Check Point Unveils 2025 Cloud Security Report
Check Point® Software Technologies Ltd., a pioneering leader in cybersecurity solutions, recently released its much-anticipated
2025 Cloud Security Report based on a survey involving over
900 CISO and IT leaders globally. The report sheds light on systemic vulnerabilities jeopardizing organizational efficiency and trust, which include alert fatigue, fragmented toolsets, undetectable lateral movements, and inadequate defense against AI-driven attacks. Furthermore, it outlines actionable strategies to enhance both cloud utilization and security measures.
In light of the expanding hybrid, multi-cloud, and edge architectures, many organizations still rely on outdated security models, resulting in lagging responses against evolving threats. According to the report,
65% of organizations experienced cloud-related security incidents within the past year, a significant increase from
61% the previous year. Additionally, the report reveals that only
9% of incidents were detected within the first hour, while a mere
6% were resolved within that timeframe, allowing intruders to remain undetected within cloud environments for extended periods.
Paul Barbosa, Vice President of Cloud Security at Check Point, stated, "Security teams are chasing constantly moving targets. As cloud environments become increasingly complex and AI-driven threats evolve, organizations can no longer afford to cling to fragmented tools and traditional approaches. It is crucial to shift towards an integrated, intelligent, and automated defense strategy that can respond to the realities of the modern decentralized world."
Key Findings from the 2025 Cloud Security Report
1.
Pace of Cloud Adoption Outstrips Security Measures:
62% of organizations have adopted cloud edge technologies,
57% utilize hybrid cloud, and
51% operate in multi-cloud environments. Traditional perimeter defense models fail to address these distributed infrastructures.
2.
Severe Delays in Detection and Remediation: Only
9% of organizations detected incidents within the first hour. In contrast,
62% took more than
24 hours to remediate breaches, granting attackers ample time to escalate their access privileges.
3.
Prevalence of Alert Fatigue Due to Tool Proliferation:
71% of participants reported using more than
10 types of cloud security tools, with
16% utilizing over
50. Many face nearly
500 alerts daily, leading to delayed response times and overwhelming workloads for analysts.
4.
Lagging Application Security:
61% still rely on outdated signature-based Web Application Firewalls (WAF), which are increasingly ineffective against advanced AI threats.
5.
AI Seen as Priority, Yet Defense is Inadequate: While
68% of organizations prioritize AI in their cyber defense strategies, only
25% feel prepared to combat AI-driven attacks, highlighting a significant capability gap.
6.
Blind Spots in Lateral Movements: Only
17% of organizations have full visibility into east-west traffic within the cloud, enabling attackers to move undetected once they breach the perimeter.
7.
Human-Dependent Detection Mechanisms: Merely
35% of cloud incidents were detected through security monitoring platforms, with the majority discovered by employees or external reports, showcasing a concerning gap in real-time threat detection.
8.
Internal Barriers Hindering Progress:
54% cited the speed of technological innovation as a major barrier, while
49% face shortages of skilled security professionals. Fragmentation of tools and lack of platform integration further exacerbate delays in response time and expand security blind spots.
To address these gaps, Check Point advocates for a transition towards a decentralized cloud security strategy that prioritizes prevention. The report advises organizations to integrate toolsets, adopt AI-driven threat detection, and implement real-time telemetry to ensure complete visibility across edge, hybrid, and multi-cloud environments. By leveraging
Check Point CloudGuard and the
Check Point Infinity Platform, organizations can integrate cloud defenses, automate incident response, and ensure consistent policy enforcement regardless of platform or provider.
Deryck Mitchelson, Check Point’s Global CISO, provides essential guidance in the 2025 Cloud Security Report, emphasizing, "Cloud transformation is accelerating at a pace that exceeds our defenses. While attackers move in minutes, the defense takes days, creating time gaps that result in dangerous vulnerabilities. CISO's need to consolidate fragmented tools into an integrated platform, visualize lateral movements, and prepare teams and technologies to tackle AI-driven threats, or risk losing control of the cloud to increasingly sophisticated adversaries."
For full details of the report and practical advice for CISOs addressing these cloud-related issues, please visit the Check Point website and blog. The survey for the
2025 Cloud Security Report was conducted in early 2025 by Cybersecurity Insiders, involving
937 cybersecurity professionals across North America, Europe, Asia-Pacific, and beyond, targeting cloud-utilizing companies and how they are tackling security challenges—focusing on the complex issues surrounding modern cloud security.
This article draws information from a press release issued at
06:00 AM EST on June 5, 2025.
About Check Point
Check Point Software Technologies, https://www.checkpoint.com/, a leading provider of digital trust, protects over
100,000 organizations around the globe with AI-driven cybersecurity solutions. The company’s Infinity Platform and open-ecosystem approach effectively reduce risks while achieving industry-leading security efficacy through a prevention-first methodology. The Infinity Platform, underpinned by SASE, integrates management of on-premises, cloud, and workspace environments, offering flexibility, simplicity, and scalability to enterprises and service providers alike. The wholly-owned Japanese subsidiary, Check Point Software Technologies K.K., was established on October 1, 1997, and is based in
Minato-ku, Tokyo.
Social Media Accounts
Legal Disclaimer on Forward-Looking Statements
This press release contains forward-looking statements. Forward-looking statements generally relate to future events or our future financial or operational performance. Such statements include, but are not limited to, our expectations for Check Point’s future growth, the expansion of our industry leadership, the upsurge in shareholder value, and our outlook for providing world-class cybersecurity platforms to global customers. These expectations and beliefs may not be realized and actual results or events may differ significantly from those anticipated due to various risks and uncertainties. Risks include our ability to continue developing the capabilities and solutions of our platform, customers’ acceptance and purchase of our existing and new solutions, continued evolution of the IT security market, competition from other products and services, and impacts of general market, political, economic, and operational conditions, as well as terrorist or war activities. Details of risk and uncertainty related to forward-looking statements are further outlined in our filings with the
U.S. Securities and Exchange Commission, including our annual report on Form 20-F submitted on
April 2, 2024. Forward-looking statements in this press release are based on information available to Check Point at the date of this press release, and Check Point has no obligation to update any forward-looking statements unless legally required to do so.