Check Point Positioned as a Leader in the 2012 Magic Quadrant for Mobile Data Protection

Ability to Encrypt Data and Secure Mobile Endpoints Enhances Check Point's Solution

Marketwired

SAN CARLOS, CA--(Marketwire - Oct 4, 2012) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced it has been positioned in the Leaders quadrant in Gartner's recently published Magic Quadrant for Mobile Data Protection, 20121. According to Gartner, "Leaders have products that work well for Gartner clients in small and large deployments. They have long-term road maps that follow and/or influence Gartner's vision of the developing needs of buyers in the market. Leaders make their competitors' sales staffs nervous and force competitors' technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists."

"Mobile Data Protection is an established market with two primary purposes -- first and foremost, to safeguard user device data by means of encryption and authentication; and second, to provide evidence that the protection is working," said Gartner. "Most companies, even if not in sensitive or regulated industries, recognize that encrypting business data is a best practice."

Check Point provides its customers comprehensive protection for all data. Customers may choose from an extensive set of integrated security capabilities -- including Firewall/Compliance Check, Full Disk Encryption, Media Encryption, WebCheck Browser Security, Remote Access VPN, Mobile Access Software Blade, DDoS Protector, Anti-Bot Software Blade and Anti-Malware with Program Control. Check Point also holds a strong position in remote access VPNs, with many choices for workstations and smaller devices. For more information on Gartner's Mobile Data Protection Magic Quadrant, visit: http://www.checkpoint.com/products/promo/gartner-mobile/2012/index.html.

"Companies recognize that data leakage can negatively impact their customers, are costly and have the potential to damages hard won brand reputations. Moreover, some of the most expensive data breaches happen as the result of lost or stolen laptops and mobile devices," said Don MacDonald, chief marketing officer at Check Point Software Technologies. "Check Point is dedicated to providing our customers with solutions to encrypt company data and secure mobile endpoints. We believe our positioning in the Magic Quadrant affirms our strategic vision and the high ratings we get from our customers in this area."

In addition to the comprehensive endpoint security, Check Point's 3D Security enables organizations to transform security into a business process by integrating policy, people and enforcement for stronger protection across all layers of security. The Software Blade Architecture gives customers the flexibility to easily activate additional Check Point Endpoint functionality without the need for new hardware or management complexity. For more information on Check Point Endpoint Security solutions, visit: http://www.checkpoint.com/products/index.html#endpoint.

About the Gartner Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose

1September, 2012: Magic Quadrant for Mobile Data Protection, by John Girard, Eric Ouellet

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. 

©2012 Check Point Software Technologies Ltd. All rights reserved.

Contact:
Media Contact
Carly Listman

Check Point Software Technologies
+1 650.628.2326
press@us.checkpoint.com

Investor Contact
Kip E. Meintzer

Check Point Software Technologies
+1 650.628.2040
ir@us.checkpoint.com
View Comments (0)