sb-nz logo
Story image

Check Point a Leader in Firewall Magic Quadrant for 21st Time

17 Nov 2020

Cybersecurity vendor Check Point Software Technologies has been recognised as a Leader in the Gartner Magic Quadrant for Enterprise Network Firewalls. 

It is the 21st time in the company’s history that Check Point has been named a Leader for Enterprise Network Firewalls. 

A release from Check Point states that the recognition reflects the company’s continued focus on integrating cloud and on-premise security, enhancing performance and integration across its solution range, and its centralised, unified security management. 

“Being recognised 21 times as a Leader in the Gartner Magic Quadrant for Network Firewalls is a huge accomplishment and a real testament to our market vision,” says Check Point product management vice president Itai Greenberg.

“We think this year’s recognition was driven by our obsessive focus on extending and consolidating our Infinity Architecture to secure every part of the enterprise network fabric, from cloud deployments and data centres to employees’ endpoints, mobiles and IoT devices. With our industry-leading threat prevention and holistic, centralised security management, enterprises can protect themselves from new and emerging attacks at every point on their networks, while meeting their evolving IT needs in the post-pandemic era.”

Check Point’s Infinity Architecture is a consolidated security architecture spanning networks, cloud, mobile and IoT, providing threat prevention against both known and unknown cyber threats. 

Its enterprise product line ensures customers are protected against any threat. 

The Infinity architecture offers:

  • Advanced threat prevention technology: Check Point’s SandBlast Zero Day Protection is a core component of Infinity, with over 60 security services focused on threat prevention.
    It features a 100% block score for email and web malware prevention, exploit resistance and post-infection catch rate, as seen in the NSS Labs’ recent Breach Prevention Systems (BPS) Group Test.
     
  • Security solutions: Check Point offers firewalls for all use cases, including cloud-native and container deployments, firewall-as-a-service (FWaaS) and secure access service edge (SASE), giving advanced threat prevention for all assets and workloads in public, private, hybrid or multi-cloud environments.
    The Infinity Architecture also extends to endpoints, mobiles and IoT devices, giving unified, automated security everywhere.
     
  • Security management: Check Point’s R80 centralised management suite gives holistic control of security policies and products across all of an organisation’s networks and cloud environments, increasing operational efficiency and lowering the complexity of managing security.

Check Point recently introduced its next-generation unified cybersecurity platform, Check Point R81. 

According to the cybersecurity firm, the new platform is the industry's first to deliver autonomous threat prevention designed for the entire distributed enterprise.

Story image
Forrester names Thycotic a Leader in privileged access management
Thycotic received the highest possible score in 11 of the 24 criteria in the study, including SaaS/cloud, innovation roadmap, and integrations, deployment, supporting products and services, commercial model, and PIM installed base.More
Story image
With cyber-threats continuing to evolve, organisations need to remain in the fight in 2021
Teams can make improvements in 2021 by having a more comprehensive understanding of the threats that are out there and defining how they conduct operations to offer flexibility to adapt better.More
Story image
Dell updates data protection/management solutions
PowerProtect DP series is an integrated data protection appliance, offering a range of capabilities to protect and manage data.More
Story image
Video: 10 Minute IT Jams - SonicWall VP on the benefits of Boundless Cybersecurity
Today's interviewee will discuss the ins and outs of the company's Boundless Cybersecurity solution and how it can help APAC organisations adjust to the new normal, as well as explaining the 'cybersecurity business gap'.More
Story image
Ransom DDoS attacks can be defeated with proactive prevention - Penta Security
Ransom DDoS combines a ransom demand with the threat of a DDoS attack. Those who don’t pay the ransom are then subjected to an attack.More
Story image
Voice phishing attacks on the rise, remote workers vulnerable
There is an increase in voice phishing attacks, where hackers use existing employee names in attempt to trick victims into sharing login credentials and data by phone.More