CHKP Check Point Software Technologies Ltd.

Cutting complexity to strengthen security: why consolidation matters

Cutting complexity to strengthen security: why consolidation matters

New survey of more than 400 security professionals globally shows non-integrated, point solutions make enterprise security more challenging

SAN CARLOS, Calif., June 11, 2020 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has today announced new findings from a survey, conducted by Dimensional Research, examining global security leaders attitudes towards consolidation.  show that non-integrated, point solutions make enterprise security more challenging. As the threat landscape evolves and cyber-attacks become increasingly more sophisticated, 99% of companies using solutions from multiple vendors cited that it caused challenges to their organization.

The key findings from the survey of 411 IT and security professionals globally confirmed the following:

  • With more assets to secure, confidence in security goes down - 92% of respondents said that securing their IT assets against threats is challenging. Only 34% and 38% of security leaders believe their mobile and IoT devices are properly secured, revealing a considerable gap in organizations’ security posture.
  • Nearly half of organizations deploy 6- 40 security solutions, adding to complexity - Virtually every organization in the survey used multiple security vendors. 49% of all organizations use between 7 and 40 point security products, and 27% of larger organization use between 11 and 40 different vendors’ products.
  • Multiple management consoles obscures visibility - 98% of organizations manage their security products with multiple consoles, creating visibility silos. The inability to get a holistic view of an organization’s threat posture creates visibility challenges, which complicates incident response.
  • Working with multiple security vendors causes challenges for organizations - 79% of security professionals say working with multiple vendors presents significant challenges. Maintenance, version upgrades, contract renewals and other activities related to the care and feeding of a security solution all take valuable time and resources.

“Some organizations operate under the false assumption that more products translate to more security. However, in this situation, global security leaders should adopt the less is more mentality,” said Itai Greenberg, Vice President of Product Management at Check Point. “Adding multiple products from different vendors simply adds more complexity, and can potentially undermine the organization’s security. Enterprises need a consolidated cybersecurity solution that strengthens their defenses while improving their agility against all forms of attack.”

The COVID-19 pandemic has created a phenomenon in our entire working culture. The shifts were global, rapid and widespread. Dramatic changes in your company’s infrastructure presents a unique opportunity to assess your security investments. In the survey, 69% of respondents agree that prioritizing vendor consolidation would lead to better security. The highest level of visibility, reached through consolidation, will guarantee you the security effectiveness needed to prevent sophisticated cyber attack. Unified management and risk visibility fill out your security architecture.

Reducing the number of vendors enables a higher level of security through superior integration, and fewer functional gaps between the protections each product delivers. It also significantly reduces the time, cost and resources of incident remediation processes. is the first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber threats. Infinity’s single management centrally correlates a wide range of events across all network environments, cloud services and mobile infrastructures, and Check Point’s pre-emptive threat prevention technology blocks the most sophisticated attacks before they can inflict damage.

Don’t miss the webinar, “Why Security Consolidation Matters: Reducing Complexity for Better Results” to learn more about Check Point Infinity and how your organization can benefit from a consolidated security architecture. .

The survey was conducted by Dimensional Research, with 411 respondents from organizations of 500+ employees globally.

Follow Check Point via:

Twitter: 

Facebook: 

Blog:

YouTube: 

LinkedIn:

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. () is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

MEDIA CONTACT:INVESTOR CONTACT:
Grace McDougalKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
+1.650.628.2260+1 650.628.2040

 

EN
11/06/2020

Underlying

To request access to management, click here to engage with our
partner Phoenix-IR's CorporateAccessNetwork.com

Reports on Check Point Software Technologies Ltd.

 PRESS RELEASE

Check Point Software Unveils Quantum Firewall Software R82.10 to Secur...

Check Point Software Unveils Quantum Firewall Software R82.10 to Secure the AI-Driven Enterprise New software release introduces more than 20 capabilities that secure AI transformation, enforce Zero Trust and unify hybrid mesh network protection REDWOOD CITY, Calif., Dec. 04, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its new Check Point Quantum Firewall Software, R82.10, introducing 20 new capabilities designed to help enterprises safely adopt AI, protect distributed environments and simplify Zero Trust across hybr...

 PRESS RELEASE

Check Point Software Announces Pricing of Upsized Private Offering of ...

Check Point Software Announces Pricing of Upsized Private Offering of $1.75 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 03, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), a pioneer and global leader of cyber security solutions, today announced the pricing of $1.75 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, as amended (the “Securities Act”). The aggrega...

 PRESS RELEASE

Check Point Software Technologies Named a Leader in Gartner Magic Quad...

Check Point Software Technologies Named a Leader in Gartner Magic Quadrant for Email Security We Believe this Reinforces our Excellence in Email Security with AI-Powered Solutions that Combat Advanced Threats REDWOOD CITY, Calif., Dec. 03, 2025 (GLOBE NEWSWIRE) -- (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, announces that it has been recognized as a Leader in the 2025 Gartner® Magic Quadrant™ for Email Security. Excelling across key areas such as core email protection, integrated email security, and outbound security, Check Point delivers AI-powered protect...

 PRESS RELEASE

Check Point Software Announces Proposed Private Offering of $1.5 Billi...

Check Point Software Announces Proposed Private Offering of $1.5 Billion of 0.00% Convertible Senior Notes due 2030 TEL AVIV, Israel, Dec. 02, 2025 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a pioneer and global leader of cyber security solutions, today announced its intention to offer, subject to market conditions and other factors, $1.5 billion aggregate principal amount of 0.00% Convertible Senior Notes due 2030 (the “Notes”) in a private offering (the “Offering”) to qualified institutional buyers pursuant to Rule 144A under the Securities Act of 1933, a...

 PRESS RELEASE

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing I...

The AI Transformation Has Arrived. Now Comes the Hard Part: Securing It Discover how to build resilient, prevention-first AI security — from models and agents to cloud workloads and connectivity. Live on December 4 REDWOOD CITY, Calif., Dec. 02, 2025 (GLOBE NEWSWIRE) -- Artificial intelligence is transforming the enterprise at unprecedented speed. AI now underpins critical workloads, cloud operations, identity systems, code pipelines, and everyday collaboration tools. As these systems expand across hybrid cloud and edge environments, organizations face a new challenge: how to secure AI ...

ResearchPool Subscriptions

Get the most out of your insights

Get in touch