ACHIEVING FIFTH GENERATION CYBER SECURITY

Similar documents
IT Monitoring Tool Gaps are Impacting the Business A survey of IT Professionals and Executives

Building a Threat Intelligence Program

THREAT HUNTING REPORT

Cybersecurity The Evolving Landscape

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

THREAT HUNTING REPORT

Spotlight Report. Information Security. Presented by. Group Partner

SANS 2017 SOC Survey. A Mile of Numbers and a Ton of Stats. Christopher Crowley All Rights Reserved All Wrongs Reversed

THE STATE OF CLOUD & DATA PROTECTION 2018

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Second International Barometer of Security in SMBs

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Cyber Security. June 2015

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Reducing Cybersecurity Costs & Risk through Automation Technologies

Cyber Resilience - Protecting your Business 1

COPYRIGHT 2018 NETSCOUT SYSTEMS, INC. 1

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Security Awareness Training Courses

RSA Cybersecurity Poverty Index

How NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Department of Management Services REQUEST FOR INFORMATION

Mid-Market Data Center Purchasing Drivers, Priorities and Barriers

Tripwire State of Container Security Report

THE IMPACT OF MOBILE DEVICES ON INFORMATION SECURITY:

CLOUD REPORT LITTLE CHANGE IN GDPR-READINESS LEVELS WITH MAY 2018 DEADLINE LOOMING. 24.6% of cloud services rated high on GDPR-readiness

IT Security: Managing a New Reality

What It Takes to be a CISO in 2017

Panda Security 2010 Page 1

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Cyber Security in Smart Commercial Buildings 2017 to 2021

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Uncovering the Risk of SAP Cyber Breaches

What can we lose not implementing proper security in our IT environment? Aleksandar Pavlovic Security Account Manager Cisco

Managed Endpoint Defense

Cybersecurity 2016 Survey Summary Report of Survey Results

KNOWLEDGE GAPS: AI AND MACHINE LEARNING IN CYBERSECURITY. Perspectives from U.S. and Japanese IT Professionals

U.S. State of Cybercrime

Never a dull moment. Media Conference «Clarity on Cyber Security» 24 May 2016

Best wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR

CYBER RESILIENCE & INCIDENT RESPONSE

Sage Data Security Services Directory

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

Background FAST FACTS

Altitude Software. Data Protection Heading 2018

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

RSA NetWitness Suite Respond in Minutes, Not Months

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

Eliminating the Blind Spot: Rapidly Detect and Respond to the Advanced and Evasive Threat

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

to Enhance Your Cyber Security Needs

INFINIT Y TOTAL PROTECTION

34% DOING MORE WITH LESS How Red Hat Enterprise Linux shrinks total cost of ownership (TCO) compared to Windows. I n a study measuring

Nebraska CERT Conference

State of Cloud Survey GERMANY FINDINGS

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Modern Compute Is The Foundation For Your IT Transformation

CRITICAL INFRASTRUCTURE AND CYBER THREAT CRITICAL INFRASTRUCTURE AND CYBER THREAT

Cyber Resilience. Think18. Felicity March IBM Corporation

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

CTI in Security Operations:

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

Reducing the Cost of Incident Response

THE IMPLICATIONS OF PERFORMANCE, SECURITY, AND RESOURCE CONSTRAINTS IN DIGITAL TRANSFORMATION

An Aflac Case Study: Moving a Security Program from Defense to Offense

Cyber Insurance: What is your bank doing to manage risk? presented by

2017 Trends in Security Metrics and Security Assurance Measurement Report A Survey of IT Security Professionals

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals

Security-as-a-Service: The Future of Security Management

Digital Forensics - Global Market Outlook ( )

Ransomware A case study of the impact, recovery and remediation events

Cybersecurity and the Board of Directors

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

2017 RIMS CYBER SURVEY

Cyber Attack: Is Your Business at Risk?

Gujarat Forensic Sciences University

ForeScout ControlFabric TM Architecture

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

INTEGRATION BRIEF DFLabs and Jira: Streamline Incident Management and Issue Tracking.

Trends in Mobile Forensics from Cellebrite

DIGITAL TRUST Making digital work by making digital secure

CYBER SECURITY TAILORED FOR BUSINESS SUCCESS

ForeScout Extended Module for Splunk

SIEM: Five Requirements that Solve the Bigger Business Issues

RSA Cybersecurity Poverty Index : APJ

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Transcription:

ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018

INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and Security professionals worldwide. Check Point Software s latest worldwide survey research aims to shed light into these concerns and means for overcoming them by asking IT and Security professionals to walk us through their security posture pre and post cyber-attacks. The survey was conducted among 443 IT and Security professionals worldwide during January-February of 2018. EXECUTIVE SUMMARY The primary barriers IT and security professionals declare as standing between their organization and high level cyber security effectiveness are: Staffing challenges (mentioned by 70% of IT and Security professionals), security conflict with business or user experience (56%), and outdated security infrastructure (50%). In staffing issues security professionals are referring to low numbers of cyber security staff as well as lack of staff knowledge needed to fight 2018 cyber-crime. When it comes to outdated security, security professionals are mentioning outdated security architecture as well as controls. 96% of organizations use various pre-attack preparation tactics. Three main activities mentioned by Security professionals are timely patching (53%), search for attack trends (45%), and end-user security campaigns inside the organization (44%). Nonetheless, security professionals still do not feel prepared enough, rating their organizations as only moderately prepared for cyber-attacks (3.56 on a 1-5 readiness scale). 41% of organizations faced at least one cyber-attack during 2017, with an average of 56 attacks per organization per year. 67% of IT and Security professionals claim their organizations customers are inquiring which measures they are taking to protect their data. This places IT Security professionals and cyber security strategy at an important fork of business junction. We predict this requirement will continue to grow once GDPR commences in May 2018. 2018 Check Point Software Technologies Ltd. All rights reserved P. 2

HOW CAN IT AND SECURITY PROFESSIONALS BETTER PROTECT THEIR ORGANIZATIONS? Our survey reveals barriers for higher level security cited by IT and Security professionals are merely the ones they are aware of. The key lies in cyber security precautions security professionals are unaware of: Prevention vs. detection mode, disparate point products vs. consolidated cyber security, and generation of security. Prevention (block attacks when detected) vs. Detection security modes (generate an alert indicating a breach was detected, without blocking it): Organizations who implement their security in detection mode faced 79% more cyber-attacks than organizations who implement their security in prevention mode (52 attacks in detection mode vs. 29 in prevention mode on average per year). Those who use mainly detection mode also experienced 27% more staffing challenges, in comparison to organizations who implement their security in detection mode. Average Number of Cyber Security Attacks in the Past Year by Usage of Prevention/Detection Modes 93 29 52 MOSTLY PREVENTION MODE MOSTLY DETECTION MODE BOTH EQUALLY Consolidated security (use a primary vendor for most security solutions) vs. disparate point products (aka point solution ) security strategy: Organizations who apply disparate point products security strategy faced 37% more cyber-attacks than companies applying a consolidated security posture (70 vs. 51 attacks on average per year). Average Number of Cyber Security Attacks in the Past Year by Security Strategy in Organization 70 51 DISPARATE POINT PRODUCTS CONSOLIDATION 2018 Check Point Software Technologies Ltd. All rights reserved P. 3

Generations of cyber security: Our survey reveals outdated security is even more of a challenge than security professionals are aware of. When asked which cyber security solutions are used in their companies, one-fifth of organizations (21%) claim to use advanced threat prevention capabilities (aka Gen 4 cyber security). Only 3% are using threat prevention capabilities in prevention mode, and adding a layer of cloud and mobile security (aka Gen 5 cyber security). The rest are placing their organizations at risk for Generation 5 multi vector and mega-attacks. Cyber Security Generations Analysis 82% 95% 97% 21% 3% GEN 1: AV ONLY GEN 2: FW+AV GEN 3: FW+AV+IPS GEN 4: ALL+SANDBOXING+ ANTI BOT GEN 5: ALL+ SANDBOXING IN PREVENTION MODE+MOBILE+CLOUD RECOMMENDATION The combination of security implementation in prevention mode as well as consolidated security strategy achieves the highest levels of security that is required against Gen 5 cyber-attacks. For deeper analysis: See survey results detailed findings on pages 5-15. 2018 Check Point Software Technologies Ltd. All rights reserved P. 4

