Site icon Aragon Research

Check Point Acquires Perimeter 81—Securing Remote Access

By: Craig Kennedy

 

Check Point Acquires Perimeter 81—Securing Remote Access

On Thursday, August 10 2023, Check Point Software signed a definitive agreement to acquire Perimeter 81 for $490 million in a cash free, debt free deal. This marks Check Point’s largest acquisition to date, the prior being the acquisition of Zone Labs in 2003 for $205 million.

Who is Perimeter 81?

Perimeter 81, founded by Amit Bareket and Sagi Gidal in 2018, is an Israeli based cloud and network security company that develops software that secures remote networks, based on zero trust network access (ZTNA). In June 2022, the company announced it had raised $100 million in Series C funding and received a $1 billion valuation.

Perimeter 81 has over 200 employees and over 3,000 customers. It offers a fully cloud-native service enabling any business to easily build a secure corporate network spanning disparate private and public networks all managed from a unified console.

Who is Check Point?

Check Point Software is a provider of cybersecurity solutions that protect organizations from cyberattacks. The company offers a broad range of security products and services, covering network, cloud, endpoint, IoT, mobile, data, and threat intelligence.

Its Infinity portfolio of solutions are designed to protect organizations from advanced cyberattacks. Check Point was recently featured in Aragon Research’s Market Insights Guide for AI in Cybersecurity.

How Does This Benefit Check Point?

Check Point plans on integrating Perimeter 81´s capabilities into the Check Point Infinity platform, consistent with its goal of delivering security through comprehensive and consolidated solutions. This acquisition will only strengthen Check Point’s existing secure access service edge (SASE) offering with Perimeter 18’s potent SSE technology, providing organizations with fast and scalable secure access, regardless of location, across the network, cloud, and remote users.

Bottom Line:

Perimeter 18 has solid SSE and ZTNA capabilities that will mesh well with Check Point’s platform offerings. Check Point already had solid SASE and ZTNA offerings, however by integrating Perimeter18’s technology, Check Point’s product offerings will only be strengthened.


See Craig LIVE for “Cybersecurity in the Age of AI: Fighting Fire With Fire”

Airing LIVE on Thursday, August 17th at 10 AM PT | 1 PM ET

 

Cybercriminals are aggressively weaponizing artificial intelligence (AI) to launch increasingly effective cyberattacks against organizations. These cybercriminals are using AI to launch sophisticated and stealthy cyberattacks, such as creating realistic deep fakes, generating malware that can evade detection systems, creating convincing phishing emails, or identifying and exploiting vulnerabilities in real-time.

In this webinar, you will learn how AI can help you fight fire with fire to combat and survive these AI-powered cybersecurity attacks.

Some key areas we’ll cover:

Button Text


This blog is a part of the Digital Operations blog series by Aragon Research’s Sr. Director of Research, Craig Kennedy.

Missed an installment? Catch up here!

 

Blog 1: Introducing the Digital Operations Blog Series

Blog 2: Digital Operations: Keeping Your Infrastructure Secure

Blog 3: Digital Operations: Cloud Computing

Blog 4: Cybersecurity Attacks Have Been Silently Escalating

Blog 5: Automation—The Key to Success in Today’s Digital World

Blog 6: Infrastructure—Making the Right Choices in a Digital World

Blog 7: Open-Source Software—Is Your Supply Chain at Risk?

Blog 8: IBM AIU—A System on a Chip Designed For AI

Blog 9: IBM Quantum: The Osprey Is Here

Blog 10: The Persistence of Log4j

Blog 11: AWS re:Invent 2022—Focus on Zero-ETL for AWS

Blog 12: AWS re:Invent 2022—The Customer Is Always Right

Blog 13: How Good is the New ChatGPT?

Blog 14: The U.S. Department of Defense Embraces Multi-Cloud

Blog 15: 2022 Digital Operations—The Year in Review

Blog 16: Lucky Number 13 for Intel—Intel Is Back on Top

Blog 17: Quantum Decryption—The Holy Grail for Cybercriminals

Blog 18: Microsoft and OpenAI—Intelligent Partnership

Blog 19: ChatGPT—The First One Is Free

Blog 20: Bing and ChatGPT—Your Co-Pilot When Searching the Web

Blog 21: ESXiArgs—Ransomware Attack on VMware

Blog 22: The Cost of Supply Chain Security—$250M in Sales

Blog 23: OpenAI Delivers on APIs—Accelerating the Adoption of ChatGPT

Blog 24: OpenAI Delivers on Plugins—Is ChatGPT The New Generative Content Platform?

Blog 25: Microsoft Security Copilot—Defending the Enterprise at the Speed of AI

Blog 26: Operation Cookie Monster Takes a Huge Bite Out of The Dark Web

Blog 27: AWS Bedrock—Amazon’s Generative AI Launch

Blog 28: Google Cloud Security AI Workbench – Conversational Security

Blog 29: World Password Day – Is This the Last Anniversary

Blog 30: Intel Partners to Enter the Generative AI Race—Aurora genAI

Blog 31: Charlotte AI – CrowdStrike Enters the Generative AI Cybersecurity Race

Blog 32: NICE Catches the Generative AI Wave

Blog 33: AMD Instinct MI300X—A New Challenger to Nvidia

Blog 34: Storm-0558—Chinese Cyber Attack on US Government Organizations

Blog 35: Network Resilience Coalition—Making the Network Safer

Blog 36: Frontier Model Forum—Power Players Unite to Make AI Safer

Blog 37: Intel Is Back in the Foundry Business—Entering the Angstrom Era

Exit mobile version