Welcome!

Machine Learning Authors: Pat Romanski, Liz McMillan, Carmen Gonzalez, Yeshim Deniz, Zakia Bouachraoui

News Feed Item

Check Point a Leader in Unified Threat Management for Completeness of Vision and Ability to Execute

2014 Marks Check Point's Fourth Consecutive Year as a Leader in the Gartner Magic Quadrant for Unified Threat Management

SAN CARLOS, CA -- (Marketwired) -- 08/21/14 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant for Unified Threat Management (UTM)(1). This is the fourth consecutive year that Check Point has been named a Leader. Earlier this year, Check Point was named a Leader in the 2014 Gartner Magic Quadrant for Enterprise Network Firewall(2), a position it has held since 1999. We feel Check Point's position as a Leader in both Gartner Magic Quadrants demonstrates the company's top standing in providing comprehensive network security solutions for a full range of enterprise customers.

"The cost of data breaches and security threats are growing for all businesses. Small and midsize organizations are often at greater risk of cyber crime due to security compromises made from a lack of resources," said Gabi Reish, vice president of product management at Check Point Software Technologies. "Check Point's ongoing mission is to deliver the highest level of security to business and environments of any size. As such, we are thrilled to be named a Leader in the Gartner Magic Quadrant for Unified Threat Management for the fourth consecutive year."

According to Gartner, "the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer."(1)

Check Point leads the UTM Appliance market by offering the company's industry-leading security with the performance needed by any small or midsize business (SMB) or branch office environment. These powerful, enterprise-grade security solutions are offered with cost-effective pricing and can accommodate all business models without requiring additional hardware or other threat management solutions. Check Point's UTM Appliance families include the 600 Series, the 1100 Series, the 2200 Appliance, and the 4000 Series. These Appliances deliver Check Point's multi-layered protection through four pre-defined security packages, including: Next Generation Firewall, Threat Prevention, Data Protection and Secure Web Gateway.

For more information about Check Point's wide range of appliances, visit: http://www.checkpoint.com/products/appliances/index.html.

For more information on Gartner's Unified Threat Management Magic Quadrant, visit: http://www.checkpoint.com/products/promo/gartner-utm-2014/index.html.

About the Gartner Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

(1) Gartner, Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Greg Young, August 7, 2014, ID Number: G00261973

(2) Gartner Magic Quadrant for Enterprise Network Firewalls by Greg Young, Adam Hils, Jeremy D'Hoinne, April 15, 2014, ID Number: G00258296

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
Because Linkerd is a transparent proxy that runs alongside your application, there are no code changes required. It even comes with Prometheus to store the metrics for you and pre-built Grafana dashboards to show exactly what is important for your services - success rate, latency, and throughput. In this session, we'll explain what Linkerd provides for you, demo the installation of Linkerd on Kubernetes and debug a real world problem. We will also dig into what functionality you can build on top of the tools provided by Linkerd such as alerting and autoscaling.
DevOps is a world surrounded by information, starting from a single commit and ending in roll out to production. In this talk, I'll introduce you to the world of Taboola DevOps data collection, to better understand what goes on under the hood. The system we've developed in-house helps us collect and analyse the entire DevOps process from the very first commit all the way to production. It provides us a full clear view with a drill-down toolset that helps keep us away from the dark side. Our KPI's moved from being abstracted ideas to data driven goals, which we can measure and act upon. We're living in a data driven world when all business components are based on our clients action and reaction, why not doing the same thing within our DevOps eco-system?
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing more than 27 million enterprise cloud subscriptions valued at more than $1 billion in revenue.
In his session at 20th Cloud Expo, Mike Johnston, an infrastructure engineer at Supergiant.io, will discuss how to use Kubernetes to setup a SaaS infrastructure for your business. Mike Johnston is an infrastructure engineer at Supergiant.io with over 12 years of experience designing, deploying, and maintaining server and workstation infrastructure at all scales. He has experience with brick and mortar data centers as well as cloud providers like Digital Ocean, Amazon Web Services, and Rackspace. His expertise is in automating deployment, management, and problem resolution in these environments, allowing his teams to run large transactional applications with high availability and the speed the consumer demands.
Containerized software is riding a wave of growth, according to latest RightScale survey. At Sematext we see this growth trend via our Docker monitoring adoption and via Sematext Docker Agent popularity on Docker Hub, where it crossed 1M+ pulls line. This rapid rise of containers now makes Docker the top DevOps tool among those included in RightScale survey. Overall Docker adoption surged to 35 percent, while Kubernetes adoption doubled, going from 7% in 2016 to 14% percent.