SOURCE: Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd.

March 15, 2011 08:30 ET

Check Point and Ponemon Survey Validates Need for 3D Security

Global Survey Reveals Emerging IT Technology and Limited User Awareness Creates Greater Security Complexity

REDWOOD CITY, CA--(Marketwire - March 15, 2011) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, and the Ponemon Institute, a leading privacy and information management research firm, today released the findings of a global survey, Understanding Security Complexity in 21st Century IT Environments, revealing that security complexity is the number one obstacle that organizations face today. Research shows organizations struggle with a growing set of security priorities and limited employee awareness about corporate policies in place. Key findings from the report validate the importance of Check Point 3D Security, a new approach to security that goes beyond technology and combines policy, people and enforcement to help organizations align their IT policies with their business needs.

According to the survey of over 2,400 IT security administrators around the world, managing complex security environments is the most significant challenge facing organizations today, with over 55 percent of companies using more than seven different vendors to secure their network. Research shows that, when dealing with IT consolidation, organizations struggle with minimizing the total cost of ownership (TCO) and maximizing performance. To enforce better protection, organizations need to approach security with a holistic view of their environment in order to understand where risks can reside.

"To improve security in this day and age, organizations need to accomplish a better understanding of their current environments and prioritize their short and long term initiatives," said Juliette Sultan, head of global marketing at Check Point Software Technologies. "Check Point's approach with 3D Security goes beyond technologies -- it also raises awareness on today's security challenges, while providing better visibility and control to organizations."

According to the survey, over 700 respondents believe the primary concern with emerging technology adoption is compliance. With the proliferation of cloud computing, mobility, Web 2.0 and file sharing applications, organizations often struggle to apply the appropriate levels of security across all layers of the network, while also adhering to stringent compliance requirements. Security and compliance in modern day environments begins with a well-defined policy that aligns with an organization's business needs and industry regulations. 

While emerging technologies have created new methods of communication and collaboration for enterprises, organizations struggle with managing multifaceted IT environments; this often contributes to greater security complexity and the risk of data loss by employees or other insiders. In fact, 48.8 percent of respondents believe their organizations' employees have little or no awareness about their data protection or corporate policies. As a result, more education and awareness is needed to help people realize their important role in maintaining the organization's security profile. In addition, survey respondents believe the ability to manage policies by user is a key functionality to enforce better security overall, with 58 percent citing identity awareness as a priority today and in the future.

"Companies are constantly facing new and costly security risks from both internal and external sources that can jeopardize the business. Our research has shown that one cyber-attack can range anywhere from $237,000 to $52 million," said Dr. Larry Ponemon, chairman and founder, Ponemon Institute. "However, employees can play a big role in being a first line of defense, helping their company enforce stronger security measures and promoting more user awareness within the organization."

Check Point's Software Blade Architecture™ and latest software, Release R75 executes on the company's vision for 3D Security -- turning security into a three-dimensional business process by combining policies, people and enforcement for stronger protection. With a unique combination of innovative technology and user awareness, organizations today are better positioned for preemptively protecting their business against the next generation of threats. For more information and access to the full report, visit:

The survey, Understanding Security Complexity in 21st Century IT Environments, was independently conducted by the Ponemon Institute in February 2011, surveying IT security administrators located in the U.S., U.K. France, Germany and Japan. The survey sample represents organizations of all sizes and across 14 different industries, including financial, industrial, defense, retail, healthcare and education.

"By educating end-users and enforcing security policies with a holistic view of the organization, companies can minimize the complexities associated with security and compliance in modern-day business environments," concluded Sultan.

About the Ponemon Institute
The Ponemon Institute© is dedicated to advancing responsible information and privacy management practices in business and government. To achieve this objective, the Institute conducts independent research, educates leaders from the private and public sectors and verifies the privacy and data protection practices of organizations in a variety of industries.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (, the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

©2011 Check Point Software Technologies Ltd. All rights reserved

Contact Information