Welcome!

Machine Learning Authors: Yeshim Deniz, Zakia Bouachraoui, Pat Romanski, Elizabeth White, Liz McMillan

News Feed Item

Check Point a Leader in Unified Threat Management for Completeness of Vision and Ability to Execute

2014 Marks Check Point's Fourth Consecutive Year as a Leader in the Gartner Magic Quadrant for Unified Threat Management

SAN CARLOS, CA -- (Marketwired) -- 08/21/14 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that it is again positioned as a Leader in the 2014 Gartner Magic Quadrant for Unified Threat Management (UTM)(1). This is the fourth consecutive year that Check Point has been named a Leader. Earlier this year, Check Point was named a Leader in the 2014 Gartner Magic Quadrant for Enterprise Network Firewall(2), a position it has held since 1999. We feel Check Point's position as a Leader in both Gartner Magic Quadrants demonstrates the company's top standing in providing comprehensive network security solutions for a full range of enterprise customers.

"The cost of data breaches and security threats are growing for all businesses. Small and midsize organizations are often at greater risk of cyber crime due to security compromises made from a lack of resources," said Gabi Reish, vice president of product management at Check Point Software Technologies. "Check Point's ongoing mission is to deliver the highest level of security to business and environments of any size. As such, we are thrilled to be named a Leader in the Gartner Magic Quadrant for Unified Threat Management for the fourth consecutive year."

According to Gartner, "the Leaders quadrant contains vendors at the forefront of making and selling UTM products that are built for midsize-business requirements. The requirements necessary for leadership include a wide range of models to cover midsize-business use cases, support for multiple features, and a management and reporting capability that's designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and products that are intuitive to manage and administer."(1)

Check Point leads the UTM Appliance market by offering the company's industry-leading security with the performance needed by any small or midsize business (SMB) or branch office environment. These powerful, enterprise-grade security solutions are offered with cost-effective pricing and can accommodate all business models without requiring additional hardware or other threat management solutions. Check Point's UTM Appliance families include the 600 Series, the 1100 Series, the 2200 Appliance, and the 4000 Series. These Appliances deliver Check Point's multi-layered protection through four pre-defined security packages, including: Next Generation Firewall, Threat Prevention, Data Protection and Secure Web Gateway.

For more information about Check Point's wide range of appliances, visit: http://www.checkpoint.com/products/appliances/index.html.

For more information on Gartner's Unified Threat Management Magic Quadrant, visit: http://www.checkpoint.com/products/promo/gartner-utm-2014/index.html.

About the Gartner Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

(1) Gartner, Magic Quadrant for Unified Threat Management, Jeremy D'Hoinne, Adam Hils, Greg Young, August 7, 2014, ID Number: G00261973

(2) Gartner Magic Quadrant for Enterprise Network Firewalls by Greg Young, Adam Hils, Jeremy D'Hoinne, April 15, 2014, ID Number: G00258296

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

CloudEXPO Stories
Headquartered in Plainsboro, NJ, Synametrics Technologies has provided IT professionals and computer systems developers since 1997. Based on the success of their initial product offerings (WinSQL and DeltaCopy), the company continues to create and hone innovative products that help its customers get more from their computer applications, databases and infrastructure. To date, over one million users around the world have chosen Synametrics solutions to help power their accelerated business or personal computing needs.
All in Mobile is a place where we continually maximize their impact by fostering understanding, empathy, insights, creativity and joy. They believe that a truly useful and desirable mobile app doesn't need the brightest idea or the most advanced technology. A great product begins with understanding people. It's easy to think that customers will love your app, but can you justify it? They make sure your final app is something that users truly want and need. The only way to do this is by researching target group and involving users in the designing process.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to advisory roles at startups. He has worked extensively on monetization, SAAS, IoT, ecosystems, partnerships and accelerating growth in new business initiatives.
Whenever a new technology hits the high points of hype, everyone starts talking about it like it will solve all their business problems. Blockchain is one of those technologies. According to Gartner's latest report on the hype cycle of emerging technologies, blockchain has just passed the peak of their hype cycle curve. If you read the news articles about it, one would think it has taken over the technology world. No disruptive technology is without its challenges and potential impediments that frequently get lost in the hype. The panel will discuss their perspective on what they see as they key challenges and/or impediments to adoption, and how they see those issues could be resolved or mitigated.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.