Join the 1500 companies using G2 Track to manage SaaS spend, usage, contracts & compliance.

Check Point Software Technologies

(70)
3.9 out of 5

Year Founded

1993

Total Revenue

$1,855 (USD MM)

HQ Location

San Carlos, CA

Ownership

NASDAQ: CHKP

Check Point Software Technologies Products

Results: 17
ZoneAlarm Pro Firewall
ZoneAlarm, a Check Point Software Technologies, Inc. Company, is a world leader in mobile privacy protection (VPN & antivirus) and consumer Internet security.
Check Point Endpoint Security
Check Point Endpoint Security combines data security, network security, threat prevention technologies and remote access VPN into one package for complete Windows and Mac OS X protection.
Check Point Firewall
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
Check Point Infinity
Check Point Infinity is the only fully consolidated cyber security architecture that provides unprecedented protection against Gen V mega-cyberattacks as well as future cyber threats across all networks, endpoint, cloud and mobile. The architecture is designed to resolve the complexities of growing connectiviity and inefficient security
ThreatCloud Incident Response
ThreatCloud Incident Response helps mitigate future risks with post-incident reports and security best practices advisement.
Check Point Anti-Spam & Email Security Software Blade
Check Point Anti-Spam & Email Security Software Blade is an email security software that provides the industry application security and identity control to organizations of all sizes. It enables IT, teams, to create granular policies based on users or groups to identify, block or limit usage of Web applications and widgets.
Check Point DDoS-P
Check Point DDoS-P (DDoS Protection) uses a hybrid of dedicated on-premises and cloud-based resources to defend against volumetric, application, reflective and resource-exhaustive DDoS attacks.
Check Point MDP
Mobile data protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.
Check Point Services
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats.
Check Point IPS (Intrusion Prevention System)
Check Point IPS (Intrusion Prevention System) combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS software solutions. IPS delivers complete and proactive intrusion prevention, all with the deployment and management advantages of a unified and extensible Next Generation Firewall solution.
Check Point SandBlast
Check Point’s multilayered security technology provides protection against advanced and zero-day cyber threats, preventing attacks, minimizing risks and offering rapid response
Check Point Capsule
Check Point Capsule is one seamless solution that addresses all your mobile security needs. Capsule protects your mobile devices from threats, provides a secure business environment for mobile device use and protects business documents wherever they go.
Check Point Secure Web Gateway
Check Point Secure Web Gateway is a software that that enables secure use of Web 2.0 with real time multi-layered protection against web-borne malware, largest application coverage in the industry, advanced granular control, intuitive centralized management, and essential end-user education functionality.
Check Point  Threat Intelligence
Check Point offers comprehensive intelligence to proactively stop threats, manage security services to monitor networks and incident response to quickly respond to and resolve attacks.
CloudGuard IaaS
CloudGuard IaaS virtualization security (vSEC) for private and public cloud platforms is designed to protect assets in the cloud against the most sophisticated threats.
Endpoint Policy Management
The Check Point Endpoint Policy Management Software Blade simplifies endpoint security management by unifying all endpoint security capabilities for PC & Mac in a single console. Monitor, manage, educate and enforce policy, from an at-a-glance dashboard down to user and machine details, all with a few clicks.
SandBlast Threat Emulation
SandBlast Threat Emulation is a CPU-level threat detection software that prohibits network's infections from malware and targeted attacks.