Check Point Software Technologies Middle East

Check Point Software Technologies Middle East company information, Employees & Contact Information

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity’s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware, and other threats. Infinity comprises four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.
Looking for a particular Check Point Software Technologies Middle East employee's phone or email?

Check Point Software Technologies Middle East Questions

News

Dissecting YouTube’s Malware Distribution Network - Check Point Software

Dissecting YouTube’s Malware Distribution Network Check Point Software

Check Point AI Cloud Protect, Powered by NVIDIA BlueField, Now Available for Enterprise Deployment - Check Point Blog

Check Point AI Cloud Protect, Powered by NVIDIA BlueField, Now Available for Enterprise Deployment Check Point Blog

Check Point Software Reports 2025 Third Quarter Financial Results - Check Point Software

Check Point Software Reports 2025 Third Quarter Financial Results Check Point Software

27th October – Threat Intelligence Report - Check Point Software

27th October – Threat Intelligence Report Check Point Software

Microsoft Tops Phishing Impersonations in Q3 2025 - Check Point Blog

Microsoft Tops Phishing Impersonations in Q3 2025 Check Point Blog

Nimbus Manticore Deploys New Malware Targeting Europe - Check Point Software

Nimbus Manticore Deploys New Malware Targeting Europe Check Point Software

LockBit Returns — and It Already Has Victims - Check Point Blog

LockBit Returns — and It Already Has Victims Check Point Blog

Security Awareness Training - SmartAwareness - Check Point Software - Check Point Software

Security Awareness Training - SmartAwareness - Check Point Software Check Point Software

Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals - Check Point Blog

Amazon Prime Day 2025: Deals Await, But So Do the Cyber Criminals Check Point Blog

Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation - Check Point Blog

Exposing Scattered Spider: New Indicators Highlight Growing Threat to Enterprises and Aviation Check Point Blog

Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability - Check Point Software

Stealth Falcon's Exploit of Microsoft Zero Day Vulnerability Check Point Software

Iranian Educated Manticore Targets Leading Tech Academics - Check Point Software

Iranian Educated Manticore Targets Leading Tech Academics Check Point Software

Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware ... - Check Point Blog

Global Cyber Threats September 2025: Attack Volumes Ease Slightly, but GenAI Risks Intensify as Ransomware ... Check Point Blog

1st September – Threat Intelligence Report - Check Point Software

1st September – Threat Intelligence Report Check Point Software

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies - Check Point Software

ZipLine Campaign: A Sophisticated Phishing Attack Targeting US Companies Check Point Software

6th October – Threat Intelligence Report - Check Point Software

6th October – Threat Intelligence Report Check Point Software

CloudGuard Network NGFW & Wiz CNAPP - Check Point Software

CloudGuard Network NGFW & Wiz CNAPP Check Point Software

Global Cyber Threats August 2025: Agriculture in the Crosshairs - Check Point Blog

Global Cyber Threats August 2025: Agriculture in the Crosshairs Check Point Blog

Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations - Check Point Software

Before ToolShell: Exploring Storm-2603’s Previous Ransomware Operations Check Point Software

Rhadamanthys 0.9.x – walk through the updates - Check Point Software

Rhadamanthys 0.9.x – walk through the updates Check Point Software

Renewed APT29 Phishing Campaign Against European Diplomats - Check Point Software

Renewed APT29 Phishing Campaign Against European Diplomats Check Point Software

The Discord Invite Loop Hole Hijacked for Attacks - Check Point Software

The Discord Invite Loop Hole Hijacked for Attacks Check Point Software

13th October – Threat Intelligence Report - Check Point Software

13th October – Threat Intelligence Report Check Point Software

Cursor IDE's MCP Vulnerability - Check Point Software

Cursor IDE's MCP Vulnerability Check Point Software

Lumma Infostealer – Down but Not Out? - Check Point Blog

Lumma Infostealer – Down but Not Out? Check Point Blog

Check Point to Acquire Veriti - Check Point Software

Check Point to Acquire Veriti Check Point Software

The Great NPM Heist – September 2025 - Check Point Blog

The Great NPM Heist – September 2025 Check Point Blog

Cyber Criminals Exploit Pope Francis Death to Launch Global Scams - Check Point Blog

