CHECK POINT POSITIONED AS A LEADER IN THE 2012 MAGIC QUADRANT FOR MOBILE DATA PROTECTION

 Ability to Encrypt Data and Secure Mobile Endpoints Enhances Check Point’s Solution 
CALGARY, AB – October 4, 2012 –  Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced it has been positioned in the Leaders quadrant in Gartner’s recently published Magic Quadrant for Mobile Data Protection, 20121.  According to Gartner, “leaders have products that work well for Gartner clients in small and large deployments. They have long-term road maps that follow and/or influence Gartner’s vision of the developing needs of buyers in the market. Leaders make their competitors’ sales staffs nervous and force competitors’ technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists.”
“Mobile Data Protection is an established market with two primary purposes — first and foremost, to safeguard user device data by means of encryption and authentication; and second, to provide evidence that the protection is working,” said Gartner. “Most companies, even if not in sensitive or regulated industries, recognize that encrypting business data is a best practice.”
Check Point provides its customers comprehensive protection for all data. Customers may choose from an extensive set of integrated security capabilities–including Firewall/Compliance Check, Full Disk Encryption, Media Encryption, WebCheck Browser Security, Remote Access VPN, Mobile Access Software Blade, DDoS Protector, Anti-Bot Software Blade and Anti-Malware with Program Control. Check Point also holds a strong position in remote access VPNs, with many choices for workstations and smaller devices.
For more information on Gartner’s Mobile Data Protection Magic Quadrant, visit:  http://www.checkpoint.com/products/promo/gartner-mobile/2012/index.html.
“Companies recognize that data leakage can negatively impact their customers, are costly and have the potential to damage hard won brand reputations. Moreover, some of the most expensive data breaches happen as the result of lost or stolen laptops and mobile devices,” said Paul Comessotti, Canadian Regional Director, Check Point Software Technologies.   “Check Point is dedicated to providing our customers with solutions to encrypt company data and secure mobile endpoints. We believe our positioning in the Magic Quadrant affirms our strategic vision and the high ratings we get from our customers in this area.”
In addition to the comprehensive endpoint security, Check Point’s 3D Security enables organizations to transform security into a business process by integrating policy, people and enforcement for stronger protection across all layers of security.  The Software Blade Architecture gives customers the flexibility to easily activate addi­tional Check Point Endpoint functionality without the need for new hardware or management complexity. For more information on Check Point Endpoint Security solutions, visit: http://www.checkpoint.com/products/index.html#endpoint.
About the Gartner Magic Quadrant
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose
[1]September, 2012:  Magic Quadrant for Mobile Data Protection, by John Girard, Eric Ouellet

Leave a Reply