Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Media Alert: Check Point's ZoneAlarm Products Capable of Preventing CheckFree Attack Through Four Different Technologies

Exclusive Operating System firewall, ForceField virtualized browsing, network firewall and antivirus all stop attack at its various stages of propagation

Redwood City, CA —

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today verified its ability to stop Tuesday’s hijack attack on CheckFree customers.

Check Point confirmed its ZoneAlarm security product line could successfully defend hijacked computers the moment the attack made it onto the victim’s computer using a mix of behavioral technologies available in its network and Operating System firewalls; and through its antivirus system.  Moreover, ZoneAlarm’s ForceField™ virtualized browsing protection is capable of catching and safely diverting automatic drive-by downloads like that of the CheckFree attack behaviorally - before it even hits the customer’s computer.

“This particular attack validates ZoneAlarm’s time-honored security approach of using multiple layers of protection, including behavioral solutions that prevent and contain a brand-new attack the moment it’s released, as well as signature-based solutions that can safely remove the attack,”  said Laura Yecies, vice president and general manager of Check Point’s ZoneAlarm consumer division.

The CheckFree attack occurred on Tuesday when hackers hijacked the CheckFree.com Web site and redirected an undetermined number of customers to a malicious Web site that tried to install a Trojan onto the victim’s computer.  The Trojan was designed to spy on customers, stealing usernames, passwords and anything the user typed.

ZoneAlarm’s exclusive Operating System firewall, which behaviorally monitors every program and process on the computer, was able to detect foul-play from the malicious payload in the CheckFree attack and alert the user.  And ZoneAlarm’s antivirus was able to detect and remove the associated Trojan.  ZoneAlarm also determined that two of its other security layers would activate during this type of attack: ZoneAlarm’s network firewall and program control can behaviorally detect Trojans as they attempt to send their stolen payload from the user’s computer back to the hacker; and ZoneAlarm ForceField can divert drive-by downloads safely to a virtualized space on the computer where it cannot cause harm to the rest of the computer.

“ZoneAlarm ForceField is made exclusively to protect consumers as they bank, shop and surf the Internet, even if they get diverted straight into a hacker’s trap as occurred in this attack,” continued Yecies. “ForceField browser security is an important new layer of protection for all kinds of online activities, but it’s particularly important when sensitive financial data is involved as occurs on banking and shopping sites.”

The Check Point ZoneAlarm product line, which includes ZoneAlarm Internet Security Suite™, ZoneAlarm Pro™, ZoneAlarm Antivirus™, ZoneAlarm ForceField and the ZoneAlarm free firewall are available at www.zonealarm.com for immediate trial and purchase; and can also be purchased at many retail outlets. 

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers’ dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point’s pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.