Check Point to Acquire SASE Security Firm Perimeter 81 for $490 Million
Overview
In a move to expand its network security capabilities, Check Point Software has announced its agreement to acquire Perimeter 81, a Secure Access Service Edge (SASE) and Zero Trust Network Access (ZTNA) solutions provider. The acquisition is valued at $490 million, a significant discount to Perimeter 81’s valuation of $1 billion just a year ago. The deal is expected to close in the third quarter of 2023.
The Importance of SASE and ZTNA
SASE and ZTNA are two emerging technologies in the cybersecurity space that have gained significant traction in recent years. SASE, which stands for Secure Access Service Edge, combines network security and wide-area networking capabilities into one cloud-based platform. It helps organizations secure their network traffic, remote access, and endpoint devices in an increasingly cloud-centric and remote work-oriented environment.
ZTNA, which stands for Zero Trust Network Access, is a security framework that ensures every user and device trying to access a network is verified and validated, regardless of their location. It helps organizations protect against unauthorized access and potential threats by adopting a zero-trust approach to network security.
Perimeter 81’s Offerings
Perimeter 81, founded in 2018, provides a comprehensive platform for securing remote access, network traffic, and endpoint devices through its cloud-delivered Zero Trust Network Access, Firewall as a Service, and Secure Web Gateway offerings. The company has raised $165 million in funding, has more than 200 employees, and serves over 3,000 customers globally.
Check Point’s Strategy
Check Point, a network security giant, plans to leverage Perimeter 81’s capabilities and integrate them into its own Check Point Infinity architecture. The goal is to deliver a unified security solution that spans across network, cloud, and remote users, powered by industry-leading threat prevention.
With hybrid work and cloud transformation becoming increasingly prevalent, the demand for security services that go beyond the traditional network perimeter is on the rise. By acquiring Perimeter 81, Check Point aims to enhance its ability to address these evolving security needs and provide a holistic approach to network security.
Editorial
The acquisition of Perimeter 81 by Check Point is a strategic move that reflects the shifting landscape of cybersecurity. As organizations adopt hybrid work models and migrate more of their operations to the cloud, the traditional approach to network security is no longer sufficient.
SASE and ZTNA technologies offer a more flexible and comprehensive solution for securing networks in this new paradigm. By acquiring Perimeter 81, Check Point is positioning itself to be a leader in this emerging market, combining its existing network security expertise with Perimeter 81’s cloud-delivered security offerings.
However, it is worth noting that Perimeter 81 has faced criticism in the past for its handling of security vulnerabilities, such as the recent incident involving a privilege escalation vulnerability in its macOS application. While Check Point has not addressed these concerns directly, it will be important for the company to address any issues and ensure that security remains a top priority throughout the integration process.
Advice for Organizations
For organizations looking to enhance their network security in the evolving landscape of hybrid work and cloud transformations, it is crucial to consider SASE and ZTNA technologies. These technologies provide a more flexible and comprehensive approach to securing networks, regardless of the location of users or devices.
When considering potential solutions, it is important to thoroughly evaluate the track record and reputation of the providers. Look for providers that prioritize security and have a strong history of addressing vulnerabilities and maintaining a robust security posture. Additionally, consider the scalability and integration capabilities of the solutions to ensure they align with your organization’s long-term security strategy.
Lastly, don’t overlook the importance of training and education for your employees. With remote work becoming more prevalent, it is essential to educate your workforce on best security practices, such as using secure remote access tools and maintaining strong passwords. By investing in your employees’ cybersecurity awareness, you can significantly reduce the risk of security incidents and strengthen your overall security posture.
<< photo by Sigmund >>
The image is for illustrative purposes only and does not depict the actual situation.
You might want to read !
- The Ethics and Implications of China’s Embrace of AI, Facial Recognition, and Surveillance Technologies.
- “Flying into the Future: TSA Introduces Facial Recognition as Next Step in Airport Security”
- The Changing Landscape of Cybersecurity: Introducing the 2023 CISO Choice Awards
- In the Crosshairs: North Korean Cyberspies Launch Attacks on GitHub Developers
- Navigating the Next Steps: Advancing Cybersecurity through a Public-Private Partnership
- The Vulnerability Within: Uncovering the Hidden Threat to 5G Mobile Networks
- The Hidden Risks of Discarded Devices: How Your Old Gadgets Can Become Gateways for Wi-Fi Network Breaches
- The State of Cybersecurity: Key Takeaways from Recent Events
- Is Cloud Security the Next Frontier? Kivera Raises $3.5 Million in Seed Funding
- Exploring the Challenges and Strategies for Managing and Securing Distributed Cloud Environments
- Sweet Security Raises $12M in Seed Funding to Revolutionize Cloud Security
- EvilProxy Cyberattack: When Executives Become Targets in the Microsoft 365 Flood
- Data Privacy Platform Osano Raises $25M in Series B Funding
- Rootly Secures $12 Million in Funding to Revolutionize Incident Resolution for Enterprise IT Teams
- The Rise of Invary: Bridging the Zero Trust Security Gap with $1.85M in Pre-Seed Funding
- How Automation Enables Effective Zero Trust Identity
- AWS SSM Agent Misuse: Unveiling the Covert Remote Access Trojan Undetected
- The Rise of Remote Access Trojans: Windows Search Feature Exploited by Hackers
- “Securing Remote Access Software: Insights from US and Israel”