Dangerous Blind Spots Costing Enterprises Time, Trust, and Agility Exposed in Check Point’s 2025 Cloud Security Report
June 05 2025 - 9:00AM
Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a pioneer
and global leader of cyber security solutions, today released its
2025 Cloud Security Report. Based on a global survey of more than
900 CISOs and IT leaders, the report reveals systemic weaknesses,
including alert fatigue, fragmented toolsets, and a widespread
inability for organizations to detect lateral movement or defend
against AI-driven attacks leaving enterprises dangerously exposed.
The findings also include actionable strategies for closing the gap
between cloud innovation and cyber resilience.
As hybrid, multi-cloud, and edge architectures expand, many
organizations are relying on outdated security models that can’t
keep up. According to the report, 65% of organizations experienced
a cloud-related security incident in the past year—up from 61% the
previous year. Alarmingly, only 9% detected the incident within the
first hour, and a mere 6% managed to remediate it within that time
frame, allowing intruders to remain undetected across cloud
environments.
“Security teams are chasing an ever-moving target,” said Paul
Barbosa, VP of Cloud Security at Check Point Software Technologies.
“As cloud environments grow more complex and AI-driven threats
evolve, organizations can’t afford to be stuck with fragmented
tools and legacy approaches. It’s time to shift toward unified,
intelligent, and automated defenses designed for the realities of
today’s decentralized world.”
Key findings from the 2025 Cloud Security Report include:
- Cloud Adoption Outpaces Security Readiness:
62% of organizations have adopted cloud edge technologies, 57% use
hybrid cloud, and 51% operate in multi-cloud environments. Legacy,
perimeter-based defenses can’t keep up with these distributed
infrastructures
- Detection and Remediation Are Too Slow: Only
9% of organizations detected an incident within the first hour.
Meanwhile, 62% took more than 24 hours to remediate breaches—giving
attackers ample time to escalate access
- Tool Sprawl is Fueling Alert Fatigue: A
significant 71% of respondents rely on over 10 different cloud
security tools, while 16% utilize more than 50. More than half of
them face nearly 500 alerts daily hindering response times and
overwhelming analysts
- Application Security Lags Behind: 61% still
rely on outdated, signature-based Web Application Firewalls (WAFs),
which are increasingly ineffective against sophisticated,
AI-enhanced threats
- AI is a Priority — but Defenders Aren’t
Ready: While 68% list AI as a top priority for cyber
defense, only 25% feel prepared to counter AI-driven attacks,
highlighting a critical capability gap
- Lateral Movement Remains a Blind Spot: Only
17% of organizations have full visibility into east-west cloud
traffic. Once attackers breach the perimeter, they can move
undetected within cloud environments
- Detection Often Comes from People, Not Tools:
Only 35% of cloud incidents were detected via security monitoring
platforms. The majority were identified through employees, audits,
or external reports—revealing alarming gaps in real-time threat
detection
- Internal Challenges Undermine Progress: 54%
cite the pace of technological change as a major hurdle, while 49%
face a shortage of skilled security professionals. Tool
fragmentation and poor platform integration (40%) further slow
response times and exacerbate blind spots
To close these gaps, Check Point recommends a shift toward
decentralized, prevention-first cloud security strategies. The
report advises organizations to consolidate their toolsets, adopt
AI-powered threat detection, and deploy real-time telemetry to gain
full visibility across edge, hybrid, and multi-cloud environments.
By leveraging Check Point CloudGuard and the Check Point Infinity
Platform, organizations can unify their cloud defenses, automate
incident response, and ensure consistent policy
enforcement—regardless of platform or provider.
Deryck Mitchelson, Global CISO at Check Point Software
Technologies provides guidance within the 2025 cloud security
report and emphasizes that, “cloud transformation is accelerating
faster than our defenses. With attackers moving in minutes and
defenders responding in days, the gap between detection and
remediation is becoming a danger zone. CISOs must consolidate
fragmented tools into unified platforms, gain visibility into
lateral movement, and prepare their teams and technologies to
counter AI-driven threats, or risk ceding control of the cloud to
increasingly sophisticated adversaries.”
To access the full report and receive actionable CISO advice for
safeguarding against the cloud-related issues discussed, please
visit our website and read our blog.
About the Survey: The 2025 Cloud Security
Report, carried out by Cybersecurity Insiders in the beginning of
2025, gathered insights from 937 cyber security professionals
across North America, Europe, Asia-Pacific, and other regions.
Respondents included CISOs, cloud architects, security analysts,
and IT leaders responsible for securing hybrid, multi-cloud, and
SaaS environments. The study focused on how businesses using cloud
services tackle security issues and highlight advancements, like
artificial intelligence, emphasizing the complexity of modern cloud
security.
Follow Check Point via:LinkedIn:
https://www.linkedin.com/company/check-point-software-technologiesTwitter: https://www.twitter.com/checkpointswFacebook: https://www.facebook.com/checkpointsoftwareBlog:
https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal
About Check Point Software Technologies
Ltd.
Check Point Software Technologies Ltd. (checkpoint.com) is a
leading protector of digital trust, utilizing AI-powered cyber
security solutions to safeguard over 100,000 organizations
globally. Through its Infinity Platform and an open garden
ecosystem, Check Point’s prevention-first approach delivers
industry-leading security efficacy while reducing risk. Employing a
hybrid mesh network architecture with SASE at its core, the
Infinity Platform unifies the management of on-premises, cloud, and
workspace environments to offer flexibility, simplicity and scale
for enterprises and service providers.
Legal Notice Regarding Forward-Looking
Statements This press release contains
forward-looking statements. Forward-looking statements generally
relate to future events or our future financial or operating
performance. Forward-looking statements in this press release
include, but are not limited to, statements related to our
expectations regarding future growth, the expansion of Check
Point’s industry leadership, the enhancement of shareholder value
and the delivery of an industry-leading cyber security platform to
customers worldwide. Our expectations and beliefs regarding these
matters may not materialize, and actual results or events in the
future are subject to risks and uncertainties that could cause
actual results or events to differ materially from those projected.
The forward-looking statements contained in this press release are
also subject to other risks and uncertainties, including those more
fully described in our filings with the Securities and Exchange
Commission, including our Annual Report on Form 20-F filed with the
Securities and Exchange Commission on April 2, 2024. The
forward-looking statements in this press release are based on
information available to Check Point as of the date hereof, and
Check Point disclaims any obligation to update any forward-looking
statements, except as required by law.
MEDIA CONTACT: |
INVESTOR CONTACT: |
Ana Perez |
Kip E. Meintzer |
Check Point Software Technologies |
Check Point Software Technologies |
press@checkpoint.com |
ir@checkpoint.com |
Check Point Software Tec... (NASDAQ:CHKP)
Historical Stock Chart
From Jun 2025 to Jul 2025
Check Point Software Tec... (NASDAQ:CHKP)
Historical Stock Chart
From Jul 2024 to Jul 2025