Skip to main content

Check Point Software Technologies Named A Leader in Latest Zero Trust Platform Providers Report by Independent Research Firm

Ranked as a Leader: Check Point received the highest ranking in the Market Presence category, and the highest possible score in 13 criteria, including: data security, device security, centralized management & usability, visibility and analytics

SAN CARLOS, Calif., Sept. 19, 2023 (GLOBE NEWSWIRE) — Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has been recognized as a leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report. Forrester, a leading global research and advisory firm, states in its report that Check Point “sets the bar for centralized management and usability”. Check Point’s Infinity Security Management Portal achieved a leader position and the report notes that it provides ease of use and simplicity to network and security professionals without the need to open multiple windows or tabs to perform daily tasks.

Building security infrastructure around a Zero Trust (ZT) approach using point solutions may lead to a complex deployment and inherent security gaps. To avoid that, Check Point’s Infinity Architecture offers a practical, efficient, and consolidated approach to implementing Zero Trust. Forrester recognized that “Check Point has kept its eye on the current and future needs of supporting Zero Trust (ZT) in a hybrid architecture. Components of its ZTP deploy on-premises as hardware or software, in the cloud SaaS, and virtually to address unique architectural requirements.”

In addition, combining Check Point’s industry leading artificial intelligence (AI) and Deep Learning threat prevention with the zero-trust model can protect enterprises from known and unknown sophisticated cyber threats. In the report, Check Point received the highest ranking in the Market Presence category, and the highest scores possible of five in 13 criteria, among others: data security, device security, centralized management & usability, visibility and analytics, and partner ecosystem.

“We’re proud of this recognition and thank Forrester for recognizing Check Point as a leader in The Forrester Wave™: Zero Trust Platform Providers report, highlighting, in our opinion, our outstanding partner ecosystem and best-in-class security solutions,” said Eyal Manor, VP of Product Management at Check Point. “We believe this recognition validates that our Zero Trust approach keeps our customer applications and business data safe through the unified Infinity cybersecurity architecture, while offering clear visibility and analytics to protect against the latest cyber threats.”

The Check Point Infinity architecture consolidates a wide range of security functions and solutions that enable enterprises to implement all seven principals of the Extended Zero Trust Security model including; networks, cloud workloads, identity awareness, data, devices, visibility, analytics, automation and orchestration To further enhance its Zero Trust approach, Check Point recently completed the acquisition of Perimeter 81. The integration of Perimeter 81 into Check Point Infinity will elevate security measures right from the outset, enabling a Zero-Trust framework with full mesh connectivity among users, branches, and applications.

To read more about today’s announcement and receive a complimentary copy of The Forrester Wave™: Zero Trust Platform Providers, Q3 2023, visit: https://pages.checkpoint.com/2023-forrester-wave-zero-trust-report.html

Follow Check Point Software via:
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies
X (Formerly known as Twitter): https://www.twitter.com/checkpointsw
Blog: https://blog.checkpoint.com
YouTube: https://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (https://www.checkpoint.com/) is a leading provider of cybersecurity solutions to corporate enterprises and governments globally.  Check Point Infinity’s portfolio of solutions protects enterprises and public organisations from 5th generation cyberattacks with an industry leading catch rate of malware, ransomware and other threats. Infinity comprises four core pillars delivering uncompromised security and generation V threat prevention across enterprise environments: Check Point Harmony, for remote users; Check Point CloudGuard, to automatically secure clouds; and Check Point Quantum, to protect network perimeters and datacenters, all controlled by the industry’s most comprehensive, intuitive unified security management; Check Point Horizon, a prevention-first security operations suite. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:   INVESTOR CONTACT:
Liz Wu   Kip E. Meintzer
Check Point Software Technologies   Check Point Software Technologies
press@checkpoint.com   ir@us.checkpoint.com

Disclaimer & Cookie Notice

Welcome to GOLDEA services for Professionals

Before you continue, please confirm the following:

Professional advisers only

I am a professional adviser and would like to visit the GOLDEA CAPITAL for Professionals website.

Cookie Notice

We use cookies to improve your experience on our website

Information we collect about your use of Goldea Capital website

Goldea Capital website collects personal data about visitors to its website.

When someone visits our websites, we use a third party service, Google Analytics, to collect standard internet log information (such as IP address and type of browser they’re using) and details of visitor behavior patterns. We do this to allow us to keep track of the number of visitors to the various parts of the sites and understand how our website is used. We do not make any attempt to find out the identities or nature of those visiting our websites. We won’t share your information with any other organizations for marketing, market research or commercial purposes and we don’t pass on your details to other websites.

Use of cookies
Cookies are small text files that are placed on your computer or other device by websites that you visit. They are widely used to make websites work, or work more efficiently, as well as to provide information to the owners of the site.