SAN CARLOS, CA — (Marketwired) — 08/07/13 — (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that it is positioned in the Leaders Quadrant of Gartner-s recent Magic Quadrant for Unified Threat Management (UTM)(1). Check Point has been named a leader in the UTM Magic Quadrant for three consecutive years.
UTM, according to Gartner, “provide small and midsize businesses with multiple network security functions in a single appliance.” Check Point offers such protections through several Appliance families including the , the , the , and , targeting markets where a simplified UTM is critical. These Appliance families bring Check Point-s enterprise-class security to small or midsize businesses (SMB) or branch offices, meeting the security needs of the customer and offering cost-effective pricing. Equipped with Check Point-s award-winning Software Blade Architecture, these appliances can accommodate all business models without requiring additional hardware or other threat management solutions, and can deploy any combination of multi-layered protections including: , , , , , , , , , , and .
“Cyber-attacks on small and midsized companies are on the rise. Often, these smaller organizations have fewer resources to protect themselves. We aim to provide our SMB customers with easy-to-manage Internet security protections that previously, only large enterprises could afford to deploy,” said Dorit Dor, vice president of products at Check Point. “We believe our position in Gartner-s Leaders Quadrant for UTM serves as a testament to Check Point-s unparalleled technologies and commitment to our customers of all sizes.”
, Check Point-s 600 Appliances provide comprehensive security to ensure small business employees and data are protected at all times. The 600 Appliances come pre-loaded with enterprise-class capabilities, including firewall, VPN, intrusion prevention (IPS), anti-virus, anti-spam, application control, and URL filtering and run the same industry-leading next-generation firewall and threat prevention capabilities found on Check Point products used by all of the Fortune 100. Check Point-s 640 Appliance outperformed seven other comparable products in a recent . The 600 Appliances offer affordable enterprise-grade security, with pricing starting at $399.
Check Point-s 1100 Appliances and provide branch and remote offices the same proven security protections found in enterprise-scale network deployments. The Check Point 1100 Appliances come pre-loaded with Check Point-s security technologies for small offices of one to 100 employees and offer flexible and intuitive local web-based management and/or profile-based centralized management through Check Point-s The 1100 Appliances are priced starting at $599.
As part of Check Point-s , the 2200 Appliance and the 4000 Series were launched to integrate more security functions, while improving bandwidth and accelerating network speeds. The 2200 Appliance is a branch and small office solution offered in an enterprise-grade desktop package. The 4000 Appliances are entry-level enterprise security appliances ideal for small and mid-size businesses. All appliances support any combination of Check Point-s Software Blades, giving organizations a single, integrated solution with the flexibility to customize their security infrastructure based on the precise level of protection and performance needed.
According to Gartner, vendors in the UTM Leaders Quadrant are “at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that-s designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and a product that-s intuitive to manage and administer.”(1)
For more information about Check Point-s wide range of appliances, visit: .
For more information on Gartner-s Unified Threat Management Magic Quadrant, visit: .
Gartner does not endorse any vendor, product or service depicted in our research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner-s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Check Point Software Technologies Ltd. (), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point-s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
(1) from the Gartner Magic Quadrant for Unified Threat Management by Greg Young and Jeremy D-Hoinne, ID Number: G00245469
You must be logged in to post a comment Login