How can I help you? Start Chat

US Phone: 1-866-488-6691
International Phone: +44-2036087492

  • E-Mail
  • Facebook
  • LinkedIn
  • Twitter

Check Point Press Releases

Check Point Positioned as a Leader in the 2014 Gartner Magic Quadrant for Mobile Data Protection for Completeness of Vision and Ability to Execute

Celebrating its 8th Consecutive Year in the Leaders Quadrant, Check Point Prepares to Launch a Next-Generation Mobile Security Solution


San Carlos, CA  —  Thu, 02 Oct 2014

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced it has been positioned in the Leaders Quadrant of Gartner’s recent Magic Quadrant for Mobile Data Protection (MDP)[1]. This is the eighth consecutive year Check Point has been named a Leader.

The growing mobile movement including Bring Your Own Device (BYOD), mobile applications, and cloud services requires organizations to be vigilant in protecting and implementing secure access to corporate information, networks, and applications on-the-go. Check Point delivers industry-leading Mobile Data Protection that emphasizes a simple user experience, reliability, and maximum security across a wide breadth of devices. The company will soon share an exciting next-generation mobile security solution, bringing to market new and innovative safeguards to business information on mobile devices.

“Recent data breaches highlight the immeasurable harm data leakage can cause in the wrong hands. Check Point is committed to providing mobile data protection products that prevent both accidental data loss and access of stolen data through targeted attacks,” said Marie Hattar, chief marketing officer at Check Point Software Technologies. “We believe our continued placement in the Leaders Quadrant reinforces the company’s dedication to providing our customers with best-in-class solutions to encrypt company data and secure mobile devices.”

Check Point offers customers a series of Mobile Data Protection products, with a full security solution to safeguard business information, including Full Disk Encryptionand Media Encryption software blades. These products are part of Check Point’s extensive set of integrated Endpoint Security Suite which includes the following software blades: Firewall and Compliance Check, Endpoint Remote Access VPN, and Anti-Malware & Program Control.

According to Gartner, “Leaders have products that work well for Gartner clients in small and large deployments. They have long-term road maps that follow and/or influence Gartner’s vision of the developing needs of buyers in the market. Leaders make their competitors’ sales staffs nervous and force competitors’ technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists.”

[1] Gartner, Magic Quadrant for Mobile Data Protection, John Girard, September 8, 2014, ID Number: G00262734

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.