Check Point Software Technologies

Displaying 1-40 of 74 results

  • Webcasts // Jan 2010

    Deep Dive Into Endpoint Security With Check Point WebCheck

    The attendee will learn how Check Point WebCheck browser virtualization protects endpoints from the growing threat of drive-by downloads and gain a behind the scenes understanding of how the technology works.

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Make a Quantum Leap With Check Point Endpoint Security

    As threat complexity has increased in recent years, so have the challenges of combating these threats. At the same time, users continue to demand uninterrupted performance. IT organizations are being asked to provide the highest level of security without disrupting connectivity or making the user experience more complicated. Check Point...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Check Point IPS Software Blade: Changing the Face of IPS

    The historical standard for IPS security is to deploy a full physical layer of IPS appliances complete with an independent management component on a dedicated management server. The full processing power of dedicated HW appliances was required to support the intense processing requirements for IPS analysis. The IPS SW Blade...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Check Point Software Blade Architecture and Revolutionary IPS Software Blade

    Protecting networks against today's constantly evolving threat environment has never been more challenging. Infrastructure, connectivity and performance requirements keep growing. New and varied threats are leading to more security vendors, point-products and complexity, while IT teams are under increasing pressure to reduce costs and complexity, and do more with existing...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Seamlessly Integrate IPS Into Your Firewall

    Intrusion Prevention Systems (IPS) is a de facto standard in today's network security architecture. The new Check Point IPS Software Blade allows to easily and seamlessly integrate full IPS capabilities into the firewall - while delivering the industry's highest performance, the best threat coverage, and the best total security value...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    The NEW IPS: A Technical Discussion

    The attendee will learn about the new Check Point IPS Software Blade! This NEW IPS Blade provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. It delivers the industry's highest performing security gateway, the industry's best threat coverage, and gives the best total security...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Business Enablement in a Down Economy Through Secure Remote Access

    The presenter will discuss how Secure Remote Access technologies can empower businesses during these turbulent economic times. This webcast will cover how to keep employees, clients, partners, and other stakeholders connected and collaborating during times of crisis. Then the presenter will briefly discuss how Check Point solutions, including the Connectra...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Virtualization Security and PCI Compliance

    The attendee will learn how to maintain separation and isolation of servers in a virtualized environment in order to meet PCI Compliance requirements. The presenters will discuss the issues that arise in deploying security when the datacenter transforms from physical to virtual, and then cover new technologies and solutions from...

    Provided By Check Point Software Technologies

  • Webcasts // Dec 2009

    Securing Your Remote Workforce During H1N1 Pandemic

    The attendee will learn about the H1N1 pandemic, the top 3 things to focus on, the features of a successfully work from home program, and the security solutions needed to ensure business continuity during an epidemic.

    Provided By Check Point Software Technologies

  • Webcasts // Sep 2009

    Getting the Most Performance Out of Your Security Appliance

    Network security environments are growing in complexity with evolving Internet traffic patterns and fast proliferation of security threats. The need to maintain consistent performance while addressing evolving traffic patterns and threats is paramount. The attendee will learn how the next generation security appliance delivers consistent performance without sacrificing network security.

    Provided By Check Point Software Technologies

  • White Papers // Aug 2009

    Building a Foundation for PCI: Primer on PCI 1.1 Compliance With Check Point Solutions

    Companies affected by the PCI standard - merchants, banks, and service providers - are required to conduct a variety of validation activities, including quarterly scans, a self-assessment questionnaire, and an onsite review, depending on the level of the company. For example, Level 1 merchants - those that process more than...

    Provided By Check Point Software Technologies

  • White Papers // Aug 2009

    Check Point IP Appliance Advantages

    IP Appliances are scalable, robust and secure. They are optimized for route processing and packet forwarding. The platform started with no binaries and libraries and then added different elements to provide a compact and secure system. 'Inetd.conf' routing infrastructure starts empty, and services must be added through the web interface,...

