New software and appliances give Check Point a killer security portfolio In July, Check Point Software beat Wall Street estimates when the company posted over $300 million in revenue, up 15% from 2Q 2010. Check Point also reported that product and software licensing revenue is up 15% from a year ago.Why is Check Point growing? Check Point firewalls have always held a very valuable piece of network real estate, separating corporate networks from a crime infested community called the Internet. But while Check Point has always had one of the best firewalls available, it couldn’t leverage its firewall leadership to capitalize on other security needs.As the financial results indicate, those days are now done. In the past year, Check Point introduced “software blades” that provide discrete security software functionality that can be run anywhere in the enterprise but centrally managed. Four months ago, Check Point introduced software blades for application control, DLP, identity awareness, and mobile security — all hot areas. While Check Point was re-architecting its products over the last year, enterprise organizations were desperately adding new security controls, rationalizing their security products, and searching for tightly integrated security suites. Unlike the unfortunate fishermen from Gloucester, MA, Check Point sailed into a perfect storm that seems to producing plenty of benefits.This week, Check Point made two announcements that should accelerate its momentum. First, Check Point announced a new version of its software (R75.20) that provides additional security protection across all server blades with things like URL filtering and SSL termination. Yes, these aren’t new features, but remember that Check Point integration cascades these features across all security applications. In other words, more security and more integration — just what enterprise CISOs are looking for. As part of this announcement, Check Point will also roll-out a new family of high performance of appliances. Okay, I know what you are thinking. Appliances are so 2007, won’t security be run as a VM or in the cloud? Sometimes, but not in high-bandwidth data center networks anytime soon. Large enterprises need appliances that can run multiple concurrent security applications on high bandwidth networks without any performance degradation. Check Point’s new appliances can do this, even at the very high-end. This should provide new market opportunities in the wireless carrier, eCommerce, and cloud computing markets. So to sum it up, Check Point now has a bunch of security applications and a family of high-end appliances to run them on. Oh and Check Point has always been known for its management and operations tools as well. If you continue to think of Check Point as a firewall company you are dead wrong. Gil Shwed and company may have the broadest network security portfolio available from a single vendor today. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe