Contactez-nous Suivez-nous sur Twitter En francais English Language

De la Théorie à la pratique

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN



Check Point in Top Spot for Worldwide Combined Firewall and UTM Appliance Market for Full Year 2014, According to Leading Market Research Firm

May 2015 by Marc Jacob

Check Point Software Technologies Ltd. announced that the company holds the number one vendor position in worldwide combined Firewall and UTM appliance revenue for Full Year (FY) in 2014[i] according to the latest IDC Worldwide Security Appliance Tracker research data.

Data in the IDC Worldwide Security Appliance Tracker indicates:

Check Point leads the global market in combined Firewall and UTM appliance revenue share for FY 2014. Check Point is the leader in combined Firewall and UTM factory revenue in both the U.S. and Western Europe for FY 2014.

“Being a leader in the most recent IDC Tracker data highlights Check Point’s innovative technology and product leadership while also emphasizing our dedication to partners and customers,” said Marie Hattar, chief marketing officer at Check Point Software Technologies. “The threat landscape continues to evolve, and our customers rely on both our world-class hardware and our full-scale security solutions to be more secure.”

The firewall is just one important aspect of a full holistic security solution. Check Point first pioneered the industry with FireWall-1 in 1993 and today continues to protect customers with new advanced technologies that work in collaboration with the firewall. Most recently Check Point introduced Threat Extraction, a radically new security approach that ensures documents are delivered to the end-user with zero malware in zero seconds. Threat Extraction provides flexible protection to meet the needs of any organization and expands Check Point’s Threat Prevention portfolio.

Check Point Threat Prevention delivers defenses with the industry’s best catch rate and comprehensive intelligence to proactively stop botnets, targeted attacks, advanced persistent threats (APTs) and zero-day attacks.

See previous articles


See next articles