005
CHECK POINT 2013 SECURITY REPORT
01
_ INTRODUCTION AND METHODOLOGY
to detect a variety of security threats such as high risk
applications, intrusions attempts, viruses and bots, sensitive
data loss etc. The network traffic was monitored in real
time by implementing the Check Point Security Gateway
inline or in monitor (tap) mode.
On average, each organization’s network traffic was
monitored for 134 hours. The companies in our research
are from a wide range of industries and located worldwide
as shown in chart 1-A and 1-B.
In addition, over 111.7 Million events from 1,494 Security
Gateways were analyzed using data generated by Check
Point’s ThreatCloud™. ThreatCloud is a massive security
database updated in real time and populated with data
from a large network of global sensors, strategically placed
around the globe, that gather information on threats and
malware attacks. ThreatCloud enables identification of
emerging global security trends and threats, creating a
collaborative network to fight cybercrime. In our research
we analyzed data from ThreatCloud that was gathered in a
3-month period between August and October, 2012.
Reference for threat data was gathered from Check Point’s
SensorNet™ sensor network for the period of July 1
st
through September 30
st
, 2012. Check Point SensorNet is
a worldwide distributed network of sensors which provide
security information and traffic statistics to a central
analysis system. This data is analyzed to detect trends and
anomalies, and to build a real time view of security around
the world.
Finally, meta-analysis of 628 endpoint security reports in
a variety of organizations. The security analysis included
scanning of each host validating data loss risks, intrusion
risks and malware risks. The analysis was done with Check
Point Endpoint Security report tool checking whether
Anti-Virus is running on the host, Anti-Virus is up to date,
software are running latest versions and more. The tool is
free and publically available, it can be downloaded from
Check Point’s public website
4
.
This report is based on data gathered from these sources.
* APAC- Asia Pacific and Japan. EMEA- Europe, Middle East and Africa
26
%
Other
235
39
%
Industrial
346
14
%
Finance
128
10
%
Government
89
7
%
Telco
59
4%
Consulting
31
Industries
Geography
40
%
EMEA*
354
40
%
Americas
356
20
%
APAC*
178
Source: Check Point Software Technologies
Chart 1-A
ׁ
Industry Specification
Industrial – Chemical / Refinery, Healthcare,
Pharmaceutical, IT, Manufacturing , Transportation,
Utilities, Infrastructure.
Finance – Finance, Accounting , Banking , Investment.
Government – Government, Military.
Telco – Telco, Services Provider, ISP, MSP.
Consulting - Consulting Services
Other – Advertising / Media, Distributor, Education,
Legal, Leisure / hospitality, Retail and Wholesale,
Securities, Other.
1,2,3 5,6,7,8,9,10,11,12,13,14,...50