Is Check Point + Wiz ≥ Palo Alto Networks?

Is Check Point + Wiz ≥ Palo Alto Networks?

This was the succinct, though perhaps overly arcane, title I had hoped to use for an opinion piece analyzing the announced partnership between Check Point and Wiz in cloud security. In the event, I was informed that Omdia's content management system might baulk at exotic symbols (I was tempted to ask whether '≥' is really that exotic, but heigh ho...) and so had to settle for something rather more verbose, but which nonetheless conveys that same basic idea, namely:

Can Check Point plus Wiz outdo Palo Alto Networks in the cloud?

The piece distils my initial thoughts on the topic, covering things like the relative strengths of each of the partners and trying to assess their combined potential against Palo Alto Networks, the current market leader in the cloud native application protection platform (CNAPP) market.

Palo, as it is affectionately known in the trenches of the Cloud Wars, has been going from strength to strength over the last year or so, executing effectively on its well-publicized platformization strategy and reaping the top- and bottom-line benefits. Thus, mounting a serious challenge to Palo in cloudsec is currently a tall order, and perhaps one that requires a partnership between the nos. 2 (Wiz) and 3 (Check Point) to achieve anything.

Anyway, it's free-to-air, though you may have to provide you name and email address to access it (and we won't be accepting any Charlie Chaplins, Che Guevaras, or Slobodan Milosevics...). Take a gander:

https://omdia.tech.informa.com/om128516/can-check-point-plus-wiz-outdo-palo-alto-networks-in-the-cloud

要查看或添加评论,请登录

Rik Turner的更多文章

  • Wiz to swim in the Alphabet soup

    Wiz to swim in the Alphabet soup

    By now just about everybody and his uncle has weighed in on the putative Alphabet/Wiz deal and I'm sure many of you…

    1 条评论
  • Is cyber performance management the revenge of best-of-breed?

    Is cyber performance management the revenge of best-of-breed?

    Some of you may have read my recent post about the importance of emerging cyber market segments requiring ideally a…

    2 条评论
  • A rose by any other name...

    A rose by any other name...

    My job allows me to indulge my curiosity regarding new and upcoming (nay, "emerging") cybersecurity technologies and…

    2 条评论
  • Talking 'bout funding...

    Talking 'bout funding...

    Along with my colleague Amira Armir, I've just recorded our latest virtual Fireside Chat to discuss the Q3 version of…

  • On the road to Mandalay: calling all Black Hatters

    On the road to Mandalay: calling all Black Hatters

    As you no doubt will be aware, next week is Black Hat USA, one of the major annual bean-feasts in the cyber calendar…

    6 条评论
  • Can Security catch up with Application Development in the Cloud Era?

    Can Security catch up with Application Development in the Cloud Era?

    That's the title of a webinar I was on earlier this week with Rapha?l Peyret, who is VP of Product for Cloud Security…

  • Threat Intel and its Role in Third-Party Risk Management

    Threat Intel and its Role in Third-Party Risk Management

    I've been on the road for a couple of weeks, which means I've been a bit remiss about highlighting the really good…

    5 条评论
  • RSAC musings

    RSAC musings

    As you may have noticed (and if you're in cyber, how on earth could you avoid doing so?), last week was the annual RSA…

    8 条评论
  • Setting the scene for the RSA Conference

    Setting the scene for the RSA Conference

    I've just come back from an amazing vacation around South America, but while I was away my illustrious and esteemed…

    1 条评论
  • On ASPM and octopuses

    On ASPM and octopuses

    I've seen some discussion here on LinkedIn as to whether the static code analysis twins SAST and SCA, if brought…

    2 条评论

社区洞察

其他会员也浏览了