Quantcast
Channel: Technology Areas Archives - IT-Online
Viewing all articles
Browse latest Browse all 9959

Check Point makes the Magic Quadrant again

$
0
0

Check Point Software Technologies has been positioned as a Leader in the 2015 Gartner Magic Quadrant for Mobile Data Protection.
Celebrating its ninth consecutive year in the Leaders quadrant, Check Point continues to secure the mobile space and recently announced Mobile Threat Prevention.
Gartner states: “Leaders have products that work well for Gartner clients in small and large deployments. They have long-term roadmaps that follow and/or influence Gartner’s vision of the developing needs of buyers in the market. Leaders make their competitors’ sales staffs nervous and force competitors’ technical staffs to follow their lead. Their MDP products are well-known to clients and are frequently found on RFP shortlists.”
“Organisations are more mobile now than ever. Employees increasingly use smartphones and tablets to manage confidential business data, but without the right protection, these devices can give cybercriminals easy access to valuable content, and can allow them to steal critical information,” says Doros Hadjizenonos, country manager of Check Point South Africa. “We believe our continued placement in the Leaders quadrant reflects Check Point’s commitment to provide our customers with innovative solutions that secure devices, protect corporate data, and battle the ever-changing mobile threat environment.”
Check Point offers Mobile Data Protection solutions that prevent accidental data loss, access to stolen data, and intentional data theft. Most recently, Check Point launched Mobile Threat Prevention, a security solution that protects iOS and Android devices by detecting and stopping threats before they start. Mobile Threat Prevention delivers the most complete platform for stopping mobile threats on iOS and Android. It has the industry’s highest mobile threat catch rate, a transparent user experience, and delivers real-time threat intelligence and visibility for extension into existing security and mobility infrastructures.


Viewing all articles
Browse latest Browse all 9959

Trending Articles