Welcome!

Machine Learning Authors: Pat Romanski, Liz McMillan, Elizabeth White, Yeshim Deniz, Corey Roth

News Feed Item

Check Point a Leader in Unified Threat Management for Completeness of Vision and Ability to Execute

2014 Marks Check Point's Fourth Consecutive Year as a Leader in the Gartner Magic Quadrant for Unified Threat Management

SAN CARLOS, CA -- (Marketwired) -- 08/21/14 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant for Unified Threat Management (UTM)(1). This is the fourth consecutive year that Check Point has been named a Leader. Earlier this year, Check Point was named a Leader in the 2014 Gartner Magic Quadrant for Enterprise Network Firewall(2), a position it has held since 1999. We feel Check Point's position as a Leader in both Gartner Magic Quadrants demonstrates the company's top standing in providing comprehensive network security solutions for a full range of enterprise customers.

"The cost of data breaches and security threats are growing for all businesses. Small and midsize organizations are often at greater risk of cyber crime due to security compromises made from a lack of resources," said Gabi Reish, vice president of product management at Check Point Software Technologies. "Check Point's ongoing mission is to deliver the highest level of security to business and environments of any size. As such, we are thrilled to be named a Leader in the Gartner Magic Quadrant for Unified Threat Management for the fourth consecutive year."

According to Gartner, "the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer."(1)

Check Point leads the UTM Appliance market by offering the company's industry-leading security with the performance needed by any small or midsize business (SMB) or branch office environment. These powerful, enterprise-grade security solutions are offered with cost-effective pricing and can accommodate all business models without requiring additional hardware or other threat management solutions. Check Point's UTM Appliance families include the 600 Series, the 1100 Series, the 2200 Appliance, and the 4000 Series. These Appliances deliver Check Point's multi-layered protection through four pre-defined security packages, including: Next Generation Firewall, Threat Prevention, Data Protection and Secure Web Gateway.

For more information about Check Point's wide range of appliances, visit: http://www.checkpoint.com/products/appliances/index.html.

For more information on Gartner's Unified Threat Management Magic Quadrant, visit: http://www.checkpoint.com/products/promo/gartner-utm-2014/index.html.

About the Gartner Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

(1) Gartner, Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Greg Young, August 7, 2014, ID Number: G00261973

(2) Gartner Magic Quadrant for Enterprise Network Firewalls by Greg Young, Adam Hils, Jeremy D'Hoinne, April 15, 2014, ID Number: G00258296

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
If a machine can invent, does this mean the end of the patent system as we know it? The patent system, both in the US and Europe, allows companies to protect their inventions and helps foster innovation. However, Artificial Intelligence (AI) could be set to disrupt the patent system as we know it. This talk will examine how AI may change the patent landscape in the years to come. Furthermore, ways in which companies can best protect their AI related inventions will be examined from both a US and European perspective.
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
Charles Araujo is an industry analyst, internationally recognized authority on the Digital Enterprise and author of The Quantum Age of IT: Why Everything You Know About IT is About to Change. As Principal Analyst with Intellyx, he writes, speaks and advises organizations on how to navigate through this time of disruption. He is also the founder of The Institute for Digital Transformation and a sought after keynote speaker. He has been a regular contributor to both InformationWeek and CIO Insight and has been quoted or published in Time, CIO, Computerworld, USA Today and Forbes.
Behera Rasananda is a technologist, a leader, a key note speaker has more than 20 years experience in across Government, Financial, Heath Care and Insurance Verticals. Mr. Behera has vast experience in Enterprise Cloud and Big Data solutions and Enterprise Architecture. Currently he works closely for Government Solutions on Enterprise Cloud for Federal Government Agency. Scientist Behera managed and partner with clients to make complete end to end solution and Migration to cloud both private sector and government sector with Cloud Computing and engineering with Architecture, Design and Strategy. This strategy and migration to cloud architecture and enterprise design patterns helps savings organizations of multi-million dollars annually.
All zSystem customers have a significant new business opportunity to extend their reach to new customers and markets with new applications and services, and to improve the experience of existing customers. This can be achieved by exposing existing z assets (which have been developed over time) as APIs for accessing Systems of Record, while leveraging mobile and cloud capabilities with new Systems of Engagement applications. In this session, we will explore business drivers with new Node.js apps for delivering enhanced customer experience (with mobile and cloud adoption), how to accelerate development and management of SoE app APIs with API management.