    Provided By Check Point Software Technologies

  • Case Studies // Jul 2009

    Bavarian Brewer Safeguards Traditions

    Erdinger Wei?brau reached the top of the world Wei?bier market by combining tradition and innovation. To brew its traditional recipes, Erdinger Wei?brau uses the most modern production methods, supported by a complex IT structure. With the subsequent separation of the internal networks, for example the separation of the production network...

    Provided By Check Point Software Technologies

  • White Papers // Jul 2009

    Comprehensive Endpoint Security: New Endpoint Vulnerabilities Such as Web-Based Malware Are Increasing Information Security Risk in the Enterprise

    Off late malicious activity on the Internet has advanced from worms and viruses attacking random computers in the wild, to the highly sophisticated and targeted attacks - such as the TJ Maxx and Heartland data breaches - that plague enterprises today. Individual hackers have been replaced by well-organized and globally...

    Provided By Check Point Software Technologies

  • White Papers // Jul 2009

    Comprehensive Endpoint Security

    Off late malicious activity on the Internet has advanced from worms and viruses attacking random computers in the wild, to the highly sophisticated and targeted attacks - such as the TJ Maxx and Heartland data breaches - that plague enterprises today. Individual hackers have been replaced by well-organized and globally...

    Provided By Check Point Software Technologies

  • White Papers // Jul 2009

    Securing Browsers to Protect Endpoints and Enterprises From Web-Based Attacks

    Enterprises must be more resourceful than ever to thwart new kinds of web-based attacks. The dominant threat to endpoint security now combines characteristics of historically effective attacks with new, more elusive methods of delivery and infection. The result: attacks are extremely difficult to stop and more serious in consequence than...

    Provided By Check Point Software Technologies

  • White Papers // Jul 2009

    How to Get NAC Up-and-Running in One Hour: For Check Point Firewall or Endpoint Security Administrators

    NAC can provide an organization with powerful, granular control of endpoint network access. Port-based NAC deployment is challenging, but gateway NAC can deploy in one hour with a Check Point firewall. Check Point Endpoint Security includes support for both port-based and gateway-based solutions. The policy based controls provided by gateway...

    Provided By Check Point Software Technologies

  • White Papers // Jun 2009

    The New Face of Intrusion Prevention: Check Point IPS Software Blade Gives Breakthrough Performance and Protection at a Breakthrough Price

    Off late organizations had two choices when considering Intrusion Prevention (IPS): an expensive, dedicated IPS system, or an integrated system that lacked robust performance and security. Additionally, most IPS system were not used to their full potential. Deployed offline, they were used more as intrusion detection systems, only logging attacks...

    Provided By Check Point Software Technologies

  • White Papers // Jun 2009

    The New Face of Intrusion Prevention

    In the past, organizations had two choices when considering Intrusion Prevention (IPS): an expensive, dedicated IPS system, or an integrated system that lacked robust performance and security. Additionally, most IPS system was not used to their full potential. Deployed offline, they were used more as intrusion detection systems, only logging...

    Provided By Check Point Software Technologies

  • Case Studies // Jun 2009

    MBM Computer System Solutions Leverages Check Point to Deliver Internet Security for SMBs and Generate Recurring Revenue

    MBM Computer System Solutions has been headquartered in Troy, Michigan since 1985. MBM required a solution that offered unsurpassed IT security along with central management capabilities in order to keep pace with ongoing business needs as well as the constantly shifting security threats. Just as important, the company needed a...

    Provided By Check Point Software Technologies

  • White Papers // Jun 2009

    Check Point Software Blade Architecture: Achieving the Right Balance Between Security Protection and Investment

    The Check Point Software Blade architecture provides a better alternative to deploying disparate, stand-alone security systems in order to keep up with evolving security threats. This architecture is based on independent security modules that all run on a single platform, simplifying integration and management. This revolutionary security architecture delivers a...

    Provided By Check Point Software Technologies

  • White Papers // May 2009

    Check Point Endpoint Security Full Disk Encryption: Detailed Product Overview for Windows and Linux

    In times past, securing sensitive company data was a simple matter of locking doors, hiring guards, and issuing employee IDs. In today's high-tech world, sensitive data travels outside of company walls with alarming frequency - most often on mobile devices such as notebook Personal Computers (PCs). And as more company...

