Check Point 2013 Security Report - page 4

005
CHECK POINT 2013 SECURITY REPORT
01
_ INTRODUCTION AND METHODOLOGY
sensitive data loss, etc. The network traffic was monitored
in real time by implementing the Check Point Security
Gateway inline or in monitor (i.e. tap) mode.
On average, each organization’s network traffic was
monitored for 134 hours. The companies in our research
reflected a wide range of industries located globally as
depicted in Chart 1-A.
In addition, over 111.7 million events from 1,494 Security
Gateways were analyzed using data generated by Check
Point’s ThreatCloud™. ThreatCloud™ is a massive security
database updated in real time and populated with data
collected froma large networkof global sensors, strategically
placed around the globe. ThreatCloud™ gathers threat and
malware attack information and enables identification
of emerging global security trends and threats, creating
a collaborative network to fight cybercrime. For our
research, ThreatCloud™ data gathered over a 3-month
period between August and October 2012 was pooled and
analyzed.
Reference for threat data was gathered from Check
Point’s SensorNet™ for the period between July 1
st
and
September 30
st
, 2012. Check Point SensorNet™ is a
worldwide distributed network of sensors which provide
security information and traffic statistics to a central
analysis system. This data is analyzed to detect trends
and anomalies, and to provide global security status
monitoring in real time.
Finally, a meta-analysis of 628 endpoint security reports
in a variety of organizations was conducted. This security
analysis scanned each host to validate data loss risks,
intrusion risks and malware risks. The analysis was done
with Check Point Endpoint Security report tool which
checks whether an anti-virus was running on the host, if the
anti-virus was up-to-date, was the software running on the
latest version, and more. This tool is free and is publically
available. It can be downloaded from Check Point’s public
website
4
.
This report is based on data gathered from these sources.
* APAC- Asia Pacific and Japan. EMEA- Europe, Middle East and Africa
26
%
Other
235
39
%
Industrial
346
14
%
Finance
128
10
%
Government
89
7
%
Telco
59
4%
Consulting
31
Industries
Geography
40
%
EMEA*
354
40
%
Americas
356
20
%
APAC*
178
Source: Check Point Software Technologies
Chart 1-A
ׁ
Industry Specification
Industrial: Chemical/Refinery, Healthcare,
Pharmaceutical, IT, Manufacturing , Transportation,
Utilities, Infrastructure.
Finance: Finance, Accounting , Banking , Investment.
Government: Government, Military.
Telco: Telco, Services Provider, ISP, MSP.
Consulting : Consulting Services
Other: Advertising/Media, Distributor, Education,
Legal, Leisure/Hospitality, Retail and Wholesale,
Securities, Other
1,2,3 5,6,7,8,9,10,11,12,13,14,...50
Powered by FlippingBook