Detailed Findings PERCEIVED OBSTACLES IN ACHIEVING HIGH SECURITY LEVELS The main barriers IT and security professionals perceive as standing between their organization and high level cyber security effectiveness are: staffing challenges, security conflict with business, and outdated security infrastructure. Cyber security teams strive for better and more effective security in their companies. Nonetheless, they report a wide range of obstacles in the way of achieving these goals. Most prominent obstacles mentioned are insufficient number of security staff (mentioned by 49% of IT and Security professionals), careless or unaware employees (47%) and security staff lacking the knowledge needed (44%). When aggregating obstacles categories, the three categories that rise as the most influential perceived obstacles are staffing challenges (70% of IT and Security professionals), security conflict with business (56%) and outdated security infrastructure (50%). Staffing issues were mentioned more by the industrial vertical organizations. Companies from the healthcare industry mentioned security conflict with business and outdated security more than others. Aggregated Challenges for Reaching High Cyber Security Levels OVERALL STAFFING CHALLENGES 70% OVERALL SECURITY CONFLICT WITH BUSINESS 56% OVERALL OUTDATED SECURITY INFRASTRUCTURE 50% CARELESS OR UNAWARE EMPLOYEES 47% SUPPORTING TOO MANY SECURITY VENDORS (MULTI-VENDOR APPROACH) 36% 0% 10% 20% 30% 40% 50% 60% 70% 80% 2018 Check Point Software Technologies Ltd. All rights reserved P. 5

Obstacles Organizations Face When Trying to Achieve High Levels of Cyber Security Protection NOT ENOUGH CYBER SECURITY RESOURCES/STAFF CARELESS OR UNAWARE EMPLOYEES CYBER SECURITY STAFF LACKING THE KNOWLEDGE NEEDED FOR FIGHTING TODAY S SECURITY CONFLICT WITH BUSINESS NEEDS OUTDATED SECURITY ARCHITECTURE SECURITY CONFLICT WITH USER EXPERIENCE SUPPORTING TOO MANY SECURITY VENDORS (MULTI-VENDOR APPROACH) 49% 47% 44% 40% 39% 37% 36% OUTDATED SECURITY CONTROL 29% 0% 10% 20% 30% 40% 50% 60% Staffing issue: less of a challenge among companies using prevention mode and security consolidation strategy The most prominent obstacle mentioned is the staffing challenge: quality and quantity of cyber security staff. This challenge is mentioned 27% more by organizations that implement detection mode vs. prevention mode. In addition, staffing challenges are mentioned 10% more by those applying a disparate security vendor s strategy (point solution) vs. a security consolidation strategy. Staffing Challenges by Prevention/ Detection Mode Usage Staffing Challenges by Consolidation vs. Disparate Strategy 62% 79% 72% 74% 67% MOSTLY PREVENTION MODE MOSTLY DETECTION MODE BOTH EQUALLY DISPARATE POINT PRODUCTS CONSOLIDATION 2018 Check Point Software Technologies Ltd. All rights reserved P. 6

PRE-ATTACK PREPARATIONS In preparation for a cyber-security attack, 96% of organizations use various tactics Main data or actions applied in pre-attack preparations scenarios are: 53% of organizations conduct timely patching, 45% consume cyber-attacks trend articles, and 44% conduct end user security awareness campaigns. An additional 41% have risk assessment teams in-house. Timely patching is conducted more in the financial, manufacturing and government industries (67%). Only 23% have a pre-defined attack recovery playbook (slightly more among European companies, 28%). What data does your organization use to prepare against a cyber attack? CONDUCT TIMELY PATCHING 53% SEARCH FOR BEST PRACTICES/ TREND ARTICLES ON RECENT CYBER-ATTACKS CONDUCT END USER SECURITY AWARENESS CAMPAIGNS HAVE A RISK ASSESSMENT TEAM IN-HOUSE USE THIRD PARTY CYBER THREAT INTELLIGENCE INFORMATION CONDUCT PERIODIC END USER SECURITY TRAINING 45% 44% 41% 39% 38% USE INTERNAL CYBER THREAT INTELLIGENCE INFORMATION WE USE CHECK POINT S THREATCLOUD INFORMATION CONDUCT WHITE ATTACKING SIMULATION INSIDE ORGANIZATION WE HAVE A PRE-DEFINED ATTACK RECOVERY RESPONSE PLAN/ PLAYBOOK 30% 27% 23% 23% WE DO NOT USE ANY ATTACK PREPARATION DATA OTHER 4% 2% 0% 10% 20% 30% 40% 50% 60% 2018 Check Point Software Technologies Ltd. All rights reserved P. 7

