Established by CEO Gil Shwed in 1993, Check Point introduced FireWall-1, the IT industry’s first stateful inspection firewall technology. Over a quarter of a century later, Check Point’s ground-breaking technology remains the gold standard for network security, and the company has continued to deliver innovative cybersecurity solutions.


Check Point Milestones

Check Point innovation begins by understanding customers and their evolving security needs. Today, our leading-edge technologies secure networks, enterprise multi-cloud environments, and endpoint and mobile devices.

In 2006, Check Point raised the bar with the creation of a unified security architecture using a single management console, unified security gateways, and the first agent-based endpoint security. Several years later, Check Point introduced its software blade architecture, a dynamic, revolutionary architecture allowing secure, flexible, and simple solutions to be customized to meet the needs of any organization or environment.

By 2009, the company acquired Nokia’s security appliance business and FaceTime Communications’ application database, adding security controls for over 50,000 Web 2.0 widgets and more than 4,500 internet applications to our security gateways.

In April 2017, the company introduced Check Point Infinity, the first consolidated security across networks, cloud, endpoints, and mobile, providing unparalleled threat prevention. With the acquisition of ForceNock, Check Point Infinity incorporated web application and API protection (WAAP) technology, which uses machine learning, behavioral, and reputation-based security engines. Check Point continues to develop new innovations based on the Infinity Architecture, providing customers with flexible, simple and customizable solutions that meet the exact security needs of any organization.

In October 2018, Check Point acquired Dome9, making cloud deployments safer and more manageable for enterprise transitioning their IT infrastructures.

Check Point is the only vendor to provide a fully consolidated cyber security architecture that provides unprecedented protection against 5th Generation mega-cyberattacks and zero-day cyber threats. Gen V is characterized by an architecture that unifies all networks, cloud, endpoints, and mobile, supported by automatic and immediate threat intelligence.

Check Point’s history with preventative solutions uniquely combines policy, people, and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Check Point provides comprehensive and cutting-edge cyber security technology to more than 100,000 organizations of all sizes and millions of users around the globe. Our foundation for success is our customer-driven philosophy, our continuous technological innovation, as well as our relentless focus to provide comprehensive, innovative security throughout the world.

 

 

This website uses cookies to ensure you get the best experience. Got it, Thanks! MORE INFO