Achieving a Clean Bill of Health in HIPAA Compliance with Check Point Solutions Check Point Software Technologies, a worldwide leader in trusted network security, offers a suite of solutions that support healthcare organizations in achieving healthy compliance with HIPAA security standards. These solutions are comprehensive and integrated, providing a solid base for HIPAA compliance while also supporting requirements common to other security regulations.
Check Point IP Appliance Advantages This white paper explores Check Point IP Appliances and how they are capable of providing a level of design, performance and usability to set the standard on delivering high performance and highly resilient security services to demanding networks.
Check Point WebCheck This paper describes the emergence and characteristics of modern web-based attacks and why they are so common. Traditional security, while effective against aspects of today’s threats, cannot effectively protect an enterprise PC or a user’s private information from web-based attacks. Successful protection from web-based attacks requires a new approach. The paper concludes with an introduction to Check Point’s enterprise solution to these web-based attacks: Check Point WebCheck for Check Point Endpoint Security.
Clustering on Check Point IP Appliances In today's global-economy companies it is critical that networking devices maintain availability. Clustering allows several independent appliances to join together as one virtual machine for a common security goal. Learn how through IP clustering technology, high availability can be provided without compromising performance.
Comprehensive Endpoint Security New endpoint vulnerabilities such as Web-based malware are increasing information security risk in the enterprise. Traditional point solutions compound administrative overhead and management complexities. In response, organizations are demanding a new strategy that includes a broad set of technologies for endpoint security unified into a single agent with central control.
Connectra Link Translation This paper is an in-depth discussion of Link Translation technology alternatives in Check Point’s Connectra SSL VPN security gateway. It provides a deeper understanding of Connectra’s Link Translation alternatives, implications and deployment requirements. Administrators who are performing initial deployment of the Connectra gateway will find this paper helpful, as will those who are seeking to migrate from the default URL Translation (UT) to Hostname Translation (HT). This paper describes what is required to deploy Connectra in HT in terms of prior deployment, configuration and security considerations.
Delivering Application-Layer Security at Data Center Performance Levels, Co-written by Intel Application-layer threats are increasingly the vector of choice for hackers and malware. At the same time, companies are beginning to transition to 10 gigabit (Gb) Ethernet networks, which require security solutions capable of sustaining these speeds in order to maintain a positive return on investment. The Check Point® security software running on Intel® multi-core processors was designed with these two challenges in mind. Rather than make companies choose between performance and security, this solution increases throughput while simultaneously raising security levels. This white paper explains the Check Point Open Performance Architecture and reviews the Intel technologies used to secure service provider, enterprise and small and medium-sized business networks.
DoS Attacks: Response Planning and Mitigation White PaperDenial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are a very real threat to today's corporations, financial institutions, government agencies, and service providers. Attackers can cripple the availability of the Internet resources of any entity – including very large companies – with relatively little effort using low-cost (or free!) tools.
Endpoint Security Considerations for Achieving GLBA Compliance Rebooting the global financial system may take years. The international move to new regulatory organizations will require financial institutions to change the way they do business. No one knows exactly how the system will change yet, but one thing is certain: financial institutions will be required to protect the security and confidentiality of customer information as defined in regulations such as the Gramm-Leach-Bliley Act.
Endpoint Security Considerations for Achieving HIPAA Compliance In 2003, the U.S. Dept. of Health and Human Services published the HIPAA Security Rule to safeguard electronic protected health information (EPHI). These security provisions apply to all healthcare providers, payers, and information clearinghouses. In gauging threats to security of EPHI, unprotected endpoints constitute the largest source of potential breaches.
Endpoint Security Considerations for Achieving PCI Compliance Electronic theft of personal and financial data is a serious and growing problem that drives up costs for credit card issuers and the merchants they serve while undermining consumer confidence and loyalty. In response, the Payment Card Industry has developed the PCI Data Security Standard, defining requirements for protection of cardholder data.
Evolution of IPS IPS functionality can be deployed in two key variants: standalone and integrated. Historically, at least until recently, the most common method for deploying IPS has been on standalone appliances. While there were good reasons for this approach, a strong case is developing for deploying IPS as integrated functionality within existing security enforcement points. This white paper will discuss each approach in more detail.
FDE Detailed Product Overview for Mac OS X The Mac platform has been making significant inroads into the enterprise marketplace. This paper details popular methods of securing data at rest on Macs and their short-comings when compared to full-disk encryption. The Check Point Full Disk Encryption solution for Mac OS X and its implementation are described.
