SOURCE: Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd.

September 26, 2011 08:30 ET

Check Point Positioned as a Leader in the 2011 Magic Quadrant for Mobile Data Protection

REDWOOD CITY, CA--(Marketwire - Sep 26, 2011) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced it has been positioned in the "Leaders" quadrant in Gartner's recent Magic Quadrant for Mobile Data Protection, 20111. According to Gartner research, "Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits."

Check Point is acknowledged by both customers and analysts firms for its comprehensive endpoint solutions that secure data on mobile platforms such as laptops, smartphones, and removable media. Check Point customers can choose from an extensive set of integrated security capabilities -- including Firewall/Compliance Check, Full Disk Encryption, Media Encryption, WebCheck Browser Security, Remote Access VPN, and Anti-Malware with Program Control. These endpoint software blades help customers prevent the loss, theft and unauthorized access or transfer of confidential information by protecting sensitive data using in-depth security analysis, encryption, access control, and policy-driven security.

"Some of the most costly data breaches happen as the result of lost or stolen laptops and removable devices. This makes encrypting company data and securing mobile endpoints a top priority for businesses today," said Juliette Sultan, head of global marketing at Check Point Software Technologies. "We believe our positioning in the Magic Quadrant affirms our strategic vision and the extremely high ratings we get from our customers in this area. We will continue to deliver the best technology solutions to protect their mobile data."

According to Gartner, companies that are positioned in the Leaders quadrant, "have products that work well for Gartner clients in small and large deployments. They have long-term road maps that follow and/or influence Gartner's vision of the developing needs of buyers in the market. Leaders make their competitors' sales staffs nervous, and force competitors' technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists. In 2011, the companies that execute strongly enough to differentiate themselves as Leaders are endpoint protection platform (EPP) vendors that all made MDP acquisitions."

For more information on Gartner's Mobile Data Protection Magic Quadrant, visit: http://www.checkpoint.com/products/promo/gartner-mobile/index.html

About the Gartner Magic Quadrant
The Magic Quadrant is copyrighted in September 2010 by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

1 September, 2011: Magic Quadrant for Mobile Data Protection, by John Girard, Eric Ouellet

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

©2011 Check Point Software Technologies Ltd. All rights reserved