Contact company icon Add as a preferred source Download PDF version

Check Point® Software Technologies Ltd., a pioneering provider of cyber security solutions, signs a definitive agreement to acquire Perimeter 81, a pioneering Security Service Edge (SSE) company.

With this acquisition, Check Point will help organizations accelerate the adoption of secure access across remote users, sites, cloud, datacentres, and the internet, all while aiming to deliver the most secure and fastest SSE solution in the market. Under the terms of the agreement, Check Point will acquire Perimeter 81 for approximately $490 million, on a cash-free, debt-free basis. 

SASE market

Major shift requires an advanced approach to network security that can seamlessly adapt

Hybrid work is now the standard for organizations globally, and digital transformation is continuously shifting data centers to the cloud. This major shift requires an advanced approach to network security that can seamlessly adapt and respond to the needs of the modern, distributed enterprise. 

Gartner sees the Secure Access Service Edge (SASE) market hitting $20B+ by 2026, emphasizing the need for businesses to adopt a consolidated security architecture.

Perimeter 81 

Perimeter 81, launched in 2018 with a team of over 200 employees, serves more than 3,000 customers worldwide. The company recognized as a pioneer in the Forrester Zero Trust Wave, brings an innovative approach to SSE that combines cloud and on-device protection.

Perimeter 81 offers a unique suite of capabilities, including zero trust access, full mesh connectivity between users, branches, and applications. This allows remote users to benefit from fast, secure internet browsing everywhere they go, while addressing cloud privacy violations. Perimeter 81 also enables a simple and fast one-hour deployment versus weeks with traditional solutions, emphasizing ease of use and streamlined management. 

Perimeter 81's capabilities

Perimeter 81 is ideally positioned to support Check Point's vision of delivering a secure SASE solution 

Check Point intends to leverage Perimeter 81's capabilities and integrate them into Check Point Infinity’s architecture to deliver a unified security solution across the network, cloud, and remote users, powered by industry-pioneering threat prevention. Perimeter 81 is ideally positioned to support Check Point's vision of delivering the industry’s fastest, most secure SASE solution.

"With the advent of hybrid work and the rise of cloud transformation, the demand for security services that expand beyond the network perimeter is increasing,” says Gil Shwed, CEO at Check Point Software Technologies. "By leveraging Perimeter 81's capabilities and integrating them into the Check Point Infinity platform we continue with our vision to deliver the best security through comprehensive, collaborative, and consolidated solutions.”

Acquisition of Perimeter 81

This strategic move marks an exciting period for our company, partners, and customers. By joining Check Point, a global leader in cyber security for over 30 years, we aim to deliver the premier SASE platform in the market,” says Amit Bareket, CEO at Perimeter 81. "Our interconnection represents a significant step towards a comprehensive and scalable security for the modern era. We look forward to the positive impact we will jointly create." 

Check Point's acquisition of Perimeter 81 is subject to customary closing conditions and is expected to close in the third quarter of 2023. 

In case you missed it

Which Vertical Markets Have The Greatest Growth Potential For Security?
Which Vertical Markets Have The Greatest Growth Potential For Security?

To serve various vertical markets and industries effectively, security professionals must recognize that each sector has unique assets, risks, compliance requirements, and operatio...

eCLIQ Enhances Security At Marin Hospital Of Hendaye
eCLIQ Enhances Security At Marin Hospital Of Hendaye

The Marin Hospital of Hendaye in the French Basque Country faced common challenges posed by mechanical access control. Challenges faced Relying on mechanical lock-and-key technol...

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measur...