SHARE
Facebook X Pinterest WhatsApp

Check Point Acquires Hyperwise to Bolster IT Security at CPU Level

Five Cyber Attacks that Made CISOs Rethink Security Check Point Software Technologies this week moved to shore up its ability to combat advanced forms of malware via the acquisition of Hyperwise, a startup vendor that has developed a method for identifying threats at the processor level. Alon Kantor, vice president of business development for Check […]

Written By
MV
Mike Vizard
Feb 20, 2015
Slide Show

Five Cyber Attacks that Made CISOs Rethink Security

Check Point Software Technologies this week moved to shore up its ability to combat advanced forms of malware via the acquisition of Hyperwise, a startup vendor that has developed a method for identifying threats at the processor level.

Alon Kantor, vice president of business development for Check Point Software, says this capability should prove critical because at that stage, the number of vectors that malware can exploit is fairly limited. It’s only when malware moves beyond the processor that the number of exploits starts to multiply and then the complexity of using other forms of threat prevention software becomes overwhelming.

Because the Hyperwise software works at the CPU level, the malware doesn’t get a chance to employ some of the advanced evasion techniques that hackers have used to avoid other forms of malware detection software, says Kantor.

Security

Check Point plans to add support for the Hyperwise threat detection software across its entire product line in fairly short order, which should make the software a standard part of the layers of security that it currently provides between the endpoint and the network perimeter.

There’s no doubt that the attacks being launched by hackers have become more sophisticated. And while there may never be perfect security, advances in providing IT security appear to be getting more sophisticated as well.

MV

Michael Vizard is a seasoned IT journalist, with nearly 30 years of experience writing and editing about enterprise IT issues. He is a contributor to publications including Programmableweb, IT Business Edge, CIOinsight and UBM Tech. He formerly was editorial director for Ziff-Davis Enterprise, where he launched the company’s custom content division, and has also served as editor in chief for CRN and InfoWorld. He also has held editorial positions at PC Week, Computerworld and Digital Review.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.