Cyber Criminals Exploit Pope Francis Death to Launch Global Scams Check Point Blog

Microsoft Vulnerabilities Exposed by Check Point Research - Check Point Blog

Microsoft Vulnerabilities Exposed by Check Point Research Check Point Blog

CVE-2025-24054, NTLM Exploit in the Wild - Check Point Software

CVE-2025-24054, NTLM Exploit in the Wild Check Point Software

SharePoint Zero-Day Vulnerability CVE-2025-53770 - Check Point Blog - Check Point Blog

SharePoint Zero-Day Vulnerability CVE-2025-53770 - Check Point Blog Check Point Blog

EchoLink and the Rise of Zero-Click AI Exploits - Check Point Blog

EchoLink and the Rise of Zero-Click AI Exploits Check Point Blog

8th September – Threat Intelligence Report - Check Point Software

8th September – Threat Intelligence Report Check Point Software

Hexstrike-AI: LLM Orchestration Driving Real-World Zero-Day Exploits - Check Point Blog

Hexstrike-AI: LLM Orchestration Driving Real-World Zero-Day Exploits Check Point Blog

Chasing the Silver Fox: Cat & Mouse in Kernel Shadows - Check Point Software

Chasing the Silver Fox: Cat & Mouse in Kernel Shadows Check Point Software

New Malware Embeds Prompt Injection to Evade AI Detection - Check Point Software

New Malware Embeds Prompt Injection to Evade AI Detection Check Point Software

Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target - Check Point Blog

Phishing Trends Q2 2025: Microsoft Maintains Top Spot, Spotify Reenters as a Prime Target Check Point Blog

2nd June – Threat Intelligence Report - Check Point Software

2nd June – Threat Intelligence Report Check Point Software

The State of Ransomware – Q2 2025 - Check Point Software

The State of Ransomware – Q2 2025 Check Point Software

VanHelsing, new RaaS in Town - Check Point Software

VanHelsing, new RaaS in Town Check Point Software

Phishing Campaign Exploits Google Classroom at Scale - Check Point Blog

Phishing Campaign Exploits Google Classroom at Scale Check Point Blog

Q1 2025 Global Cyber Attack Report from Check Point Software: An Almost 50% Surge in Cyber Threats Worldwi ... - Check Point Blog

Q1 2025 Global Cyber Attack Report from Check Point Software: An Almost 50% Surge in Cyber Threats Worldwi ... Check Point Blog

Check Point Is A Leader in 2025 Forrester Zero Trust Evaluation - Check Point Blog - Check Point Blog

Check Point Is A Leader in 2025 Forrester Zero Trust Evaluation - Check Point Blog Check Point Blog

Yurei the New Ransomware Group on the Scene - Check Point Software

Yurei the New Ransomware Group on the Scene Check Point Software

Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day - Check Point Blog

Inside Stealth Falcon’s Espionage Campaign Using a Microsoft Zero-Day Check Point Blog

Check Point Software Technologies Receives Common Criteria EAL4+ Certification for Quantum Firewall Software R82 - Check Point Software

Check Point Software Technologies Receives Common Criteria EAL4+ Certification for Quantum Firewall Software R82 Check Point Software

Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security - Check Point Software

Check Point and Wiz Enter Strategic Partnership to Deliver End-to-End Cloud Security Check Point Software

Microsoft Dominates as Top Target for Imitation, Mastercard Makes a Comeback - Check Point Blog

Microsoft Dominates as Top Target for Imitation, Mastercard Makes a Comeback Check Point Blog

New End User Guide for Harmony Email & Collaboration - Check Point Blog

New End User Guide for Harmony Email & Collaboration Check Point Blog

June 2025 Malware Report - Check Point Blog - Check Point Blog

June 2025 Malware Report - Check Point Blog Check Point Blog

The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases - Check Point Blog

The State of Ransomware in the First Quarter of 2025: Record-Breaking 126% Spike in Public Extortion Cases Check Point Blog

Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign - Check Point Software

Silent Killers: Unmasking a Large-Scale Legacy Driver Exploitation Campaign Check Point Software

Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 - Check Point Blog

Playing Offside: How Threat Actors Are Warming Up for FIFA 2026 Check Point Blog

Global Cyber Attacks Surge 21% in Q2 2025 — Europe Experiences the Highest Increase of All Regions - Check Point Blog

Global Cyber Attacks Surge 21% in Q2 2025 — Europe Experiences the Highest Increase of All Regions Check Point Blog

Check Point Research Warns of Holiday-Themed Phishing Surge as Summer Travel Season Begins - Check Point Blog

Check Point Research Warns of Holiday-Themed Phishing Surge as Summer Travel Season Begins Check Point Blog

21st July – Threat Intelligence Report - Check Point Software

21st July – Threat Intelligence Report Check Point Software

5 Essential Cyber Security Tips for Cyber Security Awareness Month - Check Point Blog

5 Essential Cyber Security Tips for Cyber Security Awareness Month Check Point Blog

Real-Time Alerts on Leaked Credentials Now Available in Harmony Email & Collaboration - Check Point Blog

Real-Time Alerts on Leaked Credentials Now Available in Harmony Email & Collaboration Check Point Blog

FunkSec – Alleged Top Ransomware Group Powered by AI - Check Point Software

FunkSec – Alleged Top Ransomware Group Powered by AI Check Point Software

Impersonated GenAI Site Lures Victims to Infostealer Download - Check Point Software

Impersonated GenAI Site Lures Victims to Infostealer Download Check Point Software

AI Security Report 2025: Understanding threats and building smarter defenses - Check Point Blog

AI Security Report 2025: Understanding threats and building smarter defenses Check Point Blog

New Data Reveals July’s Worst Ransomware Groups and Attack Surges - Check Point Blog

New Data Reveals July’s Worst Ransomware Groups and Attack Surges Check Point Blog

April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with ... - Check Point Blog

April 2025 Malware Spotlight: FakeUpdates Dominates as Multi-Stage Campaigns Blend Commodity Malware with ... Check Point Blog

Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers - Check Point Blog

Phishing Campaign Mimics Email Quarantine Notifications: 32,000 Emails Target 6,358 Customers Check Point Blog

Malware Disguised as Minecraft Mods Target Gamers - Check Point Software

Malware Disguised as Minecraft Mods Target Gamers Check Point Software

Latin America 2025 Mid-Year Cyber Snapshot Reveals 39% Surge in Attacks as AI Threats Escalate Regional Ri ... - Check Point Blog

Latin America 2025 Mid-Year Cyber Snapshot Reveals 39% Surge in Attacks as AI Threats Escalate Regional Ri ... Check Point Blog

Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation - Check Point Blog

Raising the Bar: Infinity Global Services’ Pen Testing Achieves CREST-Accreditation Check Point Blog

Under the Pure Curtain: From RAT to Builder to Coder - Check Point Software

Under the Pure Curtain: From RAT to Builder to Coder Check Point Software

12th May – Threat Intelligence Report - Check Point Software

12th May – Threat Intelligence Report Check Point Software

Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal - Check Point Software

Sealed Chain of Deception: Actors leveraging Node.JS to Launch JSCeal Check Point Software

AI Evasion: The Next Frontier of Malware Techniques - Check Point Blog

AI Evasion: The Next Frontier of Malware Techniques Check Point Blog

Microsoft Dynamics 365 Customer Voice Phishing Scam - Check Point Blog

Microsoft Dynamics 365 Customer Voice Phishing Scam Check Point Blog

Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments - Check Point Blog

Check Point to Acquire Veriti, Redefining Threat Exposure Management in Complex Multi-Vendor Environments Check Point Blog

30th June – Threat Intelligence Report - Check Point Software

30th June – Threat Intelligence Report Check Point Software

Minecraft Players Targeted in Sophisticated Malware Campaign - Check Point Blog

Minecraft Players Targeted in Sophisticated Malware Campaign Check Point Blog

Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage ... - Check Point Blog

Hijacked Trust: How Malicious Actors Exploited Discord’s Invite System to Launch Global Multi-Stage ... Check Point Blog

Banshee: The Stealer That "Stole Code" From MacOS XProtect - Check Point Software