    Provided By Check Point Software Technologies

  • White Papers // May 2009

    USB Drives: Friend or Foe?: New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise

    This whitepaper describes how security professionals can reduce risks of vulnerabilities to portable applications and USB storage. It surveys the current state of USB storage and explains architectural background on the operation of portable applications. The paper also provides several examples of attacks using USB drives that exploit endpoints. It...

    Provided By Check Point Software Technologies

  • White Papers // May 2009

    Check Point IPS Engine Architecture: New Technologies Provide a Robust Integrated Intrusion Prevention System

    Some organizations have a love-hate relationship with Intrusion Prevention System technology, and its older cousin, the Intrusion Detection System. On the one hand, IPS is vital for protecting against a deluge of application layer exploits. According to a Verizon Business Report in 2008 hacking led to data breaches by a...

    Provided By Check Point Software Technologies

  • Case Studies // May 2009

    NHS Blood and Transplant Deploys Check Point Endpoint Security for Total Protection of Sensitive Information

    As an existing Check Point customer, NHS Blood and Transplant already had a robust laptop and PC security solution in place. However they needed to enhance protection for sensitive data on its PCs to comply with the latest UK Government's directives on data security in the public sector. Following an...

    Provided By Check Point Software Technologies

  • White Papers // Apr 2009

    Leverage IPS to Make Patch Tuesday Just Another Day

    Responsible administrators struggle to patch in a timely fashion without disrupting their networks, but patching all of an organization's assets takes time. Server patches must be tested before deploying. Endpoint patching is further slowed by logistics, since administrators don't have direct possession or control of end-point devices and there may...

    Provided By Check Point Software Technologies

  • White Papers // Apr 2009

    Clustering on Check Point IP Appliances

    Modern networks are carrying both the financial transactions and the information that is the lifeblood of today's businesses, which makes network outages (or even degraded performance) unacceptable. Just as the networks are evolving, so have the frequency and sophistication of malicious attacks against those networks. Providing secure communications to customers...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Mobitel Secures Internet Communications With the Check Point VPN-1 Power Solution

    Mobitel is a leading Slovenian mobile telecommunications operator offering cutting edge services. Mobitel employees depend on constant, high-volume Internet communications. Large quantities of data are transferred to and from the mobile multimedia Web and WAP portal, Planet, which offers informative, useful, and entertaining content and services that are constantly being...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Department of Education Relies on IP Appliances to Meet Expanding Latency and Performance Needs

    The Department of Education in an Asia-Pacific country is the lead government agency providing national leadership in education and workplace training. In order to handle the increased bandwidth requirements created by video conferencing, an electronic curriculum, VoIP, and the high log-on rates of student users, IT administrators faced the critical...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Leading Financial Institution Turns to IP Appliance Multi-Core Security Platforms to Meet Performance and Traffic Requirements

    With its network traffic rapidly growing and more services being brought online, this major international financial services organization recognized the need for a more robust network security solution. To address its critical network and traffic concerns the bank re-architected its infrastructure with a modular and flexible network security solution. Specifically,...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Michael Page International Deploys Check Point Data Security Products to Protect Confidential Information

    As a world leading professional recruitment agency Michael Page wanted to secure its confidential data on both office-based PCs and its fleet of 50 laptops used by directors, senior management and IT staff. Following an evaluation of possible solutions, Michael Page chose the Check Point Full Disk Encryption and Media...

    Provided By Check Point Software Technologies

  • Webcasts // Apr 2009

    SmartDefense Services: Stay Ahead of the Threats

    The security landscape keeps evolving. More attacks. More technologies. More products. And little time to apply all patches. Protecting data and networks requires up-to-date protections embedded into security gateways to avoid being vulnerable to exploits. The attendee will learn how Check Point SmartDefense Services provide preemptive security for Check Point...

