Check Point May Trump the Competition In More Ways than One Check Point made a pretty significant move today when it announced its new application control software blade. Built upon technology that Check Point acquired from Facetime, the new application control software blade can help organizations create and manage usage policies for 50,000 Web 2.0 and social networking applications and widgets.This is a pretty big deal for three reasons:1. Traditional firewalls offer limited help. Web 2.0 applications and social networking widgets bypass network firewalls over wide open Port 80 opening the enterprise to a new threat vector. Check Point can now address this vulnerability.2. Check Point throws its hat into the Palo Alto Networks ring. To date, Palo Alto Networks has created a market with a unique Web application-specific firewall. Check Point can now compete with Palo Alto on specific application security deals or push Palo Alto aside in its installed base.3. The introduction of the application control software blade is just the latest offering in a growing and integrated portfolio. Very quietly, Check Point has put together exactly what enterprise organizations are looking for — a tightly integrated, comprehensive security suite. If Check Point improves its sales and marketing skills, it could push tactical competitors aside and open itself to extremely big enterprise opportunities.Check Point’s application control software blade is a winner on its own, and even more so in a broader Check Point security architecture. Gil Schwed and Co. need to broadcast this news. Related content analysis 5 things security pros want from XDR platforms New research shows that while extended detection and response (XDR) remains a nebulous topic, security pros know what they want from an XDR platform. By Jon Oltsik Jul 07, 2022 3 mins Intrusion Detection Software Incident Response opinion Bye-bye best-of-breed? ESG research finds that organizations are increasingly integrating security technologies and purchasing multi-product security platforms, changing the industry in the process. By Jon Oltsik Jun 14, 2022 4 mins Security Software opinion SOC modernization: 8 key considerations Organizations need SOC transformation for security efficacy and operational efficiency. Technology vendors should come to this year’s RSA Conference with clear messages and plans, not industry hyperbole. By Jon Oltsik Apr 27, 2022 6 mins RSA Conference Security Operations Center opinion 5 ways to improve security hygiene and posture management Security professionals suggest continuous controls validation, process automation, and integrating security and IT technologies. By Jon Oltsik Apr 05, 2022 4 mins Security Practices Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe