sb-eu logo
Story image

Check Point a Leader in Firewall Magic Quadrant for 21st Time

17 Nov 2020

Cybersecurity vendor Check Point Software Technologies has been recognised as a Leader in the Gartner Magic Quadrant for Enterprise Network Firewalls. 

It is the 21st time in the company’s history that Check Point has been named a Leader for Enterprise Network Firewalls. 

A release from Check Point states that the recognition reflects the company’s continued focus on integrating cloud and on-premise security, enhancing performance and integration across its solution range, and its centralised, unified security management. 

“Being recognised 21 times as a Leader in the Gartner Magic Quadrant for Network Firewalls is a huge accomplishment and a real testament to our market vision,” says Check Point product management vice president Itai Greenberg.

“We think this year’s recognition was driven by our obsessive focus on extending and consolidating our Infinity Architecture to secure every part of the enterprise network fabric, from cloud deployments and data centres to employees’ endpoints, mobiles and IoT devices. With our industry-leading threat prevention and holistic, centralised security management, enterprises can protect themselves from new and emerging attacks at every point on their networks, while meeting their evolving IT needs in the post-pandemic era.”

Check Point’s Infinity Architecture is a consolidated security architecture spanning networks, cloud, mobile and IoT, providing threat prevention against both known and unknown cyber threats. 

Its enterprise product line ensures customers are protected against any threat. 

The Infinity architecture offers:

  • Advanced threat prevention technology: Check Point’s SandBlast Zero Day Protection is a core component of Infinity, with over 60 security services focused on threat prevention.
    It features a 100% block score for email and web malware prevention, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test.
     
  • Security solutions: Check Point offers firewalls for all use cases, including cloud-native and container deployments, firewall-as-a-service (FWaaS) and secure access service edge (SASE), giving advanced threat prevention for all assets and workloads in public, private, hybrid or multi-cloud environments.
    The Infinity Architecture also extends to endpoints, mobiles and IoT devices, giving unified, automated security everywhere.
     
  • Security management: Check Point’s R80 centralised management suite gives holistic control of security policies and products across all of an organisation’s networks and cloud environments, increasing operational efficiency and lowering the complexity of managing security.

Check Point recently introduced its next-generation unified cybersecurity platform, Check Point R81. 

According to the cybersecurity firm, the new platform is the industry's first to deliver autonomous threat prevention designed for the entire distributed enterprise.

Story image
Kaseya acquires RocketCyber to bring SOC solutions to more businesses
"With this acquisition, we've doubled down on our security investments to provide our customers with access to experts who can continuously monitoring their IT environments without the cost and complexity of disparate tools.”More
Story image
Organisations investing significant time modifying web application firewalls to keep ahead of cybersecurity threats
"The sheer amount of traffic and potential threats can ensnare resources and impact the ability to introduce greater precision to those key systems."More
Story image
Millions of email attacks missed by organisations’ cyber security protection
"While organisations have invested in protection against email threats, many of these attacks slip through gateways, landing in users inboxes."More
Story image
Creating a strong culture of security within organisations
CISOs worldwide are inherently aware of how significant investment in cybersecurity strategies and technologies can bolster an organisation’s protection against cyberattacks. However, many overlook the importance of culture when it comes to cybersecurity.More
Story image
ExtraHop reveals methods used by attackers in SUNBURST breach
The network detection and response company says between late March and early October 2020, detections of probable malicious activity increased by approximately 150%, including detections of lateral movement, privilege escalation and command and control beaconing.More
Story image
Palo Alto Networks adds more incentives to NextWave partner program
This latest launch brings a significant set of enhancements, incentives and training to the company’s NextWave Partner Program.More