    Provided By Check Point Software Technologies

  • White Papers // Mar 2009

    Endpoint Security Considerations for Achieving GLBA Compliance

    Rebooting the global financial system may take years. The international move to new regulatory organizations will require financial institutions to change the way they do business. No one knows exactly how the system will change yet, but one thing is certain: financial institutions will be required to protect the security...

    Provided By Check Point Software Technologies

  • White Papers // Feb 2009

    The Evolution of IPS: Intrusion Prevention (Protection) Systems Aren't What They Used to Be

    Whichever solution works for the network, organizations must carefully compare IPS solutions from competing vendors to ensure that they are getting the desired level of security and performance. The Check Point IPS Software Blade, which integrates full IPS functionality into firewalls and other security enforcement points, is leading the way...

    Provided By Check Point Software Technologies

  • White Papers // Feb 2009

    Solving the Performance Hurdle for Integrated IPS: New Check Point Technologies Enable a Full-Function, Integrated Intrusion Prevention System Without Compromise to Performance or Security

    Whenever IT performance barriers fall, there is a discovery phase as organizations learn they can solve formally unsolvable roadblocks to critical services. This white paper describes such an event for network security. For the first time, new processing technologies for a network gateway have enabled a full-function integrated Intrusion Prevention...

    Provided By Check Point Software Technologies

  • White Papers // Feb 2009

    Solving the Performance Hurdle for Integrated IPS

    The dilemma of connectivity or security is now moot. New performance-enabling technology from Check Point allows implementing as much integrated IPS functionality as required without system degradation. The Check Point Security Gateway R70 allows a full-function IPS integrated into the industry's leading firewall. This white paper provides background about performance...

    Provided By Check Point Software Technologies

  • White Papers // Feb 2009

    Endpoint Security Considerations for Achieving HIPAA Compliance

    The new number-one priority for America is to improve the efficiency of the nation's healthcare system-especially in the information technology arena. Experts say rising health costs are the main cause of long-term national budget problems, and that computerization of health records will drive down costs. Computerization will also bring an...

    Provided By Check Point Software Technologies

  • Case Studies // Feb 2009

    ENN Group Selects Check Point for More Efficient and Scalable Security With Centralized Management

    ENN Group, headquartered in the Hebei Province of China, is committed to the development and utilization of clean energy. The risk of network security breaches has soared with the rapid growth in Internet traffic. Compromised PCs can easily spread attacks to other systems and cause far-reaching damage. With an outmoded...

    Provided By Check Point Software Technologies

  • Case Studies // Jan 2009

    Southern Housing Group Renovatessecurity for Network of Small Offices

    Southern Housing Group is a medium-size organization of 500 employees with an extensive network of remote offices. In this dynamic environment, security was a persistent problem. Though the Group had outsourced security management, viruses and other intrusions continued to take a toll on network performance and user productivity. Centric Networks...

    Provided By Check Point Software Technologies

  • Case Studies // Jan 2009

    Secured by Check Point, International SOS Comes to the Rescue

    International SOS used appliances to help secure communications, but found them to be unwieldy in emergencies and remote locations. At the same time, most firewall and VPN security solutions demand a great deal of patience and knowledge to set up, and receive only secondary focus in the remote field locations...

    Provided By Check Point Software Technologies

  • Case Studies // Oct 2008

    Travelex Secures Remote Endpoints With UTM-1 Edge

    While the IT department, which is based in the company's North American headquarters in Toronto, Canada, was operating over a point-to-point ISDN connection, many branch locations were connecting to the Internet through unsecured dialup. In a nutshell, there were two specific challenges: There was no way to ensure that all...

    Provided By Check Point Software Technologies

  • Case Studies // Oct 2008

    Secrets at the Ritz Kept Under Wraps

    IT manager for The Ritz began investigating software solutions for encrypting and protecting the information residing on all the mobile devices used by executives at The Ritz. The problem was that many of the applications trialled were clumsy, slow and difficult to use. The most important feature had to be...

