not possible with network sensors alone.

Lower Operational Overhead: Because Arc can be deployed remotely via software download, Nozomi Arc does not require extensive network changes to be deployed anywhere in the world – even the most remote location. There is no administrative overhead to manage thousands of endpoints across multiple sites. Deployments can be automated across environments, whether they are installed as part of a standard operating environment or periodically deployed to collect data and then removed.

“Nozomi Arc makes it possible to quickly strengthen cybersecurity and resiliency by extending visibility across endpoints, sites and devices where organizations need it,” said Danielle VanZandt, Frost & Sullivan Industry Manager – Commercial and Public Security. “Nozomi Networks is again at the forefront of the industry with a solution to help critical infrastructure customers strengthen their cybersecurity models without taxing internal cybersecurity resources.”

Nozomi Arc is available now via subscription from Nozomi Networks and its extensive global network of channel partners. Pricing is based on the number of assets monitored.

阅读全文

Nozomi Networks Labs Report Finds Ruin vs. Ransom Dominates 2022 Threat

Disruptive attacks on critical infrastructure continued in to the second half of 2022, targeting rail, hospitals, manufacturing and energy

SAN FRANCISCO, January 18, 2023 — The latest OT/IoT security report from Nozomi Networks Labs finds wiper malware, IoT botnet activity, and the Russia/Ukraine war significantly influenced the 2022 threat landscape. Continuing the trend that was observed in the first half of 2022, Nozomi Networks Labs researchers saw hacktivists shift tactics from data theft and Distributed Denial of Service (DDoS) attacks to utilizing more destructive malware in an attempt to destabilize critical infrastructure to further their political stance in the Russia/Ukraine war.

“Over the past six months, cyberattacks have increased significantly, causing major disruption to industries ranging from transportation to healthcare,” said Roya Gordon, Nozomi Networks OT/IoT Security Research Evangelist. “Railways, in particular, have been subject to attacks, leading to the implementation of measures designed to protect rail operators and their assets. As cyber threats evolve and intensify, it is important for organizations to understand how threat actors are targeting OT/IoT and the actions required to defend critical assets from threat actors.”

Nozomi Networks Labs analysis of customers’ intrusion alerts over the last six months found weak/cleartext passwords and weak encryption were the top access threats to critical infrastructure environments. This was followed by brute force and DDoS attempts. Trojans were the most common malware detected targeting enterprise IT networks, Remote Access Tools (RATs) topped the malware targeting OT, and DDoS malware targeted IoT devices.

Malicious IoT botnet activity remained high and continued to rise in the second half of 2022. Nozomi Networks Labs uncovered growing security concerns as botnets continue to use default credentials in attempts to access IoT Devices.

From July to December 2022, Nozomi Networks honeypots found:

  • Attacks spiked in July, October and December with more than 5,000 unique attacks in each of those months.
  • The top attacker IP addresses were associated with China, the United States, South Korea and Taiwan.
  • “root” and “admin” credentials are still most often used as a way for threat actors to gain initial access and escalate privileges once in the network.

On the vulnerability front, manufacturing and energy remained the most vulnerable industries followed by water/wastewater, healthcare and transportation systems. In the last six months of 2022:

  • CISA released 218 Common Vulnerabilities and Exposures (CVEs) – down 61% from the first half of the year.
  • 70 vendors were impacted – up 16% from the previous reporting period; and
  • Affected products were also up 6% from the first half of 2022. 

Nozomi Networks’ “OT/IoT Security Report: A Deep Look into the ICS Threat Landscape” provides security professionals with the latest insights needed to re-evaluate risk models and security initiatives, along with actionable recommendations for securing critical infrastructure.

阅读全文

Security Forecast