Check Point Acquires Threat Prevention Security Company Hyperwise for $80m

Check Point are really making their mark this year.

Check Point are really making their mark this year.

Check_Point-Hyperwise

Check Point are really making their mark this year. With the new Stars Partner Program in full swing and a successful sales kick off (SKO2015) globally. They’ve now acquired an excellent security start-up in Israel called Hyperwise.

Check Point acquired Hyperwise to deliver the Industry’s first CPU Level Threat Prevention Capabilities.

The acquisition of Stealth-Mode Start-up enhances the Check Point Threat Prevention portfolio to stop attacks before they happen.

Here’s the full press release on the Check Point’s website  or you can read it here:

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the largest pure-play security vendor globally, today announced the acquisition of Hyperwise. Hyperwise is a privately held, early-stage company that has developed a unique and cutting-edge CPU-level threat prevention engine that eliminates threats at the point of pre-infection. The unrivalled exploit prevention technology provides a higher catch rate of threats and provides organisations an unmatched level of protection against attackers.

Current approaches to threat prevention have traditionally focused on detecting and blocking malware only after the malware is already active, resulting in an unaddressed threat gap in the earlier phases of attack. With the acquisition of Hyperwise’s advanced technology, Check Point will now address this gap by enabling the detection of threats at the pre-infection stage. The integration of CPU level Threat Prevention will block previously undetected attacks and should increase Check Point’s industry-leading Threat Emulation malware catch rates.

Hyperwise is a stealth-mode private company started in 2013 and is headquartered in Tel Aviv, Israel. The acquisition of Hyperwise will bring advanced technology and a highly skilled team of industry-leading engineers to Check Point. The Hyperwise founders and team will immediately be integrated into Check Point’s operations, and the technology will be integrated into the existing Check Point Threat Emulation portfolio. The transaction is not expected to have a material effect on financial results. Terms of the deal were not disclosed.

 “Security technology innovation needs to outpace threat innovation,” said Gil Shwed, CEO and Chairman of Check Point Software Technologies. “The acquisition of Hyperwise brings important technology and deep expertise that will extend Check Point’s threat prevention leadership. As we integrate the next generation OS and CPU level threat protection into our Threat Emulation offering, Check Point bolsters customers’ cyber defense strategies to identify and stop the broadest range of attacks at the first point of contact.“

Firewalls

We treat the business of network security very seriously indeed. We're experts in this field and along with security vendors like Check Point, we view security as a business process which requires significant consideration and investment (if the scope so requires). We can provide you with world-class firewall products, all of which are next generation. Since we’re not a ‘one size fits all’ IT consultancy, we ensure that the firewall product we recommend meets the exact network security needs of your business.

Network Security Recommendations

Liaising with our network security vendors, we discuss your network's vulnerabilities and compile a report which includes observations from our site assessment, as well as a set of recommendations specificially designed to protect your network going forward.

IT Equipment Removal

Our office move team will dovetail all activity with your own plans - ensuring that your network is running right up to the last minute; providing interim network services wherever possible. We ensure that all works are carried out efficiently and painlessly - stripping all reusable network equipment before reinstalling it in your new space. We believe in equipment sustainability wherever possible. As such, we carefully consider what equipment is still fit for purpose within your new network environment - managing the heavy lifting element to this part of the office move process.

Implementation and Support

Once our recommendations are approved, we apply tried & tested network security processes to migrating and installing your new protection plan. We provide training and support in all relevant areas if necessary.