    Provided By Check Point Software Technologies

  • Case Studies // Oct 2008

    Total Network Security for Telecom Plus - The Utility Warehouse

    The Utility Warehouse Discount Club operated by Telecom Plus plc needed a network that is completely safe from the threat posed by removable media devices. Codina decided to test out some other removable media security options from other vendors. Products from Pointsec amongst others were tested by Telecom Plus and...

    Provided By Check Point Software Technologies

  • Case Studies // Oct 2008

    Advanced Systems Group Secures the Network With UTM-1 by Check Point

    With company headquarters located in Denver, Colorado and eight offices distributed all over the western United States, ASG is considered a smaller company, employing just over 100 people. ASG is using Verizon Business for management of its wide-area network however the CIO was unhappy with the limitations they faced with...

    Provided By Check Point Software Technologies

  • Case Studies // Sep 2008

    Denbighshire County Council Selects Eventia Suite to Simplify Security Management

    Denbighshire County Council in North Wales, United Kingdom serves a local population of 93,000. The challenge for the council's IT team was sorting through the huge volumes of log data produced by its security and network devices every day. The council's IT team needed a Security Information and Event Management...

    Provided By Check Point Software Technologies

  • Case Studies // Sep 2008

    Osmose Protects Its Desktops and Laptops With Check Point Endpoint Security

    Osmose was faced with having to support the needs of all the 800 users in their corporate headquarters as well as 200 remote users. The remote users posed a particular challenge in that they would travel frequently and bring their laptops with them, plugging in at various hotels across the...

    Provided By Check Point Software Technologies

  • Case Studies // Oct 2008

    St. Michael's House Secures Its Network With Check Point UTM-1

    Michael's House engaged with Calyx Security, a certified Check Point partner, on finding a solution to meet their security needs. The priority for Calyx was to secure St. Michael's House's network and make sure the remote branches were provided with fast, reliable, and secure access. For the St. Michael's House...

    Provided By Check Point Software Technologies

  • Case Studies // Sep 2008

    Tech Electronics Secures Mobile Devices With Check Point

    If any business ever has needed to secure remote access to customer information, that business is Tech Electronics. IT Manager at Tech Electronics, says the company sought a solution to guarantee security and centrally manage security updates across all endpoints on the network. With information always getting into the wrong...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Securing Your Network With Software Blades

    The attendee will learn more about the New Check Point Software Blade architecture that brings flexibility and simplicity to customers, by allowing them to select security applications that meet their needs and tailor them into a modular security gateway that is managed centrally. The Software Blade is a security building...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Succeeding With Check Point Endpoint Security: A Customer Story

    Check Point launched the first single agent for total endpoint security including the key data security. There is no longer need to manage multiple security agents or spend so much time testing and deploying updates. It combines the highest-rated firewall, Network Access Control (NAC), program control, antivirus, anti-spyware, full disk...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Securing the Virtualization World

    The attendee will learn more on the virtualization concept and its benefits and concerns. The presenters will discuss today's virtualization needs and the various deployment scenarios IT managers can use. They will also review Check Point's virtualization solution - VPN-1 VE. VPN-1 VE enables to separate virtual applications, protecting them...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Important December Vulnerabilities and SmartDefense Protections

    The attendee will hear about some of the most important recent vulnerabilities and how to protect network.

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Check Point Endpoint Security: A Technical Overview

    The attendee will learn how Check Point Endpoint Security makes it simple for IT administrators to configure and deploy a complete endpoint security solution. Check Point Endpoint Security provides the highest level of protection against all endpoint threats through leading security technologies. Strong security that covers everything from malware attacks...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Security Performance for the Future

    Check Point and Intel have developed a security performance architecture that combines Check Point security acceleration software with Intel multi-core processing to enable industry leading performance levels while providing top security levels to address today's and future security needs. The presenter of this webcast will detail the key technology components...

    Provided By Check Point Software Technologies

  • Webcasts // Dec 2009

    Securing Your Remote Workforce During H1N1 Pandemic

    The attendee will learn about the H1N1 pandemic, the top 3 things to focus on, the features of a successfully work from home program, and the security solutions needed to ensure business continuity during an epidemic.

