Check Point Press Releases

Check Point Positioned as a Leader in the 2011 Magic Quadrant for Unified Threat Management

Check Point recognized for completeness of vision and ability to execute in the UTM market


Redwood City, CA  —  Wed, 28 Mar 2012

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced it is positioned in the Leaders Quadrant of Gartner’s recent Magic Quadrant for Unified Threat Management (UTM)1.  According to Gartner research, “Unified threat management devices provide small and midsize businesses with multiple network security functions in a single appliance.”

Check Point offers simple, all-in-one security solutions that provide the utmost level of protection to small and mid-sized businesses, as well as remote and branch offices. Check Point’s comprehensive and flexible UTM-1 and Series 80 Appliance are equipped with Check Point’s Software Blade ArchitectureTM, giving customers an extensible security infrastructure that is able to grow with their business needs.  Check Point unified threat management solutions combine the same advanced security that enterprises trust, including:  FirewallIPsec VPN,Intrusion PreventionApplication ControlAnti-virus/Anti-malwareURL Filtering and Anti-spam and email securitytechnologies, providing ease of deployment at a reasonable price. Check Point offers security protections with industry-leading performance across a wide range of appliance models.

“The wave of new, sophisticated and stealthy attack techniques is encouraging businesses to adopt a multi-layered security approach to safeguard every network entry point. Our UTM appliances and Software Blade Architecture benefit customers by unifying multiple security functions onto a single gateway, allowing them to leverage their existing infrastructure and add future protections as needed,” said Juliette Rizkallah, head of global marketing at Check Point Software Technologies. “We believe that our position as a leader in Gartner’s Magic Quadrant for Unified Threat Management affirms our commitment to providing extensible security solutions that are practical for all businesses to deploy – from small business environments to high-end enterprise data centers.”

According to Gartner, vendors in the UTM Leaders Quadrant are, “at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and a product that’s intuitive to manage and administer.”2

For more information about Check Point’s wide range of appliances, including the Series 80 Appliance, UTM-1 and UTM-1 Edge, or Safe@Office for small and medium businesses, visit:/products/appliances/index.html.

Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

12, from the Gartner Magic Quadrant for Unified Threat Management by John Pescatore and Greg Young, ID Number: G00226111

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

 

×
  反映意見
本網站使用cookies來實現其功能以及分析和行銷目的。 繼續使用本網站即表示您同意使用cookies 。 欲了解更多信息,請閱讀我們的cookies聲明