Researchers have discovered serious chip flaws in Intel, ARM and AMD chip sets. Dubbed “Spectre” and “Meltdown,” these bugs affect almost all modern processors. The flaws break down the walls between apps, which can let one application access information stored in another application’s memory. The result: exposure of sensitive data on desktops, laptops, mobile devices, and cloud networks. Initial attention was focused on devices. However, the cloud is where the biggest potential damage can occur.

In a public cloud environment, where many users might be on the same server, data can be exposed to another tenant. By the same token, if a hacker gains a foothold with one tenant, it becomes that much easier to cross virtual machine boundaries to go after another tenant.

Check Point is the only security vendor to offer CPU-level threat prevention.

Read this white paper, CPU-Level Inspection Technology Overview to learn:

  • The four steps attackers use to plant malware on your systems
  • Exploits that circumvent your systems’ native OS and CPU security
  • Why CPU-level sandboxes are virtually evasion proof