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Deep Dive Into Endpoint Security With Check Point WebCheck

    The attendee will learn how Check Point WebCheck browser virtualization protects endpoints from the growing threat of drive-by downloads and gain a behind the scenes understanding of how the technology works.

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Make a Quantum Leap With Check Point Endpoint Security

    As threat complexity has increased in recent years, so have the challenges of combating these threats. At the same time, users continue to demand uninterrupted performance. IT organizations are being asked to provide the highest level of security without disrupting connectivity or making the user experience more complicated. Check Point...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Michael Page International Deploys Check Point Data Security Products to Protect Confidential Information

    As a world leading professional recruitment agency Michael Page wanted to secure its confidential data on both office-based PCs and its fleet of 50 laptops used by directors, senior management and IT staff. Following an evaluation of possible solutions, Michael Page chose the Check Point Full Disk Encryption and Media...

    Provided By Check Point Software Technologies

  • Case Studies // Jul 2009

    Bavarian Brewer Safeguards Traditions

    Erdinger Wei?brau reached the top of the world Wei?bier market by combining tradition and innovation. To brew its traditional recipes, Erdinger Wei?brau uses the most modern production methods, supported by a complex IT structure. With the subsequent separation of the internal networks, for example the separation of the production network...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Mobitel Secures Internet Communications With the Check Point VPN-1 Power Solution

    Mobitel is a leading Slovenian mobile telecommunications operator offering cutting edge services. Mobitel employees depend on constant, high-volume Internet communications. Large quantities of data are transferred to and from the mobile multimedia Web and WAP portal, Planet, which offers informative, useful, and entertaining content and services that are constantly being...

    Provided By Check Point Software Technologies

  • Case Studies // Feb 2009

    ENN Group Selects Check Point for More Efficient and Scalable Security With Centralized Management

    ENN Group, headquartered in the Hebei Province of China, is committed to the development and utilization of clean energy. The risk of network security breaches has soared with the rapid growth in Internet traffic. Compromised PCs can easily spread attacks to other systems and cause far-reaching damage. With an outmoded...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Department of Education Relies on IP Appliances to Meet Expanding Latency and Performance Needs

    The Department of Education in an Asia-Pacific country is the lead government agency providing national leadership in education and workplace training. In order to handle the increased bandwidth requirements created by video conferencing, an electronic curriculum, VoIP, and the high log-on rates of student users, IT administrators faced the critical...

    Provided By Check Point Software Technologies

  • Case Studies // Apr 2009

    Leading Financial Institution Turns to IP Appliance Multi-Core Security Platforms to Meet Performance and Traffic Requirements

    With its network traffic rapidly growing and more services being brought online, this major international financial services organization recognized the need for a more robust network security solution. To address its critical network and traffic concerns the bank re-architected its infrastructure with a modular and flexible network security solution. Specifically,...

    Provided By Check Point Software Technologies

  • Case Studies // Oct 2008

    Check Point Power-1 Provides CSL Limited With Robust Protection and Unrivalled Manageability

    Established in 1983, CSL Limited is Hong Kong's first mobile phone operator and 2008 marks its 25th anniversary. Robust security protection is crucial to CSL's business success. Any amount of service downtime can strongly affect the company's image and reputation among consumers. CSL decided to go with the new Check...

    Provided By Check Point Software Technologies

  • Case Studies // Aug 2008

    Jeonju University Transforms Their Security Environment With Check Point Integrated Appliance Solutions

    Jeonju University in South Korea plays a leading role in the area as a knowledge-based institution and as a leader for regional innovation. The university faced many challenges in securing their network. Daily traffic left the already overburdened server open to increased attacks, creating a vulnerable internet environment. What Jeonju...

    Provided By Check Point Software Technologies

  • Case Studies // Jan 2009

    Southern Housing Group Renovatessecurity for Network of Small Offices

    Southern Housing Group is a medium-size organization of 500 employees with an extensive network of remote offices. In this dynamic environment, security was a persistent problem. Though the Group had outsourced security management, viruses and other intrusions continued to take a toll on network performance and user productivity. Centric Networks...

