Check Point Welcomes You to the “Future of Cyber Security” at Mobile World Congress 2017

San Carlos, CA  —  Wed, 22 Feb 2017

WHAT:
Check Point® Software Technologies Ltd. (NASDAQ: CHKP) executives will attend Mobile World Congress to discuss strategies for securing the cloud, mobile workforces and preventing cyber attacks on enterprises. There will be up to nine presentations every day at Check Point’s stand # 6J50, Hall 6, while on day three, (Wednesday, 1 March) Check Point will also deliver a program, entitled, “The Future of Cybersecurity” in Theater B, Hall 8 from 3 p.m. to 7 p.m.  In the program Check Point will provide updates on the very latest defenses for protecting businesses and government organizations against cyber attacks.

Mobile Threats
The presentations will draw inspiration from the work of Check Point researchers in 2016 that were responsible for the discovery of some of the biggest threats against enterprise mobile deployments. These affected billions of devices and services worldwide and included:

  • Gooligan – an attack campaign that breached the security of 1.3 million Google accounts, exposing messages, documents, and other sensitive data. The campaign used an aggressive variant of malware that roots Android devices and then steals email addresses and authentication tokens stored on them. With this information, an attacker could access Google account data on Google Play, Google Photos, Gmail, Google Drive, and G Suite, Google’s suite of business services offerings.
  • QuadRooter – a set of four vulnerabilities on Android devices built using Qualcomm chipsets, including those made by Samsung, HTC, Motorola, LG and more. QuadRooter vulnerabilities exist out of the box and if exploited, they could allow attackers to take total control of affected devices and the data on them.
  • HummingBad – a malware that establishes a persistent rootkit on Android devices that generates fraudulent ad revenue, and installs additional malicious apps. For five months, Check Point researchers had unprecedented access to the inner-workings of Yingmob, the Chinese cyber criminals behind HummingBad.
  • SideStepper – a vulnerability that can allow an attacker to circumvent enhancements in iOS 9 meant to protect users from installing malicious enterprise apps. By hijacking and imitating trusted MDM commands, an attacker could side-step these enhancements and install malicious enterprise apps over-the-air on iPhone and iPad devices.

Cloud Security
With organizations increasingly adopting cloud based solutions, Check Point experienced significant adoption for its cloud security offerings in 2016. The worldwide cloud market grew 28%[i] while the cloud security market is expected to grow at a compound annual growth rate of 10%.[ii]  There has also been significant adoption of Check Point’s mobile security solutions as demand for robust defenses for smartphones and tablets increases with the market currently growing at a CAGR of 46%.[iii]

Supporting Quotes:
“The strong market interest we have continued to see in our mobile security business solutions demonstrates our leadership in the global effort to thwart cybercrime,” said Michael Shaulov, head of mobility and cloud products. “With mobile devices a critical component of any enterprise IT strategy, Mobile World Congress is a natural platform from which to showcase our advanced capabilities and expertise.”

“Check Point’s advanced threat prevention works across any cloud platform, integrating with the most popular cloud technologies including VMware NSX, Cisco ACI, OpenStack, Microsoft Azure and Amazon Web Services (AWS),”said Don Meyer, head of cloud marketing for Check Point. “Fueled by the company’s vSEC cloud security with R80 Management, Check Point is enabling businesses to secure physical networks and cloud environments with the same industry-leading solutions and policies – from a centralized, unified platform.”

“Mobile devices are not only commonplace in enterprises but also critical to ‘business as usual’ activities, yet most organizations have failed to protect them or their users,” said Gabi Reish, vice president of product management and product marketing at Check Point Software Technologies. “With Check Point Mobile Threat Prevention, enterprises have the most complete mobile security solution for stopping mobile threats on iOS and Android, and in depth, real-time threat intelligence to better understand their overall security posture.” 

WHO:
One of the highlights of the theatre program on March 1 will be Michael Shaulov, discussing the mobile threat landscape. Other Check Point experts are available for interviews during Mobile World Congress to discuss and demonstrate cloud security and cyber threat prevention. They will also provide insight on mobile security trends, as well as the overall future of cybersecurity, including the company’s vulnerability research from 2016.

WHERE:
Visit Check Point at Booth # 6J50, Hall 6
For more information on Check Point, or to schedule a meeting with executives, please contact [email protected].

Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies