Check Point Leading
2026-04-03 03:43:50

Check Point Software Technologies Recognized as Leader in GigaOm 2026 Application and API Security Report

Check Point Software Technologies Shines in GigaOm Report



Check Point Software Technologies Ltd., a global leader in cybersecurity solutions, has once again been recognized as a leader and fast mover in the latest GigaOm Radar report for Application and API Security for the year 2026. This achievement marks the third consecutive year that Check Point has secured a leadership position in this crucial sector. The report applauds Check Point’s Web Application Firewall (WAF) for its high detection accuracy and its ability to safeguard modern web applications and APIs without interfering with legitimate traffic or business operations.

Kirk Ryan, an analyst at GigaOm, highlighted the effectiveness of Check Point's solutions stating, “Through our assessment, it's evident that Check Point provides precise and reliable protection against sophisticated automated attacks, zero-day exploits, and emerging API threats. The WAF excels in high-security environments where accuracy is critical and minimizes false positives while maintaining performance and availability—the foundation of digital business.”

GigaOm evaluated 17 major application and API security solutions and positioned Check Point in the “Maturity/Platform Play” quadrant. The report lauded Check Point's comprehensive capabilities in offering Web Application and API Protection (WAAP), empowering customers to secure their latest applications across hybrid and multi-cloud environments while simplifying operational management.

The key strengths recognized in Check Point's offering include:

  • - Stronger Threat Prevention and Reduced False Positives: Check Point's WAF leverages a dual AI engine architecture that combines pattern recognition with context and behavior analysis, allowing it to accurately detect advanced unknown zero-day threats without relying on signatures or manual tuning. This capability helps customers minimize false positives that could disrupt legitimate traffic while blocking attacks.
  • - Simplified and Reliable API Protection: The built-in protections against common API attacks like Broken Object Level Authorization (BOLA) and Broken Object Property Level Authorization (BOPA), along with automated API discovery and schema validation features, allow security teams to quickly identify and secure exposed APIs as the environment expands.
  • - Integrating Security into Modern Development Workflows: Check Point's WAF supports CI/CD integration, Terraform Infrastructure as Code (IaC), and API-centric architectures, enabling security teams and developers to embed protective measures directly into the development pipeline, ensuring robust security and compliance while facilitating swift releases.

The report emphasizes Check Point's impressive security effectiveness, citing a detection rate of 99.3% in the 2026 WAF comparative tests, with a mere 0.81% false positive rate. Additionally, Check Point scored above market averages across key assessment criteria, including machine learning capabilities, security event management, and core protection.

Integrated with Check Point’s hybrid mesh network architecture, this platform provides unified protection across network, cloud, and application layers, reducing complexity while enhancing the security posture of organizations.

As organizations increase their reliance on APIs, microservices, and AI-driven applications, security teams are challenged to protect the rapidly expanding attack surfaces without hindering innovation. Check Point’s WAF ensures that organizations can securely adopt newly proliferating AI-enabled applications and services, delivering powerful protection that transcends traditional WAAP capabilities.

Paul Barbosa, Vice President of Cloud Security at Check Point, commented, “Applications and APIs are foundational to modern digital business. GigaOm's assessment underscores that Check Point’s WAF enables operations in a prevention-first mode from day one, providing straightforward and precise protection necessary for today’s AI-driven applications. This approach allows us to thwart new threats early, demonstrated by how Check Point's WAF protected customers before the actual exploit of React2Shell occurred.”

Check Point's WAF shields critical applications that support online banking, government services, retail platforms, critical infrastructure, and the new AI workloads. It automatically blocks zero-day and sophisticated API exploit attacks while ensuring legitimate users have uninterrupted access to services.

Download the Report


The complete GigaOm Radar report for Application and API Security can be downloaded here. Explore Check Point's leadership in prevention-first security, exceptional security effectiveness, and cloud-native innovation.

This article is based on a press release published on April 2, 2026, US time.

About Check Point


Check Point Software Technologies (www.checkpoint.com) is a global cybersecurity leader protecting over 100,000 organizations worldwide. The company is committed to safeguarding secure AI transformation for enterprises. Through a prevention-first approach and an open ecosystem architecture, Check Point enables organizations to block advanced threats, prioritize exposure, and automate security operations across complex digital environments. The integrated architecture simplifies protection across hybrid networks, multi-cloud settings, digital workplaces, and AI systems. Centered around four strategic pillars—hybrid mesh network security, workspace security, exposure management, and AI security—Check Point delivers consistent protection and visibility across multi-vendor environments without escalating complexity, empowering organizations to achieve risk reduction, efficiency, and accelerated innovation.

Check Point Software Technologies’ wholly-owned Japanese subsidiary, Check Point Software Technologies K.K. (https://www.checkpoint.com/jp/), was established on October 1, 1997, in Minato-ku, Tokyo.


画像1

Topics Business Technology)

【About Using Articles】

You can freely use the title and article content by linking to the page where the article is posted.
※ Images cannot be used.

【About Links】

Links are free to use.