FDE Detailed Product Overview for Windows and Linux How secure is my data? This paper details popular methods of securing data at rest and their short-comings when compared to full-disk encryption. The Check Point Full Disk Encryption solution and its implementation are described.
Federal Guide to the Value of Encryption Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Encryption solutions from Check Point automatically obscure digital files and make them unreadable by unauthorized users.
Guide to the ROI of Encryption Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Check Point Full Disk Encryption can reduce recurring financial risks of security exposure by 90 Percent.
Guide to the TCO of Encryption As the familiar saying goes, "There's no such thing as a free lunch." So it is with using information technology. Even so-called "free" open source applications carry unavoidable costs of installation, management and usage. Some of these costs can be controlled or even eliminated by smart use of appropriate applications, management technology and best practices. But in the end, everything of value costs something to own and use.
Handheld Wireless Security As Smartphones and other handheld wireless devices become an integral part of the modern business landscape, malicious activity is increasingly being carried out by organized cybercriminals who seek to exploit vulnerabilities for financial gain. To be successful, a business must allow mobile workers to access needed resources while ensuring that confidential information and assets are not compromised.
How to Get NAC Up-and-Running in One Hour The promise of NAC is huge, but so are the evolving (and competing) architectures that are typically complex, difficult and expensive to deploy and manage. Consequently, after years of promise, many organizations have yet to tap the benefits of NAC. Check Point offers a quick way to deploy NAC and get its benefits – without getting bogged down in complex deployment scenarios. With a Check Point firewall, organizations can get policy-based NAC up-and-running in an hour. This white paper describes how.
Leverage IPS to Make Patch Tuesday Just Another Day This white paper discusses the inherent challenges of Patch Tuesdays, and the need for pre-emptive protections offered by intrusion prevention systems. By taking this comprehensive approach, which combines robust IPS functionality with a concerted patching strategy, network administrators can better equip themselves to handle Patch Tuesdays and secure the network between updates. Check Point provides IPS capabilities on dedicated appliances and full IPS capabilities integrated into comprehensive security gateways.
Next-Generation Security for 3G and 4G LTE Networks As the smart phone and network-connected mobile device usage grow, the dividing line between mobile networks operators (MNOs) and Internet Service Providers (ISPs) is starting to disappear. MNOs are faced with the same set of challenges of delivering optimal network performance and protecting the information passing through their mobile networks. This document examines the current and emerging security threats to mobile networks, their impacts on network integrity and performance, and how mobile network security has evolved in recent times.
Preventing Data Leaks on USB Ports Regulating the electronic flow of information stored in digital format has never been so hard. Most organizations have attempted to reduce the risk of data leaks from servers and networks with firewall, intrusion prevention, authentication and access controls. The mobility trend driving widespread use of laptops for remote and mobile computing has recently spurred the use of encryption solutions for protecting data on devices that are lost or stolen. But now, a new risk is sidestepping these controls – one that creates the opportunity for data to slip outside the protective net without detection. The culprit is any plug-and-play storage device attached to a stationary PC or laptop USB port.
Protecting Stored Cardholder Data for PCI Compliance The Payment Card Industry Data Security Standard (PCI DSS) is an industrywide standard consisting of six control objectives and 12 requirements. The scope of requirements is broad, encompassing nearly every aspect of network and information security. Requirements include a mixture of security technologies and best practices.
Secure Remote Access for the Distributed Business Businesses today are defined by a wide variety of distributed work locations, and a diversity of worker types with differing information requirements. At the same time, a number of new information security and privacy regulations—such as PCI, Sarbanes-Oxley, Gramm Leach Bliley and HIPAA—are being phased in and toughened. These new realities present organizations with a new set of challenges that have begun to pose a serious dilemma.
Software Blade Architecture IT professionals understand that “one-size-fits-all” security solutions are making it more difficult to adjust to changing business needs. The Check Point Software Blade architecture provides a better alternative to deploying disparate, stand-alone security systems in order to keep up with evolving security threats.
Solving the Performance Hurdle for Integrated IPS Rapidly changing security threats are demanding closer integration of IPS and firewall functionality to keep networks secure. In this whitepaper learn how new performance-enabling technology from Check Point allows implementing as much integrated IPS functionality as required without system degradation.
USB Drives: Friend or Foe? This whitepaper describes how security professionals can reduce risks of vulnerabilities to portable applications and USB storage. It surveys the current state of USB storage and explains architectural background on the operation of portable applications. The paper also provides several examples of attacks using USB drives that exploit endpoints. It concludes by noting how Check Point Endpoint Security can block risks to an enterprise such as information leakage and attacks using USB and portable applications.