Check Point Acquires Threat Prevention Security Company Hyperwise for $80m

Check Point are really making their mark this year.

Check Point are really making their mark this year.

Check_Point-Hyperwise

Check Point are really making their mark this year. With the new Stars Partner Program in full swing and a successful sales kick off (SKO2015) globally. They’ve now acquired an excellent security start-up in Israel called Hyperwise.

Check Point acquired Hyperwise to deliver the Industry’s first CPU Level Threat Prevention Capabilities.

The acquisition of Stealth-Mode Start-up enhances the Check Point Threat Prevention portfolio to stop attacks before they happen.

Here’s the full press release on the Check Point’s website  or you can read it here:

Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the largest pure-play security vendor globally, today announced the acquisition of Hyperwise. Hyperwise is a privately held, early-stage company that has developed a unique and cutting-edge CPU-level threat prevention engine that eliminates threats at the point of pre-infection. The unrivalled exploit prevention technology provides a higher catch rate of threats and provides organisations an unmatched level of protection against attackers.

Current approaches to threat prevention have traditionally focused on detecting and blocking malware only after the malware is already active, resulting in an unaddressed threat gap in the earlier phases of attack. With the acquisition of Hyperwise’s advanced technology, Check Point will now address this gap by enabling the detection of threats at the pre-infection stage. The integration of CPU level Threat Prevention will block previously undetected attacks and should increase Check Point’s industry-leading Threat Emulation malware catch rates.

Hyperwise is a stealth-mode private company started in 2013 and is headquartered in Tel Aviv, Israel. The acquisition of Hyperwise will bring advanced technology and a highly skilled team of industry-leading engineers to Check Point. The Hyperwise founders and team will immediately be integrated into Check Point’s operations, and the technology will be integrated into the existing Check Point Threat Emulation portfolio. The transaction is not expected to have a material effect on financial results. Terms of the deal were not disclosed.

 “Security technology innovation needs to outpace threat innovation,” said Gil Shwed, CEO and Chairman of Check Point Software Technologies. “The acquisition of Hyperwise brings important technology and deep expertise that will extend Check Point’s threat prevention leadership. As we integrate the next generation OS and CPU level threat protection into our Threat Emulation offering, Check Point bolsters customers’ cyber defense strategies to identify and stop the broadest range of attacks at the first point of contact.“

Web Applications

Our partner, Incapsula, provide a PCI-certified Web Application Firewall (WAF) product that ensures your website or application is protected from attacks. This solution is cost-effective and can be set up in no time at all. If you’d like more information or a free trial, simply get in touch using our contact form

Managed Voice

Need telephony that fits with your business? We have years of experience in delivering both Cisco and Mitel telephony - from small offices to corporate call manager solutions. If you don’t need on-premise telephone, we also provide virtual hosted telephony.

Site Visit and Audit

From the early planning stages of your office move, we can design the very best network and IT system available for your new space. We begin by auditing your current infrastructure - ascertaining any aspirations for improvement. We then visit your new site before you’ve even moved in. That way, your new network and IT system will be designed collaboratively - optimised for the needs of your growing business.

Protection and Management

The scoping document includes a breakdown of circuits such as DSL, EFM and leased line. A full breakdown of costs is included as well as an SLA covering each area. Importantly, we also highlight any potential limitations caused by bandwidth and/or QoS.