DISCLAIMER OF WARRANTY

Check Point Software Technologies Ltd. makes no representation or warranties, either express or implied by or with respect to anything in this document, and shall not be liable for any implied warranties of merchantability or fitness for a particular purpose or for any indirect special or consequential damages.

COPYRIGHT NOTICE

No part of this publication may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, photocopying, recording or otherwise, without prior written consent of Check Point Software Technologies Ltd. No patent liability is assumed with respect to the use of the information contained herein. while every precaution has been taken in the preparation of this publication, Check Point Software Technologies Ltd. assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice.

Copyright © Check Point Software Technologies Ltd. All rights reserved

TRADEMARKS

©2003-2020 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point 2200, Check Point 4000 Appliances, Check Point 4200, Check Point 4400, Check Point 4600, Check Point 4800, Check Point 12000 Appliances, Check Point 12200, Check Point 12400, Check Point 12600, Check Point 21400, Check Point 21600,Check Point 21700, Check Point 6100 Security System, Check Point Anti-Bot Software Blade, Check Point Anti-Virus Software Blade,Check Point Application Control Software Blade, Check Point Data Loss Prevention, Check Point DDoS Protector, Check Point DLP, Check Point DLP-1, Check Point Endpoint Security, Check Point Endpoint Security On Demand, Check Point Firewall Software Blade, Check Point Full Disk Encryption, Check Point GAiA, Check Point GO, Check Point Horizon Manager, Check Point Identity Awareness, Check Point Infinity, Check Point IPS, Check Point IPSec VPN, the Check Point logo, Check Point Media Encryption, Check Point Mobile, Check Point Mobile Access, Check Point NAC, Check Point Network Voyager, Check Point OneCheck, Check Point R75, Check Point Secure Web Gateway, Check Point Security Gateway, Check Point Security Gateway Virtual Edition, Check Point Threat Emulation, Check Point Threat Emulation Software Blade, Check Point R76, Check Point Update Service, Check Point URL Filtering Software Blade, Check Point Virtual Systems, Check Point WebCheck, CloudGuard, ClusterXL, Compliance Software Blade, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, DefenseNet, Dome9, DynamicID, Endpoint Connect VPN Client, Endpoint Security, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, Hacker ID, HackingPoint, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IP Appliances, IP Series Appliances, IPS-1, IPS Software Blade, IPSO, R75, Software Blade, MailSafe, the More, better, Simpler Security logo, Multi-Domain Security Management, MultiSpect, Nano Agent, Next Generation Secure Web Gateway, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, Safe@Office N, SandBlast, Secure Virtual Workspace, SecureClient, SecureClient Mobile, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, SecurityPower, Series 80 Appliance, SiteManager-1, Smart-1, SmartCenter, SmartCenter Power, SmartCenter Pro, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, SmartEvent, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartReporter, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SmartWorkflow, SMP, SMP On-Demand, SocialGuard, SofaWare, Software Blade Architecture, the softwareblades logo, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, ThreatCloud AI, Threat Emulation Portal, ThreatSpect,TrueVector, UserCheck, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Edge N, UTM-1 Total Security, VPN-1, VPN-1 Edge, VPN-1 MASS, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VE, VPN-1 VSX, VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Antivirus + Firewall, ZoneAlarm DataLock, ZoneAlarm Extreme Security, ZoneAlarm ForceField, ZoneAlarm Free Firewall, ZoneAlarm Pro Firewall, ZoneAlarm Internet Security Suite, ZoneAlarm Security Toolbar, ZoneAlarm Secure Wireless Router, ZoneAlarm Web Secure, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013, 7,725,737 and 7,788,726 and may be protected by other U.S. Patents, foreign patents, or pending applications.

DOWNLOAD AGREEMENT

Any use, access or download of any file, software, document or Software Subscription under the Check Point website and/or User Center is subject to the terms of the Download Agreement.

Please review the Download Agreement terms and conditions.

REPORT ALLEGED COPYRIGHT INFRINGEMENT

Check Point takes copyright infringement very seriously and strives to maintain a website that respects the intellectual property rights of content creators. If you believe that your copyright has been infringed upon by any content on our website, we encourage you to report it to us immediately.

To report copyright infringement, please send an email to copyright@checkpoint.com, including the following information:

  • A description of the copyrighted work that has been infringed;
  • The location of the infringing material on our website;
  • Your contact information, including name, email address, and phone number;
  • A statement that you have a good faith belief that the use of the material in the manner complained of is not authorized by the copyright owner, its agent, or the law;
  • A statement that the information in the notification is accurate, and that you are authorized to act on behalf of the owner of an exclusive right that is allegedly infringed; and
  • A physical or electronic signature of the copyright owner or a person authorized to act on their behalf.

We will review all reported cases of copyright infringement and take appropriate action to remove infringing materials from our website.

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK