Check Point Software’s Assessment reveals how Remote Work has created a Gap in Organizations' Security Practices
Check Point Software Technologies (NASDAQ: CHKP) reveals a survey of 1,200 IT security professionals indicating significant gaps in security practices for remote work. Only 9% implement all necessary protections against internet threats, and 11% utilize none of them. Key findings show 70% allow personal devices for corporate access, and 20% lack basic internet security measures. There's a pressing need for organizations to adopt comprehensive solutions like Check Point Harmony to protect remote employees from evolving cyber threats, with attacks increasing by 50% weekly.
- Check Point Harmony provides comprehensive security by consolidating five key security products for remote users.
- The survey highlights an opportunity for Check Point to promote its cybersecurity solutions to organizations with security gaps.
- Only 9% of organizations surveyed have implemented all recommended security measures for remote access.
- 70% allow access to corporate applications from personal devices, increasing vulnerability.
- A significant 26% lack endpoint solutions for ransomware protection.
New assessment shows that organizations have not implemented security solutions that ensure best-in-class connectivity and security for remote employees
SAN CARLOS, Calif., Feb. 02, 2022 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has released findings from a new assessment carried out amongst 1,200 IT security professionals globally, which examines how the shift to remote work changed organizations' security practices around users, devices, and access. As the threat landscape evolves and cyber-attacks become increasingly more sophisticated, many organizations have surprisingly not implemented security solutions that ensure best-in-class connectivity and security for remote employees.
The COVID-19 pandemic has forever changed the way in which we work, most companies have transitioned their entire workforce from on-premise to remote working. While a majority of organizations have fully adopted remote work as a way of life, security wise there are still many gaps that need to be bridged. Organizations are challenged with finding a balance between remote users’ productivity and ensuring device, access and corporate assets security. According to Check Point Software’s best practices there are five critical security solutions needed to protect remote users against internet based attacks, which include URL filtering, URL reputation, content disarm & reconstruction (CDR), zero phishing and credentials protection. However, only
Key findings from globally are:
- The remote-access security gap:
70% of organizations allow access to corporate applications from personal devices, such as unmanaged devices or bring your own device (BYOD). Only5% of respondents reported they use all of the recommended remote access security methods. - The need for internet access security:
20% of respondents reported that they do not use any of the five methods mentioned to protect remote users while browsing the internet, and only9% use all five methods to protect against internet-based attacks. - A lack of protection against ransomware:
26% of respondents do not have an endpoint solution that can automatically detect and stop ransomware attacks. Thirty-one percent do not use any of the mentioned methods to prevent sensitive business data from leaking outside the organization. - Email and Mobile Security: Only
12% of organizations that allow corporate access from mobile devices use a mobile threat defense solution. This highlights how exposed organizations are too fast moving, 5th generation cyber-attacks that target remote workers.
“While many companies have embraced the new hybrid and remote work models, they have not adopted all of the critical solutions needed to secure their remote workforce. This survey confirmed that organizations have a gap when it comes to users, devices, and access security,” said Itai Greenberg, Vice President of Product Management at Check Point Software Technologies. “To bridge this gap, organizations should progress to a Secure Access Service Edge (SASE) architecture. SASE security models provide quick and simple access to corporate applications, for any user and from any device, and protect remote employees from all internet-based threats.”
Overall in 2021, researchers have seen
For more information about Check Point Harmony, visit: https://www.checkpoint.com/harmony/
For more information on the survey findings, download the full 2022 Workforce Security Report.
Follow Check Point Software via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to corporate enterprises and governments globally. Check Point Infinity´s portfolio of solutions protects enterprises and public organizations from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises three core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management. Check Point protects over 100,000 organizations of all sizes.
MEDIA CONTACT: | INVESTOR CONTACT: | |
Ekram Ahmed | Kip E. Meintzer | |
Check Point Software Technologies | Check Point Software Technologies | |
+1 415.299.7767 | +1 650.628.2040 | |
press@us.checkpoint.com | ir@us.checkpoint.com |
FAQ
What does the latest Check Point Software assessment reveal about remote work security?
What are the key findings from Check Point Software's survey on remote work security?
How has the COVID-19 pandemic affected organizational security practices?
What cybersecurity solutions does Check Point recommend for remote employees?