STOCK TITAN

Cutting complexity to strengthen security: why consolidation matters

Rhea-AI Impact
(Neutral)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary

Check Point (NASDAQ: CHKP) released findings from a survey by Dimensional Research indicating that the use of multiple security vendors complicates enterprise security. Key results reveal that 92% of security leaders find protecting IT assets challenging, and nearly half of organizations manage between 7 to 40 security solutions. A striking 79% of professionals report difficulties with vendor management. The survey underscores the need for a consolidated cybersecurity approach to enhance security assurance, especially in light of the evolving threat landscape exacerbated by COVID-19.

Positive
  • Survey results suggest a strong demand for vendor consolidation in cybersecurity, with 69% of respondents favoring it for enhanced security.
  • Check Point Infinity offers a comprehensive solution to manage security across various platforms, providing a unified defense against cyber threats.
Negative
  • 92% of security professionals feel challenged in securing IT assets, indicating potential vulnerabilities.
  • The complexity of managing multiple security solutions may lead to ineffective threat responses, highlighting operational inefficiencies.

SAN CARLOS, Calif., June 11, 2020 (GLOBE NEWSWIRE) -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a leading provider of cyber security solutions globally, has today announced new findings from a survey, conducted by Dimensional Research, examining global security leaders attitudes towards consolidation. These findings show that non-integrated, point solutions make enterprise security more challenging. As the threat landscape evolves and cyber-attacks become increasingly more sophisticated, 99% of companies using solutions from multiple vendors cited that it caused challenges to their organization.

The key findings from the survey of 411 IT and security professionals globally confirmed the following:

  • With more assets to secure, confidence in security goes down - 92% of respondents said that securing their IT assets against threats is challenging. Only 34% and 38% of security leaders believe their mobile and IoT devices are properly secured, revealing a considerable gap in organizations’ security posture.
  • Nearly half of organizations deploy 6- 40 security solutions, adding to complexity - Virtually every organization in the survey used multiple security vendors. 49% of all organizations use between 7 and 40 point security products, and 27% of larger organization use between 11 and 40 different vendors’ products.
  • Multiple management consoles obscures visibility - 98% of organizations manage their security products with multiple consoles, creating visibility silos. The inability to get a holistic view of an organization’s threat posture creates visibility challenges, which complicates incident response.
  • Working with multiple security vendors causes challenges for organizations - 79% of security professionals say working with multiple vendors presents significant challenges. Maintenance, version upgrades, contract renewals and other activities related to the care and feeding of a security solution all take valuable time and resources.

“Some organizations operate under the false assumption that more products translate to more security. However, in this situation, global security leaders should adopt the less is more mentality,” said Itai Greenberg, Vice President of Product Management at Check Point. “Adding multiple products from different vendors simply adds more complexity, and can potentially undermine the organization’s security. Enterprises need a consolidated cybersecurity solution that strengthens their defenses while improving their agility against all forms of attack.”

The COVID-19 pandemic has created a phenomenon in our entire working culture. The shifts were global, rapid and widespread. Dramatic changes in your company’s infrastructure presents a unique opportunity to assess your security investments. In the survey, 69% of respondents agree that prioritizing vendor consolidation would lead to better security. The highest level of visibility, reached through consolidation, will guarantee you the security effectiveness needed to prevent sophisticated cyber attack. Unified management and risk visibility fill out your security architecture.

Reducing the number of vendors enables a higher level of security through superior integration, and fewer functional gaps between the protections each product delivers. It also significantly reduces the time, cost and resources of incident remediation processes. Check Point Infinity is the first consolidated security architecture across networks, cloud, mobile and IoT, providing the highest level of threat prevention against both known and unknown cyber threats. Infinity’s single management centrally correlates a wide range of events across all network environments, cloud services and mobile infrastructures, and Check Point’s pre-emptive threat prevention technology blocks the most sophisticated attacks before they can inflict damage.

Don’t miss the webinar, “Why Security Consolidation Matters: Reducing Complexity for Better Results” to learn more about Check Point Infinity and how your organization can benefit from a consolidated security architecture. Register today.

The survey was conducted by Dimensional Research, with 411 respondents from organizations of 500+ employees globally.

Follow Check Point via:
Twitter: http://www.twitter.com/checkpointsw
Facebook: https://www.facebook.com/checkpointsoftware
Blog: http://blog.checkpoint.com
YouTube: http://www.youtube.com/user/CPGlobal
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading provider of cyber security solutions to governments and corporate enterprises globally. Its solutions protect customers from 5th generation cyber-attacks with an industry leading catch rate of malware, ransomware and other types of attacks. Check Point offers multilevel security architecture, “Infinity” Total Protection with Gen V advanced threat prevention, which defends enterprises’ cloud, network and mobile device held information. Check Point provides the most comprehensive and intuitive one point of control security management system. Check Point protects over 100,000 organizations of all sizes.

100%; border-collapse:collapse !important;">
40%; width:40%; min-width:40%;">MEDIA CONTACT:60%; width:60%; min-width:60%;">INVESTOR CONTACT:
Grace McDougalKip E. Meintzer
Check Point Software TechnologiesCheck Point Software Technologies
+1.650.628.2260+1 650.628.2040
press@us.checkpoint.comir@us.checkpoint.com

 


FAQ

What are the key findings from Check Point's survey on vendor consolidation?

The survey found that 92% of respondents face challenges securing IT assets, with a majority managing multiple security solutions and emphasizing the need for consolidation.

How does vendor consolidation impact cybersecurity according to Check Point's findings?

Vendor consolidation is believed to improve security effectiveness and reduce complexity in managing cybersecurity solutions, as highlighted by 69% of survey respondents.

What percentage of organizations use multiple security vendors?

The survey revealed that 49% of organizations are utilizing between 7 and 40 security solutions, contributing to operational complexity.

How has COVID-19 influenced security practices at organizations?

The pandemic prompted organizations to reassess their security investments, with many acknowledging the need for prioritizing vendor consolidation for better security management.

Check Point Software Technologies Ltd

NASDAQ:CHKP

CHKP Rankings

CHKP Latest News

CHKP Stock Data

20.86B
85.09M
22.63%
72.01%
2.89%
Software - Infrastructure
Technology
Link
United States of America
Tel Aviv