About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.
NEW! The NGX Platform, a unified security platform for its perimeter, internal and Web security solutions, enables enterprises of all sizes to reduce the cost and complexity of security and ensure that their security systems can be easily extended to adapt to new and evolving threats.
Description: SmartWorkflow provides a formal process of policy change management that helps administrators reduce errors and enhance compliance. Changing business needs produce a constant stream of requests to change firewall security policies. These changes can have far reaching implications if not done correctly including: slower firewall performance, network downtime, increased security risks, and lack of compliance with corporate and industry standards. Enterprises that have multiple firewall administrators and an environment of frequent changes need an automated solution that helps them review and authorize policy changes against approved configuration standards. Check Point’s SmartWorkflow software blade automates policy change management with visual traceability and full auditability.
Description: The Firewall Software Blade provides the highest level of security, with access control, application security, authentication and Network Address Translation (NAT) available to block unauthorized network users and protect enterprise users and data. The Firewall Software Blade leverages the Security Management Software Blades, enabling remote intelligent management with maximum efficiency.
Description: Check Point IPS Software Blade provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in industry-leading total system security and performance. The IPS Blade provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. The Multi-Tier Threat Detection Engine combines signatures, protocol validation, anomaly detection, behavioral analysis, and other methods to provide the highest levels of network IPS protection.
Description: Smart-1 appliances deliver Check Point’s market leading security management software blades on a dedicated hardware platform specifically designed for mid-size and large enterprise security networks. Based on Check Point’s software blade architecture, the line of four Smart-1 appliances are first to deliver a unified management solution for network, IPS and endpoint security with unsurpassed extensibility.
Description: Check Point Power-1™ appliances enable organizations to maximize security in high-performance environments such as large campuses or data centers. They combine firewall, IPSec VPN, and intrusion prevention with advanced acceleration technologies, delivering a high-performance security platform for multi-Gbps environments.
Description: Check Point IP Appliances—formerly Nokia IP Appliances—offer customers a single solution integrated with Check Point R70™ security gateway software. Through the Software Blade architecture, the new IP appliances are available standard with Check Point’s latest intrusion prevention (IPS) software blade. The Check Point IP appliance line now provides enterprises a fully integrated security solution backed by a new support plan, helping lower total cost of ownership.
Description: UTM-1 130™ is an all-inclusive security gateway to protect small businesses and branch offices, starting at only $3,500. The UTM-1 130 simplifies security by combining the industry’s leading firewall, virtual private network (VPN), intrusion prevention, anti-virus, anti-spyware, URL filtering, Web security and messaging security into one centrally-managed, turn-key solution.
UTM-1 130 (with Reflection)
Description: VSX-1™ appliances are dedicated devices for multi-layer, multi-domain virtualized security. VSX-1 allows enterprises, data centers and service providers to consolidate up to 150 security gateways with firewall, IPsec and SSL virtual private network (VPN), intrusion prevention, VoIP security and URL filtering on a single device. Check Point VSX-1 appliance line comes in three models, ranging from 10 virtual security gateways to 150.
VSX-1 9070 (with Reflection)
Description: Check Point VPN-1 Power NGX provides the most intelligent, reliable security for stopping attacks while simplifying business communications across the Internet. A tightly integrated combination of firewall, VPN and intrusion prevention, VPN-1 Power NGX is built on Stateful Inspection, Application Intelligence, and One-Click VPN technologies.
Description: Check Point Endpoint Security™ is the first and only single agent that combines all the critical components for total security on the endpoint. Check Point delivers higher levels of security while providing a transparent end user experience. Unique to endpoint security, the new Check Point WebCheck secures the endpoint against the rising number of web based threats and Check Point OneCheck unlocks all security systems on the PC with a single easy login. Check Point Endpoint Security is also the only single agent to include Data Security and Remote Access VPN. Unification of these essential endpoint security components into a single agent protects organizations from confidential data theft, viruses, and host-based intrusions while reducing administration time and costs associated with endpoint security management.
Description: Eventia Analyzer is a comprehensive security event management solution that automatically prioritizes security events for decisive, intelligent action. Eventia Analyzer turns volumes of raw data into actionable information to empower security administrators to make informed decisions on their security deployment.
Eventia Analyzer Overview Screen Shot
Eventia Analyzer Screen Shot
Description: Connectra allows mobile and remote workers to connect easily and securely to critical resources while protecting enterprise networks and endpoints from external threats. A broad range of connectivity scenarios, integrated intrusion prevention, Check Point Endpoint Security On Demand and powerful centralized management offer unprecedented control over remote access configurations and security policy administration. Connectra can be deployed as a turnkey appliance, software on an open server, or as a virtual appliance.
Connectra 9072 Appliance
Connectra Central Management with SmartCenter
Connectra Central Management with SmartCenter
Connectra Central Management with SmartCenter
Description: Check Point InterSpect, a new family of Internal Security Gateway solutions, revolutionizes the way that customers protect their internal networks and applications. The industry”s first complete internal security solution, Check Point InterSpect provides the deepest and most intelligent security available for safeguarding corporate networks from damaging cyber attacks that are introduced inside the network.
Check Point InterSpect Appliance
Check Point InterSpect GUI
Description: Check Point Safe@Office appliances address the Internet security requirements of small businesses with three to 75 concurrent users. Check Point Safe@Office appliances, starting at $299, are easy-to-use, highly affordable, and deliver the same proven Internet security to small businesses as used by 100% of the Fortune 100.
Check Point Safe@Office Diagram
Check Point Safe@Office 500 Series Appliance
Check Point Safe@Office 500W Wireless Security Appliance
Description: Check Point UTM-1 Edge is a new line of turnkey Check Point VPN/security appliances specifically tailored for easy, cost-effective deployment of security to remote site business locations. Centrally manageable and easily incorporated into existing infrastructures, UTM-1 Edge is ideal for a broad range of business scenarios with remote sites numbering from few to thousands – such as retail sites connecting to corporate resources, franchise locations, small remote offices, and business partner extranets.
Check Point UTM-1 Edge Diagram
Check Point UTM-1 Edge Series Appliance
UTM-1 Edge Wireless Security Appliance
Description: VPN-1 UTM NGX, a comprehensive VPN/security solution especially designed to meet the unique Internet security needs of mid-sized businesses with up to 500 users, delivers all the essential security elements required by a mid-sized business in one convenient, affordable solution – including firewall, VPN, network and application attack protection and multi-site, centralized management.
VPN-1 UTM NGX Diagram
VPN-1 UTM NGX Screen Shot
Description: VPN-1 VSX (Virtual System Extension) NGX is an integrated VPN/firewall solution that provides unmatched security protection and simplified deployment and management for complex security environments. It is designed for enterprise and service provider customers and protects multiple networks by utilizing up to 250 virtualized security gateways running on a single hardware platform, reducing hardware costs and complexity.
Caption: FireWall-1 GX Management Console – The FireWall-1 GX Management Console provides a graphical illustration of the General Packet Radio Service (GPRS) infrastructure (via the Visual Policy Editor). Policy rules enforce security and track GPRS Tunneling Protocol (GTP) communications.
Caption: FireWall-1 GX – FireWall-1 GX provides granular security for GPRS enabled networks. Here, GTP service properties ensure that only authorized GTP traffic is allowed on this link.
Caption: FireWall-1 GX Log File Viewer – A rich set of information is recorded in the FireWall-1 GX log file, including tunnel information such as Tunnel ID, MS-ISDN and APN. This information enables wireless operators the ability to audit, report and alert on GPRS traffic.
For more information contact: Public Relations at (650) 628-2060 or email.