Check Point Software Technologies Ltd. , a worldwide leader in securing the Internet, has announced that it is positioned in the Leaders Quadrant of Gartner’s recent Magic Quadrant for Unified Threat Management (UTM) 1. Check Point has been named a leader in the UTM Magic Quadrant for three consecutive years.
UTM, according to Gartner, “provide small and midsize businesses with multiple network security functions in a single appliance.” Check Point offers such protections through several Appliance families including the 600 Series, the 1100 Series, the 2200 Appliance, and the 4000 Series, targeting markets where a simplified UTM is critical. These Appliance families bring Check Point’s enterprise-class security to small or midsize businesses (SMB) or branch offices, meeting the security needs of the customer and offering cost-effective pricing. Equipped with Check Point’s award-winning Software Blade Architecture, these appliances can accommodate all business models without requiring additional hardware or other threat management solutions, and can deploy any combination of multi-layered protections including: Firewall, VPN, IPS, Application Control, Identity Awareness, URL Filtering, Anti-spam, Antivirus, Anti-Bot, Data Loss Prevention, and Mobile Access.
“Cyber-attacks on small and midsized companies are on the rise. Often, these smaller organisations have fewer resources to protect themselves. We aim to provide our SMB customers with easy-to-manage Internet security protections that previously, only large enterprises could afford to deploy,” said Doros Hadjizenonos, sales manager at Check Point South Africa. “We believe our position in Gartner’s Leaders Quadrant for UTM serves as a testament to Check Point’s unparalleled technologies and commitment to our customers of all sizes.”
Launched in May 2013, Check Point’s 600 Appliances provide comprehensive security to ensure small business employees and data are protected at all times. The 600 Appliances come pre-loaded with enterprise-class capabilities, including firewall, VPN, intrusion prevention (IPS), anti-virus, anti-spam, application control, and URL filtering and run the same industry-leading next-generation firewall and threat prevention capabilities found on Check Point products used by all of the Fortune 100. Check Point’s 640 Appliance outperformed seven other comparable products in a recent Network World Clear Choice Test Shootout. The 600 Appliances offer affordable enterprise-grade security.
Check Point’s 1100 Appliances launched in April 2013 and provide branch and remote offices the same proven security protections found in enterprise-scale network deployments. The Check Point 1100 Appliances come pre-loaded with Check Point’s security technologies for small offices of one to 100 employees and offer flexible and intuitive local web-based management and/or profile-based centralised management through Check Point’s SmartCenter.
As part of Check Point’s 2012 Appliance Models announcement, the 2200 Appliance and the 4000 Series were launched to integrate more security functions, while improving bandwidth and accelerating network speeds. The 2200 Appliance is a branch and small office solution offered in an enterprise-grade desktop package. The 4000 Appliances are entry-level enterprise security appliances ideal for small and mid-size businesses. All appliances support any combination of Check Point’s Software Blades, giving organisations a single, integrated solution with the flexibility to customise their security infrastructure based on the precise level of protection and performance needed.
According to Gartner, vendors in the UTM Leaders Quadrant are “at the forefront of making and selling UTM products that are built for midsize business requirements. The requirements necessary for leadership include a wide range of models to cover midsize business use cases, support for multiple features, and a management and reporting capability that’s designed for ease of use. Vendors in this quadrant lead the market in offering new safeguarding features, and in enabling customers to deploy them inexpensively without significantly affecting the end-user experience or increasing staffing burdens. These vendors also have a good track record of avoiding vulnerabilities in their security products. Common characteristics include reliability, consistent throughput, and a product that’s intuitive to manage and administer.”