Headlines

Exploring the Growing Importance of SASE Security: Check Point’s Acquisition of Perimeter 81

Exploring the Growing Importance of SASE Security: Check Point's Acquisition of Perimeter 81sasesecurity,checkpoint,perimeter81,networksecurity,cloudsecurity,cybersecurity,secureaccessserviceedge,software-definedperimeter,zerotrustsecurity,remoteaccess,networkarchitecture

Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million

Overview

In a move to expand its network security capabilities, Check Point Software has announced its agreement to acquire Perimeter 81, a Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) solutions provider. The acquisition is valued at $490 million, a significant discount to Perimeter 81’s valuation of $1 billion just a year ago. The deal is expected to close in the third quarter of 2023.

The Importance of SASE and ZTNA

SASE and ZTNA are two emerging technologies in the cybersecurity space that have gained significant traction in recent years. SASE, which stands for Secure Access Service Edge, combines network security and wide-area networking capabilities into one cloud-based platform. It helps organizations secure their network traffic, remote access, and endpoint devices in an increasingly cloud-centric and remote work-oriented environment.

ZTNA, which stands for Zero Trust Network Access, is a security framework that ensures every user and device trying to access a network is verified and validated, regardless of their location. It helps organizations protect against unauthorized access and potential threats by adopting a zero-trust approach to network security.

Perimeter 81’s Offerings

Perimeter 81, founded in 2018, provides a comprehensive platform for securing remote access, network traffic, and endpoint devices through its cloud-delivered Zero Trust Network Access, Firewall as a Service, and Secure Web Gateway offerings. The company has raised $165 million in funding, has more than 200 employees, and serves over 3,000 customers globally.

Check Point’s Strategy

Check Point, a network security giant, plans to leverage Perimeter 81’s capabilities and integrate them into its own Check Point Infinity architecture. The goal is to deliver a unified security solution that spans across network, cloud, and remote users, powered by industry-leading threat prevention.

With hybrid work and cloud transformation becoming increasingly prevalent, the demand for security services that go beyond the traditional network perimeter is on the rise. By acquiring Perimeter 81, Check Point aims to enhance its ability to address these evolving security needs and provide a holistic approach to network security.

Editorial

The acquisition of Perimeter 81 by Check Point is a strategic move that reflects the shifting landscape of cybersecurity. As organizations adopt hybrid work models and migrate more of their operations to the cloud, the traditional approach to network security is no longer sufficient.

SASE and ZTNA technologies offer a more flexible and comprehensive solution for securing networks in this new paradigm. By acquiring Perimeter 81, Check Point is positioning itself to be a leader in this emerging market, combining its existing network security expertise with Perimeter 81’s cloud-delivered security offerings.

However, it is worth noting that Perimeter 81 has faced criticism in the past for its handling of security vulnerabilities, such as the recent incident involving a privilege escalation vulnerability in its macOS application. While Check Point has not addressed these concerns directly, it will be important for the company to address any issues and ensure that security remains a top priority throughout the integration process.

Advice for Organizations

For organizations looking to enhance their network security in the evolving landscape of hybrid work and cloud transformations, it is crucial to consider SASE and ZTNA technologies. These technologies provide a more flexible and comprehensive approach to securing networks, regardless of the location of users or devices.

When considering potential solutions, it is important to thoroughly evaluate the track record and reputation of the providers. Look for providers that prioritize security and have a strong history of addressing vulnerabilities and maintaining a robust security posture. Additionally, consider the scalability and integration capabilities of the solutions to ensure they align with your organization’s long-term security strategy.

Lastly, don’t overlook the importance of training and education for your employees. With remote work becoming more prevalent, it is essential to educate your workforce on best security practices, such as using secure remote access tools and maintaining strong passwords. By investing in your employees’ cybersecurity awareness, you can significantly reduce the risk of security incidents and strengthen your overall security posture.

Cybersecuritysasesecurity,checkpoint,perimeter81,networksecurity,cloudsecurity,cybersecurity,secureaccessserviceedge,software-definedperimeter,zerotrustsecurity,remoteaccess,networkarchitecture


Exploring the Growing Importance of SASE Security: Check Point
<< photo by Sigmund >>
The image is for illustrative purposes only and does not depict the actual situation.

You might want to read !