Statements (71)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Research_Institute
|
gptkbp:bfsLayer |
3
|
gptkbp:bfsParent |
gptkb:software
|
gptkbp:analyzes |
Data breaches
Phishing attacks Cyber threats Supply chain attacks Network security threats Mobile security threats Malware trends Io T security risks Ransomware incidents Web application vulnerabilities |
gptkbp:collaborates_with |
Academic institutions
Government agencies Industry partners Law enforcement agencies Cybersecurity firms |
gptkbp:conducts |
Penetration testing
Security audits Vulnerability research Security research projects Web security assessments |
gptkbp:develops |
Security protocols
Incident response plans Security tools Malware detection technologies Threat detection algorithms |
gptkbp:employs |
Security experts
|
gptkbp:engages_in |
gptkb:Community_outreach
Policy advocacy Public awareness campaigns Threat hunting Threat intelligence sharing |
gptkbp:focuses_on |
gptkb:Company
|
gptkbp:hosts |
gptkb:Workshops
Webinars Security conferences Cybersecurity training sessions |
https://www.w3.org/2000/01/rdf-schema#label |
Check Point Research
|
gptkbp:offers |
gptkb:software
Training programs Consulting services Endpoint security solutions Security solutions Managed security services Vulnerability management services Identity and access management solutions Digital forensics services |
gptkbp:part_of |
gptkb:software
|
gptkbp:participates_in |
Conferences
Research collaborations Industry forums Cybersecurity competitions |
gptkbp:provides |
Risk assessments
Threat intelligence Security frameworks Security assessments Data protection services Incident response services Security awareness training Compliance consulting Threat analysis tools |
gptkbp:publishes |
Case studies
Technical documentation Blog posts Security reports Annual threat reports |
gptkbp:released |
Research papers
Security advisories |
gptkbp:utilizes |
Advanced analytics
|