Gearset announced its new CI/CD solution, Long Term Projects in Pipelines.
Check Point® Software Technologies Ltd. has been recognized as a leader in The Forrester Wave™: Zero Trust Platform Providers, Q3 2023 report.
Forrester, a leading global research and advisory firm, states in its report that Check Point “sets the bar for centralized management and usability”. Check Point’s Infinity Security Management Portal achieved a leader position and the report notes that it provides ease of use and simplicity to network and security professionals without the need to open multiple windows or tabs to perform daily tasks.
Building security infrastructure around a Zero Trust (ZT) approach using point solutions may lead to a complex deployment and inherent security gaps. To avoid that, Check Point’s Infinity Architecture offers a practical, efficient, and consolidated approach to implementing Zero Trust. Forrester recognized that “Check Point has kept its eye on the current and future needs of supporting Zero Trust (ZT) in a hybrid architecture. Components of its ZTP deploy on-premises as hardware or software, in the cloud SaaS, and virtually to address unique architectural requirements.”
In addition, combining Check Point’s industry leading artificial intelligence (AI) and Deep Learning threat prevention with the zero-trust model can protect enterprises from known and unknown sophisticated cyber threats. In the report, Check Point received the highest ranking in the Market Presence category, and the highest scores possible of five in 13 criteria, among others: data security, device security, centralized management & usability, visibility and analytics, and partner ecosystem.
“We’re proud of this recognition and thank Forrester for recognizing Check Point as a leader in The Forrester Wave™: Zero Trust Platform Providers report, highlighting, in our opinion, our outstanding partner ecosystem and best-in-class security solutions,” said Eyal Manor, VP of Product Management at Check Point. “We believe this recognition validates that our Zero Trust approach keeps our customer applications and business data safe through the unified Infinity cybersecurity architecture, while offering clear visibility and analytics to protect against the latest cyber threats.”
The Check Point Infinity architecture consolidates a wide range of security functions and solutions that enable enterprises to implement all seven principals of the Extended Zero Trust Security model including; networks, cloud workloads, identity awareness, data, devices, visibility, analytics, automation and orchestration To further enhance its Zero Trust approach, Check Point recently completed the acquisition of Perimeter 81. The integration of Perimeter 81 into Check Point Infinity will elevate security measures right from the outset, enabling a Zero-Trust framework with full mesh connectivity among users, branches, and applications.
Industry News
Rafay Systems has extended the capabilities of its enterprise PaaS for modern infrastructure to support graphics processing unit- (GPU-) based workloads.
NodeScript, a free, low-code developer environment for workflow automation and API integration, is released by UBIO.
IBM announced IBM Test Accelerator for Z, a solution designed to revolutionize testing on IBM Z, a tool that expedites the shift-left approach, fostering smooth collaboration between z/OS developers and testers.
StreamNative launched Ursa, a Kafka-compatible data streaming engine built on top of lakehouse storage.
GitKraken acquired code health innovator, CodeSee.
ServiceNow introduced a new no‑code development studio and new automation capabilities to accelerate and scale digital transformation across the enterprise.
Security Innovation has added new skills assessments to its Base Camp training platform for software security training.
CAST introduced CAST Highlight Extensions Marketplace — an integrated marketplace for the software intelligence product where users can effortlessly browse and download a diverse range of extensions and plugins.
Red Hat and Elastic announced an expanded collaboration to deliver next-generation search experiences supporting retrieval augmented generation (RAG) patterns using Elasticsearch as a preferred vector database solution integrated on Red Hat OpenShift AI.
Traceable AI announced an Early Access Program for its new Generative AI API Security capabilities.
StackHawk announced a new integration with Microsoft Defender for Cloud to help organizations build software more securely.
MacStadium announced that it has obtained Cloud Security Alliance (CSA) Security, Trust & Assurance Registry (STAR) Level 1, meaning that MacStadium has publicly documented its compliance with CSA’s Cloud Controls Matrix (CCM), and that it joined the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment.
The Cloud Native Computing Foundation® (CNCF®) released the two-day schedule for CloudNativeSecurityCon North America 2024 happening in Seattle, Washington from June 26-27, 2024.
Sumo Logic announced new AI and security analytics capabilities that allow security and development teams to align around a single source of truth and collect and act on data insights more quickly.