Check Point - Products

Products

Check Point offers the following primary products:

  • Network Security — Check Point's core business has historically focused on network security components including Firewall, IPsec VPN, Mobile Access, Intrusion Prevention, Antivirus, Anti-spam, URL filtering, Data Loss Prevention and Application Control. These products are deployed as software on x86-based hardware made by third parties including Crossbeam and Hewlett-Packard, or by Check Point(Safe@Office, UTM-1 Edge, UTM-1, Power-1, IP Appliances, and Integrated Appliance Solutions platforms).
  • Virtualization Security — The Security Gateway VE product for virtual environments, which runs on VMware ESX and ESXi, secures virtual machines and applications via either hypervisor integration using the VMSafe API, or as a VMware network appliance. A separate product called VPN Power-1 VSX can host multiple virtual security gateways on a single machine.
  • Data Security — VPNs, access controls, and the DLP security gateway secure data-in-motion and data-in-use. Check Point Document Security protects data-in-use. Full Disk Encryption, Media Encryption and Port Control secure data-at-rest on endpoints.
  • Endpoint Security — a single security agent that combines firewall, antivirus, anti-spyware, full disk encryption, removable media encryption, protection of I/O ports such as USB, network access control, and a VPN client. The security policies for networked endpoints can be centrally managed from a single location via the Endpoint Policy Management Software Blade product.
  • Mobile Security — Check Point Mobile Access software provides secure access to corporate resources via a SSL VPN portal for devices such as laptops, mobile phones, and tablet PCs. The Check Point GO USB device provides a secure virtual desktop for Microsoft Windows machines, allowing remote access of the corporate network via a VPN connection, and has encrypted storage.
  • Security Management — Allows administrators to manage events, set policy and apply protections across the entire security infrastructure from a single interface. Based on the Software Blade architecture, with 11 management software blades including event analysis, correlation, multi-domain security management, and device provisioning.

Read more about this topic:  Check Point

Famous quotes containing the word products:

    Good wine needs no bush,
    And perhaps products that people really want need no
    hard-sell or soft-sell TV push.
    Why not?
    Look at pot.
    Ogden Nash (1902–1971)

    ... white people, like black ones, are victims of a racist society. They are products of their time and place.
    Shirley Chisholm (b. 1924)

    All that is told of the sea has a fabulous sound to an inhabitant of the land, and all its products have a certain fabulous quality, as if they belonged to another planet, from seaweed to a sailor’s yarn, or a fish story. In this element the animal and vegetable kingdoms meet and are strangely mingled.
    Henry David Thoreau (1817–1862)