Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Check Point positioned in the leaders quadrant for 2007 mobile data protection magic quadrant

  • 19 September, 2007 08:51

<p>Sydney, September 19, 2007 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced it has been positioned by Gartner, Inc. in the leaders quadrant in the “Magic Quadrant for Mobile Data Protection, 2007” report.</p>
<p>According to Gartner, “Leaders have products that work well for Gartner clients. They have long-term road maps that match Gartner's vision of the developing needs of buyers in the market. They make their competitors' sales staff nervous and force competitors' technical staffs to follow their lead. Their mobile data protection products are well-known to clients, and they encounter little resistance in selling their products.”</p>
<p>“We are honored to be positioned in the leaders quadrant by Gartner and consider it to be further validation of our success and commitment to securing sensitive information,” said Scott Ferguson, Regional Vice President, Asia, Check Point Software Technologies.</p>
<p>“Australian businesses are early adopters of mobile storage devices and it’s vital that with data loss incidents on the rise and regulations tightening, that these companies take the right precautions to protect the business information residing on these devices.”</p>
<p>Laptops and other mobile storage devices such as USB sticks are shrinking in size while expanding in storage capacity, making them increasingly popular for employees on the go. Yet they are also easily lost. As businesses realise that safeguarding sensitive mobile data is critical to keeping proprietary information out of the wrong hands, the market demand for a comprehensive data protection solution is rising dramatically.</p>
<p>Check Point data security solutions, Pointsec PC®, Pointsec Mobile® and Pointsec Protector®, are the most-widely deployed data protection solutions today. They are quick and simple to deploy, scale to any size organisation, proven in every type of industry and government agency around the world, and support the broadest set of mobile platforms. Check Point solutions completely protect data on laptops, desktops, PDAs, smartphones, USB drives, and other removable media by combining strong encryption with access control. Performance of the device is retained, and no user interaction or behavioral changes are required. This ensures all data remains protected, company image stays intact and regulatory requirements are met.</p>
<p>About the Magic Quadrant</p>
<p>The Magic Quadrant is copyrighted 2007 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.</p>
<p>About Check Point Software Technologies Ltd</p>
<p>Check Point Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. The company is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point’s PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Through its NGX platform, Check Point delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market leading data security solutions through the Pointsec product line, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm Internet Security Suite and additional consumer security solutions protect millions of consumer PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from hundreds of leading companies. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organisations of all sizes.</p>
<p>Across Australia and New Zealand Check Point has offices in Sydney, Melbourne and Wellington to support its network of distributors and resellers. Check Point solutions are distributed through LAN Systems and Firewall Systems in Australia and New Zealand.</p>
<p>Additional information can be obtained by visiting http://www.checkpoint.com or by contacting Check Point on +61 2 9493 6000.</p>
<p>###</p>
<p>©2003–2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988, and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications.</p>

Most Popular

Market Place