Banshee: The Stealer That "Stole Code" From MacOS XProtect Check Point Software

The Bybit Incident: When Research Meets Reality - Check Point Software

The Bybit Incident: When Research Meets Reality Check Point Software

The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs - Check Point Blog

The Weaponization of PDFs : 68% of Cyber attacks begin in your inbox, with 22% of these hiding in PDFs Check Point Blog

Google Calendar Notifications Bypassing Email Security Policies - Check Point Blog

Google Calendar Notifications Bypassing Email Security Policies Check Point Blog

DragonForce Ransomware: Redefining Hybrid Extortion in 2025 - Check Point Blog

DragonForce Ransomware: Redefining Hybrid Extortion in 2025 Check Point Blog

Check Point Announces New AI-Powered Innovations to Bolster Unified Security Management for the Infinity Platform - Check Point Software

Check Point Announces New AI-Powered Innovations to Bolster Unified Security Management for the Infinity Platform Check Point Software

Secure Your Cloud: A Joint Webinar with Check Point & Wiz - Check Point Software

Secure Your Cloud: A Joint Webinar with Check Point & Wiz Check Point Software

Miercom Enterprise & Hybrid Mesh Firewall Benchmark 2025 - Check Point Software

Miercom Enterprise & Hybrid Mesh Firewall Benchmark 2025 Check Point Software

Meet Yurei: The New Ransomware Group Rising from Open-Source Code - Check Point Blog

Meet Yurei: The New Ransomware Group Rising from Open-Source Code Check Point Blog

Cracking the Code: How Banshee Stealer Targets macOS Users - Check Point Blog

Cracking the Code: How Banshee Stealer Targets macOS Users Check Point Blog

New Facebook Copyright Infringement Phishing Campaign - Check Point Blog

New Facebook Copyright Infringement Phishing Campaign Check Point Blog

Is Firebase Phishing a Threat to Your Organization? - Check Point Blog

Is Firebase Phishing a Threat to Your Organization? Check Point Blog

AI-Powered Security Operations for Proactive Protection - Check Point Software - Check Point Software

AI-Powered Security Operations for Proactive Protection - Check Point Software Check Point Software

Infinity Global Services’ Cyber Park Launches “Beacon in the Dark” – A New Cyber Security Escape Room Adve ... - Check Point Blog

Infinity Global Services’ Cyber Park Launches “Beacon in the Dark” – A New Cyber Security Escape Room Adve ... Check Point Blog

Independent Tests Prove It: Check Point’s SASE Excels in Security & User Experience - Check Point Blog

Independent Tests Prove It: Check Point’s SASE Excels in Security & User Experience Check Point Blog

FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild - Check Point Blog

FileFix: The New Social Engineering Attack Building on ClickFix Tested in the Wild Check Point Blog

Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking - Check Point Software

Waiting Thread Hijacking: A Stealthier Version of Thread Execution Hijacking Check Point Software

Employee Spotlight: Getting to Know Anthony Gallo - Check Point Blog

Employee Spotlight: Getting to Know Anthony Gallo Check Point Blog

February 2025’s Malware Spotlight: AsyncRAT Emerges, Targeting Trusted Platforms - Check Point Blog

February 2025’s Malware Spotlight: AsyncRAT Emerges, Targeting Trusted Platforms Check Point Blog

Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection - Check Point Blog

Patch Now: Check Point Research Explains Shadow Pad, NailaoLocker, and its Protection Check Point Blog

CISO Connections - Check Point Software

CISO Connections Check Point Software

The Hidden AI Threat to Your Software Supply Chain - Check Point Blog

The Hidden AI Threat to Your Software Supply Chain Check Point Blog

Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback - Check Point Blog

Exploring Q4 2024 Brand Phishing Trends: Microsoft Remains the Top Target as LinkedIn Makes a Comeback Check Point Blog

DMV-Themed Phishing Campaign Targeting U.S. Citizens - Check Point Blog

DMV-Themed Phishing Campaign Targeting U.S. Citizens Check Point Blog

Top Check Point Software Technologies Middle East Employees

Free Chrome Extension

Find emails, phones & company data instantly

Find verified emails from LinkedIn profiles
Get direct phone numbers & mobile contacts
Access company data & employee information
Works directly on LinkedIn - no copy/paste needed
Get Chrome Extension - Free

Aero Online

Your AI prospecting assistant