Although taking various precautions, only mediocre perception of pre-attack readiness. IT and Security professionals were asked to rate their perception of pre-attack preparation readiness in their organization on a scale from 1-5 (1 being very poor to 5 excellent). Overall, perception of pre-attack preparation level among IT and Security professionals is mediocre and stands at an average of 3.56. 67% of IT and Security professionals claim their organizations customers are inquiring which measures they are taking to protect their data. This places IT and Security professionals and cyber security strategy at an important fork of business junction. Do your customers inquire about what measures your organization is taking to protect their data? 12% 3% 18% Yes No 67% Don t know No answer 2018 Check Point Software Technologies Ltd. All rights reserved P. 8

CURRENT STATE OF CYBER SECURITY IN ORGANIZATIONS Only 3% of organizations are currently at Gen 5 Cyber Security Level. IT and Security professionals in the survey were asked which cyber security solutions they use in their environment and what cyber security strategy is applied in their organization. As a first and very important layer, our survey shows that Firewall, Antivirus and IPS are used by 97% of organizations (Generation 3 of cyber security solutions). 21% of those organizations also add additional layers of sandboxing and Anti-bot technology (Generation 4 of cyber security). Only 3% of organizations add a layer of cloud security, mobile security and implement security technologies in prevention mode (block attacks when detected), as opposed to detection mode (generate an alert indicating a breach was detected, without blocking it). These 3% are securing their organizations at the highest level currently found- Generation 5 of security. Cyber Security Generations Analysis 82% 95% 97% 21% GEN 1: AV ONLY GEN 2: FW+AV GEN 3: FW+AV+IPS GEN 4: ALL+SANDBOXING+ ANTI BOT 3% GEN 5: ALL+ SANDBOXING IN PREVENTION MODE+MOBILE+CLOUD When it comes to security strategy of implementing many disparate point security products vs. a single consolidated solution, organization are almost evenly split (44-45% each). Which of the following security strategies is preferred by your organization? 11% 45% 44% Disparate point security products (point solution) Consolidation by using a primary vendor for most security solutions I don't know 2018 Check Point Software Technologies Ltd. All rights reserved P. 9

D DAY ATTACK DATA 41% of IT and Security professionals report their organization faced a cyber-security attack in the past year. Reported attack rates are significantly higher among large enterprises of 5000 employees and above (51%). In the past year, did your organization face cyber attacks? By company size 0 1% 1% 13% 12% 17% 55% 51% 30% 32% 36% 51% SMB MID-SIZED ENTERPRISE LARGE ENTERPRISE Yes No Don t know No answer Companies that use disparate point security solutions strategy (aka point solution ) faced 33% more cyber-attacks. A comparison between organizations security strategies reveals that 48% of companies that hold a disparate point products security strategy (also known as point solution) faced a cyber-attack in the past year, vs. 36% of companies that hold a security consolidation strategy. In the past year, did your organization face cyber attacks? 0 14% 14% 38% 50% 48% DISPARATE POINT PRODUCTS 36% CONSOLIDATION Yes No Don t know No answer How many? 56 cyber-attacks on average per company. Security professionals that reported facing cyber-security attacks in the past year were asked to specify the number of attacks they faced in the past year. On average, 56 attacks were reported. Higher attack numbers were reported by large enterprises (100 attacks on average per year) and manufacturing industry companies (103 attacks on average per year). 2018 Check Point Software Technologies Ltd. All rights reserved P. 10

Significant differences in number of attacks by security policy Additional survey data analysis reveals significant differences in number of attacks by cyber security approaches. First, when examining number of cyber-attacks by prevention or detection modes used in company- companies using mostly detection mode faced 79% more attacks on average than companies implementing their security solutions in prevention mode (52 vs. 29 cyber-attacks per year in accordance). Second, organizations that hold a disparate point security solutions policy (aka point solution) experience 37% more cyber security attacks on average than companies holding a security solutions consolidation strategy (70 vs. 51 cyber-attacks per year in accordance). Average Number of Cyber Security Attacks In the Past Year by Usage of Prevention/ Detection Modes Average Number of Cyber Security Attacks In the Past Year by Security Strategy in Organization 52 93 70 51 29 MOSTLY PREVENTION MODE MOSTLY DETECTION MODE BOTH EQUALLY DISPARATE POINT PRODUCTS CONSOLIDATION 2018 Check Point Software Technologies Ltd. All rights reserved P. 11

