Enterprises around the globe must be ready for Mega Cyber Attacks

60

Check Point Software Technologies, an Israel based cyber security firm has released a press statement which says that Enterprises operating around the world should prepare themselves to face ‘mega’ cyber attacks.

“Large scale cyber attacks have been targeting mobile, cloud and on-premise networks and they are scaling and fast moving like never before. And fifth generation cyber attacks have increased over the past year, impacting more firms than ever before”, said Gil Shwed, the founder and CEO of Checkpoint Technologies.

Disclosing the same at the company’s annual event, Shwed said that cyber attacks and data theft were seen topping the charts of the Global Risks Report 2019 released by World Economic Forum’s 14th Edition.

According to Mr. Gil, most organizations get busy in detecting a cyber attack and by the time the incident is spotted which takes 5-6 months on an average, the damage is already done.

Factually speaking, a well-developed malware just takes 5 minutes to siphon or block access to critical data and network. And most modern-day networks are only capable of protecting themselves against Gen 2 and Gen 3 viruses.

So, Mr. Shwed emphasis on the need to make a network proactively protect itself before an untoward occurs.

This is where Checkpoint’s Maestro, an industry’s first hyperscale network security solution highlights itself by offering businesses of any size enjoy a cloud level security platform by expanding their existing security gateways to hyperscale capacity.

Also, Checkpoint introduced to the world the product called ‘Nano Security’- a Gen VI of cyber security which can be embedded on every device, web or cloud service, applications, and networks. The product is actually devised to protect the hyper-connected and the hyper-scale world.

Note- Check Point Technologies is a Tel Aviv based company which is known to offer software and combined hardware products related to IT Security which includes network security, mobile security, data security, endpoint security along with security management.