STOCK TITAN

Notifications

Limited Time Offer! Get Platinum at the Gold price until January 31, 2026!

Sign up now and unlock all premium features at an incredible discount.

Read more on the Pricing page

Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Negative)
Tags
Check Point Software's 2025 Cloud Security Report reveals critical security gaps in enterprise cloud environments. The study, based on 900+ CISO surveys, shows 65% of organizations experienced cloud security incidents in 2024, up from 61% previously. Only 9% detected incidents within an hour, and just 6% remediated them in that timeframe. Key findings highlight widespread challenges: 71% use 10+ security tools, 62% take over 24 hours for breach remediation, and only 17% have full visibility into lateral cloud movement. While 68% prioritize AI for cyber defense, only 25% feel ready to counter AI-driven attacks. The report emphasizes the need for unified security platforms, improved threat detection, and automated incident response to address these vulnerabilities.
Loading...
Loading translation...

Positive

  • Report provides comprehensive insights from 900+ CISOs and IT leaders about cloud security landscape
  • Check Point offers solutions through CloudGuard and Infinity Platform for unified cloud defense
  • Company maintains leadership position in identifying and addressing emerging cloud security challenges

Negative

  • 65% of organizations experienced cloud security incidents in past year, up from 61%
  • Only 9% detected incidents within first hour, and mere 6% remediated within that timeframe
  • 71% of organizations suffer from tool sprawl with 10+ different cloud security tools
  • Only 17% of organizations have full visibility into east-west cloud traffic
  • Only 25% feel prepared to counter AI-driven attacks

Insights

Check Point's report reveals critical cloud security vulnerabilities with most organizations taking days to remediate breaches, highlighting growing market demand for unified security solutions.

Check Point's 2025 Cloud Security Report unveils alarming gaps in enterprise cloud security postures. The finding that 65% of organizations experienced cloud security incidents—yet only 6% remediated them within an hour—reveals a dangerous disconnect between threat velocity and defensive capabilities. This detection-remediation gap provides attackers with extended dwell time to establish persistence and move laterally within compromised environments.

The report identifies several critical vulnerabilities in current security approaches. Most concerning is the widespread inability to detect lateral movement, with only 17% of organizations having full visibility into east-west traffic. This blind spot allows attackers who breach perimeter defenses to traverse cloud environments undetected. Additionally, the reliance on outdated security models is particularly troubling—61% still use signature-based WAFs despite their ineffectiveness against modern threats.

Tool fragmentation is exacerbating these challenges. With 71% of organizations using more than 10 different cloud security tools and 16% using over 50, security teams face significant alert fatigue. This complexity leads to slower response times and higher operational costs. The data shows a clear correlation between tool sprawl and incident detection failures—only 35% of incidents were caught by security monitoring platforms, with most discovered through human intervention or external notification.

The report also highlights a concerning AI security gap. While 68% of organizations list AI as a top priority, only 25% feel prepared to counter AI-driven attacks. As threat actors increasingly leverage AI to enhance attack sophistication and scale, this preparedness gap represents a significant emerging risk.

These findings suggest strong market demand for unified security platforms that can provide comprehensive visibility across distributed environments and automate response workflows. Check Point is positioning its CloudGuard and Infinity Platform as solutions to these challenges, emphasizing consolidated toolsets and AI-powered detection capabilities designed for today's decentralized infrastructures.

Report finds 65% of organizations suffered a cloud-security incident in the past year — yet only 6% remediated it within an hour

REDWOOD CITY, Calif., June 05, 2025 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today released its 2025 Cloud Security Report. Based on a global survey of more than 900 CISOs and IT leaders, the report reveals systemic weaknesses, including alert fatigue, fragmented toolsets, and a widespread inability for organizations to detect lateral movement or defend against AI-driven attacks leaving enterprises dangerously exposed. The findings also include actionable strategies for closing the gap between cloud innovation and cyber resilience.

As hybrid, multi-cloud, and edge architectures expand, many organizations are relying on outdated security models that can’t keep up. According to the report, 65% of organizations experienced a cloud-related security incident in the past year—up from 61% the previous year. Alarmingly, only 9% detected the incident within the first hour, and a mere 6% managed to remediate it within that time frame, allowing intruders to remain undetected across cloud environments.

“Security teams are chasing an ever-moving target,” said Paul Barbosa, VP of Cloud Security at Check Point Software Technologies. “As cloud environments grow more complex and AI-driven threats evolve, organizations can’t afford to be stuck with fragmented tools and legacy approaches. It’s time to shift toward unified, intelligent, and automated defenses designed for the realities of today’s decentralized world.”

Key findings from the 2025 Cloud Security Report include:

  • Cloud Adoption Outpaces Security Readiness: 62% of organizations have adopted cloud edge technologies, 57% use hybrid cloud, and 51% operate in multi-cloud environments. Legacy, perimeter-based defenses can’t keep up with these distributed infrastructures
  • Detection and Remediation Are Too Slow: Only 9% of organizations detected an incident within the first hour. Meanwhile, 62% took more than 24 hours to remediate breaches—giving attackers ample time to escalate access
  • Tool Sprawl is Fueling Alert Fatigue: A significant 71% of respondents rely on over 10 different cloud security tools, while 16% utilize more than 50. More than half of them face nearly 500 alerts daily hindering response times and overwhelming analysts
  • Application Security Lags Behind: 61% still rely on outdated, signature-based Web Application Firewalls (WAFs), which are increasingly ineffective against sophisticated, AI-enhanced threats
  • AI is a Priority — but Defenders Aren’t Ready: While 68% list AI as a top priority for cyber defense, only 25% feel prepared to counter AI-driven attacks, highlighting a critical capability gap
  • Lateral Movement Remains a Blind Spot: Only 17% of organizations have full visibility into east-west cloud traffic. Once attackers breach the perimeter, they can move undetected within cloud environments
  • Detection Often Comes from People, Not Tools: Only 35% of cloud incidents were detected via security monitoring platforms. The majority were identified through employees, audits, or external reports—revealing alarming gaps in real-time threat detection
  • Internal Challenges Undermine Progress: 54% cite the pace of technological change as a major hurdle, while 49% face a shortage of skilled security professionals. Tool fragmentation and poor platform integration (40%) further slow response times and exacerbate blind spots

To close these gaps, Check Point recommends a shift toward decentralized, prevention-first cloud security strategies. The report advises organizations to consolidate their toolsets, adopt AI-powered threat detection, and deploy real-time telemetry to gain full visibility across edge, hybrid, and multi-cloud environments. By leveraging Check Point CloudGuard and the Check Point Infinity Platform, organizations can unify their cloud defenses, automate incident response, and ensure consistent policy enforcement—regardless of platform or provider.

Deryck Mitchelson, Global CISO at Check Point Software Technologies provides guidance within the 2025 cloud security report and emphasizes that, “cloud transformation is accelerating faster than our defenses. With attackers moving in minutes and defenders responding in days, the gap between detection and remediation is becoming a danger zone. CISOs must consolidate fragmented tools into unified platforms, gain visibility into lateral movement, and prepare their teams and technologies to counter AI-driven threats, or risk ceding control of the cloud to increasingly sophisticated adversaries.”

To access the full report and receive actionable CISO advice for safeguarding against the cloud-related issues discussed, please visit our website and read our blog.

About the Survey:
The 2025 Cloud Security Report, carried out by Cybersecurity Insiders in the beginning of 2025, gathered insights from 937 cyber security professionals across North America, Europe, Asia-Pacific, and other regions. Respondents included CISOs, cloud architects, security analysts, and IT leaders responsible for securing hybrid, multi-cloud, and SaaS environments. The study focused on how businesses using cloud services tackle security issues and highlight advancements, like artificial intelligence, emphasizing the complexity of modern cloud security.

Follow Check Point via:
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
Twitter: https://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal

​​​About Check Point Software Technologies Ltd.   

Check Point Software Technologies Ltd. (checkpoint.com) is a leading protector of digital trust, utilizing AI-powered cyber security solutions to safeguard over 100,000 organizations globally. Through its Infinity Platform and an open garden ecosystem, Check Point’s prevention-first approach delivers industry-leading security efficacy while reducing risk. Employing a hybrid mesh network architecture with SASE at its core, the Infinity Platform unifies the management of on-premises, cloud, and workspace environments to offer flexibility, simplicity and scale for enterprises and service providers.

Legal Notice Regarding Forward-Looking Statements   
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operating performance. Forward-looking statements in this press release include, but are not limited to, statements related to our expectations regarding future growth, the expansion of Check Point’s industry leadership, the enhancement of shareholder value and the delivery of an industry-leading cyber security platform to customers worldwide. Our expectations and beliefs regarding these matters may not materialize, and actual results or events in the future are subject to risks and uncertainties that could cause actual results or events to differ materially from those projected. The forward-looking statements contained in this press release are also subject to other risks and uncertainties, including those more fully described in our filings with the Securities and Exchange Commission, including our Annual Report on Form 20-F filed with the Securities and Exchange Commission on April 2, 2024. The forward-looking statements in this press release are based on information available to Check Point as of the date hereof, and Check Point disclaims any obligation to update any forward-looking statements, except as required by law.

MEDIA CONTACT: INVESTOR CONTACT:
Ana PerezKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
press@checkpoint.comir@checkpoint.com

FAQ

What are the main findings of Check Point's 2025 Cloud Security Report?

The report reveals 65% of organizations experienced cloud security incidents, only 9% detected incidents within an hour, 71% use 10+ security tools, and only 25% feel prepared for AI-driven attacks. Most organizations take over 24 hours for breach remediation.

How long does it take organizations to detect and respond to cloud security incidents according to CHKP's report?

According to the report, only 9% of organizations detected incidents within the first hour, and only 6% remediated within that timeframe. 62% took more than 24 hours to remediate breaches.

What percentage of organizations are prepared for AI-driven attacks according to Check Point's study?

While 68% list AI as a top priority for cyber defense, only 25% of organizations feel prepared to counter AI-driven attacks, highlighting a critical capability gap.

What solutions does Check Point (CHKP) recommend to address cloud security challenges?

Check Point recommends consolidating toolsets, adopting AI-powered threat detection, deploying real-time telemetry, and using CloudGuard and Infinity Platform for unified cloud defenses and automated incident response.

What percentage of organizations have visibility into lateral cloud movement according to the CHKP report?

Only 17% of organizations have full visibility into east-west cloud traffic, leaving a significant blind spot for detecting lateral movement within cloud environments.
Check Point Software Tech Ltd

NASDAQ:CHKP

CHKP Rankings

CHKP Latest News

CHKP Latest SEC Filings

CHKP Stock Data

21.02B
83.48M
22.96%
71.41%
3.03%
Software - Infrastructure
Technology
Link
Israel
Tel Aviv