POST-ATTACK BEHAVIOR IN ORGANIZATIONS Organizations that faced a cyber-attack in the past year report conducting a wide range of reactive activities mainly: enforcing new rules to avoid future attacks (52%), forensic analysis (52%) and/ or shut down devices suspected to be infected (49%). What actions did your organization take to react, remediate and recover from the attack/s? ENFORCED NEW RULES TO AVOID FUTURE ATTACK FORENSIC ANALYSIS SHUT DOWN DEVICES SUSPECTED TO BE INFECTED 49% 52% 52% USED THE INTERNAL INCIDENCE RESPONSE TEAM SERVICES CONDUCT POST EVENT GAP ANALYSIS ON EXPOSED PARTS ESTIMATE THE SCOPE OF DAMAGE SHUT DOWN PARTS OF THE NETWORK SUSPECTED TO BE INFECTED TURNED TO OUR SOC (SECURITY OPERATION CENTER) DEPARTMENT APPLIED THE PLAN/ PLAYBOOK WE HAVE FOR POST ATTACKS TURNED TO OUR INTERNAL HELPDESK DEPARTMENT USED THIRD PARTY INCIDENCE RESPONSE SERVICES 42% 37% 36% 31% 30% 24% 20% 19% OTHER 3% 0% 10% 20% 30% 40% 50% 60% Although taking various precautions, only mediocre perception of post-attack readiness (similar to pre-attack readiness). IT and Security professionals were asked to rate their overall perception of post-attack remediation readiness in their organization on a 1-5 scale (1 being very poor to 5 being excellent). Similar to pre-attack readiness perception, Security professionals perceive their organizations to be only moderately ready in post-attack remediation circumstances, with an average rate of 3.65 on a1-5 readiness scale. 2018 Check Point Software Technologies Ltd. All rights reserved P. 12

SURVEY METHODOLOGY AND PARTICIPANTS DEMOGRAPHICS Check Point customers and Channels were invited to take part in an online survey during CPX360, Check Point s worldwide annual cyber security conference conducted in Europe, North America and Asia. A total of 443 Security professionals answered survey. All respondents have IT security responsibility. The survey was conducted during January and February 2018. Company Size 28% 9% 14% 34% 15% Less than 500 employees 500-1,000 employees 1,000-5,000 employees 10,000-5,000 employees More than 10,000 employees Job Function SECURITY OR FIREWALL ADMINISTRATOR OR MANAGER 23% CIO/ CTO/ OTHER SECURITY OR IT EXECUTIVE 16% BOTH NETWORK AND SECURITY ADMINISTRATOR OR MANAGER IT/ IS/ MIS ADMINISTRATOR OR MANAGER 12% 12% SECURITY ANALYST NETWORK ADMINISTRATOR OR MANAGER 8% 9% DESKTOP ADMINISTRATOR OR MANAGER 1% OTHER 14% NO ANSWER 5% 0% 5% 10% 15% 20% 25% 2018 Check Point Software Technologies Ltd. All rights reserved P. 13

Industry VAR/RESELLER 17% FINANCE/ ACCOUNTING/ BANKING/ INVESTMENT 13% DISTRIBUTOR 11% GOVERNMENT/ MILITARY 8% MANUFACTURING APPLICATION SOFTWARE ISP COMPUTER HARDWARE TRANSPORTATION OTHER MSP HEALTHCARE/ PHARMACEUTICAL TELCO MSP LEISURE/ HOSPITALITY RETAIL AND WHOLESALE TELCO MOBILE/ LAND-LINE INSURANCE LEGAL EDUCATION ADVERTISING/ MEDIA UTILITIES/ INFRASTRUCTURE (ELECTRICAL, WATER, CHEMICAL/ REFINERY OTHER 5% 5% 5% 4% 4% 3% 3% 2% 2% 2% 2% 2% 2% 1% 1% 1% 1% 4% 0% 2% 4% 6% 8% 10% 12% 14% 16% 18% About Check Point Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers a multilevel security architecture that defends enterprises cloud, network and mobile device held information, plus the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes. Follow Check Point via: Twitter: http://www.twitter.com/checkpointsw Facebook: https://www.facebook.com/checkpointsoftware Blog: http://blog.checkpoint.com YouTube: http://www.youtube.com/user/cpglobal LinkedIn: https://www.linkedin.com/company/check-point-software-technologies 2018 Check Point Software Technologies Ltd. All rights reserved P. 14