Check Point led in this category as well with a 99% malware block rate. In this year’s report, Miercom includes a security efficacy metric for the Secure Services Edge (SSE/SASE) use case. While previous reports dealt with on-premises and cloud network firewalls, this year’s assessment aligns with the evolution of the hybrid mesh firewall requirement. Miercom provides a comprehensive view across all three deployment models: On-premises, cloud, and firewall-as-a-service (SSE/SASE).
Known Exploited Vulnerabilities (KEVs)
By a large margin, Check Point had the best metric with only 1 KEV vs. 11, 16, and 21 for its competitors. In addition to advanced threat prevention metrics, Miercom also provides another important category for head-to-head comparison: KEVs. This report compares the number of Known Exploited Vulnerabilities (KEVs) that each vendor’s firewall solution has experienced, based on publicly available data. KEV’s reflect product vulnerabilities that have been exploited, providing an indication of firewall product security and quality.
From a customer/user perspective, KEVs reflect the susceptibility of each vendor’s firewall solution to be hacked or breached. KEVs also represent a direct monetary and israel whatsapp number data operational costs to users because a) they need to spend expensive operational time to document, study, test, and apply a patch each time a KEV is reported to the industry, and b) hackers will immediately start targeting organizations globally that use firewall products with known exploited vulnerabilities.
The Importance of Continuous Innovation in Threat Prevention
The technical requirements for security platforms have changed dramatically. For example, the newest generation of firewalls incorporate AI/ML solutions to counter cunning and evasive AI-driven attacks. This has pushed firewall evolution greatly over the last few years, including incorporating AI-based threat prevention engines, real-time threat intelligence, and more sophisticated automation.
Similarly, AI-assisted security policy management tools including digital assistants and AI agents can quickly identify vulnerabilities in an enterprise’s complex security policies – and recommend updates or specific steps for policy hygiene. AI copilots can help security teams with rapid analysis of newly announced CVEs (Common Vulnerabilities and Exploits) with guidance for patching or remediation – in minutes vs. weeks of tedious, manual research.
Check Point’s continued leadership in advanced threat prevention is directly attributable to its aggressive investments in AI/ML development, technology R&D, as well as continuous global cyber security research. All of this serves our mission of providing the best cyber security on the market and empowering our customers to stay ahead of threats.
The Miercom report provides a comprehensive set of performance tests and results, as well as details on testing methodologies. Read the full report: Download Miercom report.
New Categories for 2025 Miercom Report
-
- Posts: 846
- Joined: Thu Jan 02, 2025 7:17 am