Welcome!

Machine Learning Authors: Pat Romanski, Liz McMillan, Yeshim Deniz, Elizabeth White, Zakia Bouachraoui

News Feed Item

Check Point a Leader in Unified Threat Management for Completeness of Vision and Ability to Execute

2014 Marks Check Point's Fourth Consecutive Year as a Leader in the Gartner Magic Quadrant for Unified Threat Management

SAN CARLOS, CA -- (Marketwired) -- 08/21/14 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant for Unified Threat Management (UTM)(1). This is the fourth consecutive year that Check Point has been named a Leader. Earlier this year, Check Point was named a Leader in the 2014 Gartner Magic Quadrant for Enterprise Network Firewall(2), a position it has held since 1999. We feel Check Point's position as a Leader in both Gartner Magic Quadrants demonstrates the company's top standing in providing comprehensive network security solutions for a full range of enterprise customers.

"The cost of data breaches and security threats are growing for all businesses. Small and midsize organizations are often at greater risk of cyber crime due to security compromises made from a lack of resources," said Gabi Reish, vice president of product management at Check Point Software Technologies. "Check Point's ongoing mission is to deliver the highest level of security to business and environments of any size. As such, we are thrilled to be named a Leader in the Gartner Magic Quadrant for Unified Threat Management for the fourth consecutive year."

According to Gartner, "the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer."(1)

Check Point leads the UTM Appliance market by offering the company's industry-leading security with the performance needed by any small or midsize business (SMB) or branch office environment. These powerful, enterprise-grade security solutions are offered with cost-effective pricing and can accommodate all business models without requiring additional hardware or other threat management solutions. Check Point's UTM Appliance families include the 600 Series, the 1100 Series, the 2200 Appliance, and the 4000 Series. These Appliances deliver Check Point's multi-layered protection through four pre-defined security packages, including: Next Generation Firewall, Threat Prevention, Data Protection and Secure Web Gateway.

For more information about Check Point's wide range of appliances, visit: http://www.checkpoint.com/products/appliances/index.html.

For more information on Gartner's Unified Threat Management Magic Quadrant, visit: http://www.checkpoint.com/products/promo/gartner-utm-2014/index.html.

About the Gartner Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

(1) Gartner, Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Greg Young, August 7, 2014, ID Number: G00261973

(2) Gartner Magic Quadrant for Enterprise Network Firewalls by Greg Young, Adam Hils, Jeremy D'Hoinne, April 15, 2014, ID Number: G00258296

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you're forecasting for tomorrow.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.