The following is external content provided as a free resource for blog readers.
|Organizations today are facing unprecedented growth in the diversity and number of security threats from advanced and sophisticated malware. New attack types combine known and unknown threats to exploit “unknown” vulnerabilities. Attackers are also hiding malware inside documents, websites, hosts and networks. These attacks have many purposes such as financial and ideological motives. They focus on stealing data, sabotaging business continuity, or damaging a company's reputation.|
This report describes Check Point testing methodology for catching malware and compares Check Point products with other competing solutions. The goal of the test is to provide the catch rate performance amongst various market offerings.