Breaking News

France's Iliad Confirms Interest in T-Mobile U.S.
Tweet TWEET

Check Point RSA Conference Sessions Zero In on Targeted Malware Attacks and Critical Infrastructure Security

Check Point RSA Conference Sessions Zero In on Targeted Malware Attacks and 
Critical Infrastructure Security 
Check Point Security Evangelist to Present on Tues., 2/26 and Check
Point Fellow, IPv6 Co-Founder to Present on Thurs. 2/28 
SAN CARLOS, CA -- (Marketwire) -- 02/21/13 --  Check Point(R)
Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in
securing the Internet, today announced their speaking sessions at RSA
Conference 2013. Check Point representatives Tomer Teller and Bob
Hinden will be presenting this year, focusing on advanced malware
detection and smart grid security, respectively.  
-------
 WHAT:  
"Detecting the 1%: Advanced Targeted Malware Detection" 
 The
meteoric rise of specialized, targeted malware can catch even the
most experienced security experts off guard. These super-stealthy
cyber-attacks can defeat the best anti-virus/anti-intrusion systems
in the world. This session provides an overview of existing defense
mechanisms, including how they can be defeated, and suggests new
techniques that can be used to detect and mitigate against advanced
threats. 
WHO: 
 Tomer Teller, Security Evangelist at Check Point  
WHEN: 
 Tuesday, February 26th, 3:50-4:50 PM 
WHERE: 
 Moscone Center, Room 124
 747 Howard Street, San Francisco,
CA 
-------
 WHAT: 
 "The Security Threat to Smart Grid is Worse than
We Think"
 The need to secure smart grid is obvious. After all, who
wants hackers to have the ability to easily turn off all power?
Recent malware like Stuxnet and Flame that target critical
infrastructures are good examples of the looming threat. The
challenge is to secure smart grid in a way that can keep up with
quickly evolving threats.  
WHO: 
 Bob Hinden, Co-Inventor of IPv6 and Check Point Fellow 
WHEN: 
 Thursday, February 28th, 1:40-2:00 PM 
WHERE: 
 Moscone Center, Room 135
  747 Howard Street, San Francisco,
CA  
"We've seen the potentially disastrous impact of attacks on the power
infrastructure in the past year," said Bob Hinden, co-inventor of
IPv6 and Check Point fellow. "In fact the Department of Homeland
Security Critical Infrastructure CERT shows that over 40% of reported
infrastructure attacks were against Energy related infrastructure.
The imperative to secure our smart grids fr
om cyber attacks is
clearer now than ever before." 
To learn more about how Check Point fights security threats, visit
our booth #1925 at RSA Conference the week of February 25, 2013 at
Moscone Center. 
Follow Check Point via:
 Twitter: www.twitter.com/checkpointsw 
Facebook: https://www.facebook.com/checkpointsoftware
 YouTube:
http://www.youtube.com/user/CPGlobal 
About RSA Conference
 RSA Conference helps drive the global
information security agenda with annual events in the U.S., Europe,
and China. Throughout its almost 22-year history, RSA Conference
consistently attracts the best and brightest in the field, creating
opportunities to learn about information security's most important
issues through face-to-face and online interactions with peers,
luminaries and emerging and established companies. As information
security professionals work to stay ahead of ever-changing security
threats and trends, they turn to RSA Conference for a 360-degree view
of the industry. RSA Conference seeks to arm participants with the
knowledge they need to remain at the forefront of the information
security business. More information on events, online programming and
the most up-to-date news pertaining to the information security
industry can be found at www.rsaconference.com. 
About Check Point Software Technologies Ltd. 
 Check Point Software
Technologies Ltd. (www.checkpoint.com), the worldwide leader in
securing the Internet, provides customers with uncompromised
protection against all types of threats, reduces security complexity
and lowers total cost of ownership. Check Point first pioneered the
industry with FireWall-1 and its patented stateful inspection
technology. Today, Check Point continues to develop new innovations
based on the Software Blade Architecture, providing customers with
flexible and simple solutions that can be fully customized to meet
the exact security needs of any organization. Check Point is the only
vendor to go beyond technology and define security as a business
process. Check Point 3D Security uniquely combines policy, people and
enforcement for greater protection of information assets and helps
organizations implement a blueprint for security that aligns with
business needs. Customers include tens of thousands of organizations
of all sizes, including all Fortune and Global 100 companies. Check
Point's award-winning ZoneAlarm solutions protect millions of
consumers from hackers, spyware and identity theft.  
Copyright2013 Check Point Software Technologies Ltd. All rights
reserved 
Media Contact 
Carly Listman 
Check Point Software Technologies 
+1 650.628.2326 
press@us.checkpoint.com  
Investor Contact
Kip E. Meintzer 
Check Point Software Technologies 
+1 650.628.2040
ir@us.checkpoint.com