CHKP Check Point Software Technologies Ltd.

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report

Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour

REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience.

As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can’t keep up. According to the report, 65% of organizations experienced a cloud-related security incident in the past year—up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments.

“Security teams are chasing an ever-moving target,” said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. “As cloud environments grow more complex and AI-driven threats evolve, organizations can’t afford to be stuck with fragmented tools and legacy approaches. It’s time to shift toward unified, intelligent, and automated defenses designed for the realities of today’s decentralized world.”

Key findings from the 2025 Cloud Security Report include:

  • Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can’t keep up with these distributed infrastructures

  • Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access
  • Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts
  • Application Security Lags Behind: 61% still rely on outdated, signature-based (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats
  • AI is a Priority — but Defenders Aren’t Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap
  • Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments
  • Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection
  • Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots

To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging and the , organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider.

Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, “cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.”

To access the full report and receive actionable CISO advice for safeguarding against the cloud-related issues discussed, please visit our and read our .

About the Survey:

The 2025 Cloud Security Report, carried out by Cybersecurity Insiders in the beginning of 2025, gathered insights from 937 cyber security professionals across North America, Europe, Asia-Pacific, and other regions. Respondents included CISOs, cloud architects, security analysts, and IT leaders responsible for securing hybrid, multi-cloud, and SaaS environments. The study focused on how businesses using cloud services tackle security issues and highlight advancements, like artificial intelligence, emphasizing the complexity of modern cloud security.

Follow Check Point via:

LinkedIn:

Twitter: 

Facebook: 

Blog:

YouTube: 

​​​About Check Point Software Technologies Ltd.   

Check Point Software Technologies Ltd. () is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers.

Legal Notice Regarding Forward-Looking Statements   

This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

MEDIA CONTACT: INVESTOR CONTACT:
Ana PerezKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies


EN
05/06/2025

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

Anish Jog ... (+4)
  • Anish Jog
  • Daniel Ives
  • Sam Brandeis
  • Steven Wahrhaftig

Delivers Mixed Results With Some Choppiness; Bullish Thesis Unchanged

A Closer Look at FY2Q25 (June) ResultsRevenueTotal revenue of $665.2 million (up 6% y/y) was in line with the company’s guidance range of $642.0 million and $682.0 million and slightly above the Street’s $661.7 million estimate driven by a strong quarter for product revenues.Security Subscription s

 PRESS RELEASE

Check Point Software Leads Email Security Rankings in 2025 GigaOm Rada...

Check Point Software Leads Email Security Rankings in 2025 GigaOm Radar Anti-Phishing Report Check Point stands out for its advanced phishing and malware prevention capabilities, driven by innovations like Infinity AI Copilot and a forward-looking security roadmap REDWOOD CITY, Calif. , July 30, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced that it has been recognized as a Leader and Outperformer for its security solution in GigaOm’s latest report. According to GigaOm, Check Point has been recognized for its ability ...

 PRESS RELEASE

Check Point Software Reports 2025 Second Quarter Financial Results

Check Point Software Reports 2025 Second Quarter Financial Results TEL AVIV, Israel, July 30, 2025 (GLOBE NEWSWIRE) --  (NASDAQ: CHKP), today announced its financial results for the quarter ended June 30th, 2025. Second Quarter 2025 Financial Highlights: Total Revenues: $665 million, a 6 percent increase year over yearProducts & Licenses Revenues: $132 million, a 12 percent increase year over yearSecurity Subscriptions Revenues: $298 million, a 10 percent increase year over yearCalculated Billings*: $642 million, a 4 percent increase year over yearRemaining Performance Obligation (RPO)...

Check Point Software Technologies Ltd: 1 director

A director at Check Point Software Technologies Ltd sold 1,300,000 shares at 220.000USD and the significance rating of the trade was 68/100. Is that information sufficient for you to make an investment decision? This report gives details of those trades and adds context and analysis to them such that you can judge whether these trading decisions are ones worth following. Included in the report is a detailed share price chart which plots discretionary trades by all the company's directors over ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch