Check Point - Products

Products

Check Point offers the following primary products:

  • Network Security — Check Point's core business has historically focused on network security components including Firewall, IPsec VPN, Mobile Access, Intrusion Prevention, Antivirus, Anti-spam, URL filtering, Data Loss Prevention and Application Control. These products are deployed as software on x86-based hardware made by third parties including Crossbeam and Hewlett-Packard, or by Check Point(Safe@Office, UTM-1 Edge, UTM-1, Power-1, IP Appliances, and Integrated Appliance Solutions platforms).
  • Virtualization Security — The Security Gateway VE product for virtual environments, which runs on VMware ESX and ESXi, secures virtual machines and applications via either hypervisor integration using the VMSafe API, or as a VMware network appliance. A separate product called VPN Power-1 VSX can host multiple virtual security gateways on a single machine.
  • Data Security — VPNs, access controls, and the DLP security gateway secure data-in-motion and data-in-use. Check Point Document Security protects data-in-use. Full Disk Encryption, Media Encryption and Port Control secure data-at-rest on endpoints.
  • Endpoint Security — a single security agent that combines firewall, antivirus, anti-spyware, full disk encryption, removable media encryption, protection of I/O ports such as USB, network access control, and a VPN client. The security policies for networked endpoints can be centrally managed from a single location via the Endpoint Policy Management Software Blade product.
  • Mobile Security — Check Point Mobile Access software provides secure access to corporate resources via a SSL VPN portal for devices such as laptops, mobile phones, and tablet PCs. The Check Point GO USB device provides a secure virtual desktop for Microsoft Windows machines, allowing remote access of the corporate network via a VPN connection, and has encrypted storage.
  • Security Management — Allows administrators to manage events, set policy and apply protections across the entire security infrastructure from a single interface. Based on the Software Blade architecture, with 11 management software blades including event analysis, correlation, multi-domain security management, and device provisioning.

Read more about this topic:  Check Point

Famous quotes containing the word products:

    ... white people, like black ones, are victims of a racist society. They are products of their time and place.
    Shirley Chisholm (b. 1924)

    All that is told of the sea has a fabulous sound to an inhabitant of the land, and all its products have a certain fabulous quality, as if they belonged to another planet, from seaweed to a sailor’s yarn, or a fish story. In this element the animal and vegetable kingdoms meet and are strangely mingled.
    Henry David Thoreau (1817–1862)

    Good wine needs no bush,
    And perhaps products that people really want need no
    hard-sell or soft-sell TV push.
    Why not?
    Look at pot.
    Ogden Nash (1902–1971)