Check Point Software Technologies Whitepapers


Sort by: Date | Company | Title


Bridging the Enterprise Mobility Gap
By Check Point Software Technologies | 14/12/2014

Mobile computing is no longer a “fad”—recent ESG research data shows that 87% of enterprise organisations say mobile computing is either “critical” or “very important” for supporting business processes and employee productivity. In fact, ESG research indicates that 42% of enterprises are actively developing a significant number of mobile applications themselves. Report the full report today.

Download this now


Check Point: A Gartner Magic Quadrant Leader in Enterprise Network Firewalls Since 1997
By Check Point Software Technologies | 28/4/2015

For the eighteenth consecutive year, Check Point has been positioned in the "Leaders" quadrant in the Magic Quadrant for Enterprise Network Firewalls1. Gartner evaluates each vendor’s Enterprise Network Firewall offerings on a scale of completeness of vision and ability to execute.

Download this now


Cyber Security Guide - 10 Steps to a More Secure Business
By Check Point Software Technologies | 9/3/2015

Just as we’ve learned to tune out car alarms, so have we become impervious to the headlines of cybercrime. That’s despite cybercriminals stealing over 500 million identities1 in 2014, alone. According to a December 2014 Computer Weekly article2, “The production of malware continues on an industrial scale, with exploit kits and malware services putting sophisticated attack methods in the hands of relatively unskilled cyber criminals.” And unfortunately, ignoring the issue will not make it go away.

Download this now


Federal Guide to the Value of Encryption
By Check Point Software Technologies | 5/9/2013

Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Find out which encryption solutions are best to automatically obscure digital files and make them unreadable by unauthorized users. Click to download

Download this now


Forrester Research : Use Actionable Threat Intelligence to Protect your Digital Business.
By Check Point Software Technologies | 14/12/2014

How do you ensure you are choosing the right threat intelligence solution for your organization?

The recent Forrester Research, Inc. report, “Use Actionable Threat Intelligence to Protect Your Digital Business,” describes the characteristics of effective threat intelligence and what to look for in a threat intelligence vendor (August 2014).

Download this now


Gartner Magic Quadrant for Mobile Data Protection (MDP)
By Check Point Software Technologies | 14/12/2014

Gartner has positioned Check Point as a Leader in the Mobile Data Protection (MDP) Magic Quadrant for the eighth consecutive year.1 Gartner evaluates each company’s MDP offerings on a scale of completeness of vision and ability execute.

Read the full report to see which vendors made it to the Magic Quadrant, compare their strengths and cautions, and see what Gartner says about Check Point.

Download this now


Guide to the TCO of Encryption
By Check Point Software Technologies | 5/9/2013

While “free” open-source applications still carry unavoidable costs of installation, management, and usage, some costs can be controlled or even eliminated by smart use of appropriate applications, management technology, and best practices. In this whitepaper, we analuse the total cost of owning, managing and using full-disk encryption in large organisations. Click to download!

Download this now


Handheld Wireless Security
By Check Point Software Technologies | 5/9/2013

Smartphones are rapidly becoming an indispensable communication and computing tool for the world’s expanding mobile workforce. As Smartphones and other handheld wireless communication devices become an integral part of the modern business landscape, the advances in flexibility, power, and mobile access come with a risk. Find out how to stay competitive in a changing business world and leverage technology to meet future needs.

Download this now


Miercom Advanced Threat Prevention with Sandbox Analysis Testing Report
By Check Point Software Technologies | 14/12/2014

Protecting against known, and new, advanced, unknown threats requires the most rapid and precise detection and protection technologies. With multiple solutions available, finding the best one can be challenging. Independent testing firm Miercom took on this challenge and tested network-based advanced threat prevention solutions that use virtual sand boxing. They found the solution delivering the fastest, most accurate and efficient solution against known and unknown threats.

Download this now


Network boundaries have gone mobile
By Check Point Software Technologies | 15/12/2014

Today’s employees carry smartphones, tablets and laptops and rarely think twice about using their personal devices for work or work devices for personal activities. The mobile workforce will surpass 1.3 billion people, or 37% of the world’s overall workforce, by 2015 according to IDC.1

Download this now