Tuesday, 22 August 2017

Check Point launches cyber threat map

Check Point
Thursday 30 April 15

Check Point Software Technologies Ltd., the largest pure-play security vendor globally, has launched the ThreatCloud World Cyber Threat Map, which visualizes how and where cyberattacks are taking place worldwide, in real time. The Map is powered by Check Point’s ThreatCloudTM intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors…

Check Point Software Technologies Ltd., the largest pure-play security vendor globally, has launched the ThreatCloud World Cyber Threat Map, which visualizes how and where cyberattacks are taking place worldwide, in real time.

The Map is powered by Check Point’s ThreatCloudTM intelligence, the largest collaborative network to fight cybercrime which delivers threat data and attack trends from a global network of threat sensors. The ThreatCloud database holds over 250 million addresses analyzed for bot discovery, over 11 million malware signatures and over 5.5 million infected websites, and identifies millions of malware types daily.

The ThreatCloud World Cyber Threat Map also shows key daily threat statistics, including:

• The top 10 countries from which attacks originate
• The top 10 countries targeted by attacks
• Types of attack (bot communication, access to malicious resources, malicious file transfers, spam)
• Daily attack totals
• Country-specific data showing infection averages and most common attack types by week and month

“It can be hard for organisations to grasp the sheer speed and global scale at which cyberattacks happen,” said Marie Hattar, Chief Marketing Officer for Check Point Software Technologies. “We wanted to develop a tool to help businesses understand how rapidly the threat landscape is moving so that they can take steps to strengthen their security implementations and better defend themselves against attacks”.

“The ThreatCloud World Cyber Threat Map shows where attacks are starting, the types of attack and their targets in more detail than any other resource, because it uses real-time intelligence from Check Point’s installed base of security gateways. Customers can also use ThreatCloud and Check Point’s Next Generation Threat Prevention solutions to get the latest intelligence in real-time, enhancing the quality and speed of their security responses to new threats.”

Check Point’s ThreatCloud collects data from numerous global sensors and from the company’s own research team and distributes this information to customers’ gateways, giving real-time threat information and attack trends to enforce protection against bots, APTs and other sophisticated forms of malware – making it the first and unique collaborative network to fight cybercrime. It feeds into ThreatCloud IntelliStore, the industry’s first threat intelligence marketplace that enables organizations to select from a wide range of threat intelligence feeds that are relevant to their business, use this intelligence to pinpoint and focus on the advanced threats, and proactively stop them.

To explore the ThreatCloud World Cyber Threat Map, visit: https://www.threat-cloud.com/ThreatPortal/#/map

Check Point’s Threat Intelligence & Research divisions regularly investigate attacks, vulnerabilities and breaches, and develop protections to secure Check Point’s customers. For more information on other research findings from Check Point, visit: http://www.checkpoint.com/threatcloud-central/.


View more of the latest press releases from across the industry or post your company's news.

Please enable JavaScript to view the comments powered by Disqus.

Newsletter signup

Quickly get on board and up to date with the telecoms industry