    Provided By Check Point Software Technologies

  • Case Studies // Jan 2009

    Secured by Check Point, International SOS Comes to the Rescue

    International SOS used appliances to help secure communications, but found them to be unwieldy in emergencies and remote locations. At the same time, most firewall and VPN security solutions demand a great deal of patience and knowledge to set up, and receive only secondary focus in the remote field locations...

    Provided By Check Point Software Technologies

  • Case Studies // Jun 2009

    MBM Computer System Solutions Leverages Check Point to Deliver Internet Security for SMBs and Generate Recurring Revenue

    MBM Computer System Solutions has been headquartered in Troy, Michigan since 1985. MBM required a solution that offered unsurpassed IT security along with central management capabilities in order to keep pace with ongoing business needs as well as the constantly shifting security threats. Just as important, the company needed a...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Check Point IPS Software Blade: Changing the Face of IPS

    The historical standard for IPS security is to deploy a full physical layer of IPS appliances complete with an independent management component on a dedicated management server. The full processing power of dedicated HW appliances was required to support the intense processing requirements for IPS analysis. The IPS SW Blade...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Check Point Software Blade Architecture and Revolutionary IPS Software Blade

    Protecting networks against today's constantly evolving threat environment has never been more challenging. Infrastructure, connectivity and performance requirements keep growing. New and varied threats are leading to more security vendors, point-products and complexity, while IT teams are under increasing pressure to reduce costs and complexity, and do more with existing...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Seamlessly Integrate IPS Into Your Firewall

    Intrusion Prevention Systems (IPS) is a de facto standard in today's network security architecture. The new Check Point IPS Software Blade allows to easily and seamlessly integrate full IPS capabilities into the firewall - while delivering the industry's highest performance, the best threat coverage, and the best total security value...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    The NEW IPS: A Technical Discussion

    The attendee will learn about the new Check Point IPS Software Blade! This NEW IPS Blade provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. It delivers the industry's highest performing security gateway, the industry's best threat coverage, and gives the best total security...

    Provided By Check Point Software Technologies

  • Webcasts // Sep 2009

    Getting the Most Performance Out of Your Security Appliance

    Network security environments are growing in complexity with evolving Internet traffic patterns and fast proliferation of security threats. The need to maintain consistent performance while addressing evolving traffic patterns and threats is paramount. The attendee will learn how the next generation security appliance delivers consistent performance without sacrificing network security.

    Provided By Check Point Software Technologies

  • Webcasts // Apr 2009

    SmartDefense Services: Stay Ahead of the Threats

    The security landscape keeps evolving. More attacks. More technologies. More products. And little time to apply all patches. Protecting data and networks requires up-to-date protections embedded into security gateways to avoid being vulnerable to exploits. The attendee will learn how Check Point SmartDefense Services provide preemptive security for Check Point...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Business Enablement in a Down Economy Through Secure Remote Access

    The presenter will discuss how Secure Remote Access technologies can empower businesses during these turbulent economic times. This webcast will cover how to keep employees, clients, partners, and other stakeholders connected and collaborating during times of crisis. Then the presenter will briefly discuss how Check Point solutions, including the Connectra...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2010

    Virtualization Security and PCI Compliance

    The attendee will learn how to maintain separation and isolation of servers in a virtualized environment in order to meet PCI Compliance requirements. The presenters will discuss the issues that arise in deploying security when the datacenter transforms from physical to virtual, and then cover new technologies and solutions from...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    A Customer Reference on Check Point Power-1 Appliances

    The attendee of this webcast will learn why a telecommunication company chose to integrate Check Point Power-1 appliances into their security infrastructure. Firewalls today need to deal with increasingly complex application threats as well as network threats. These application layer threats require more intensive processing than traditional firewalls can handle....

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Endpoint Security: Protecting Sensitive and Confidential Information

    Check Point Endpoint Security solutions provide data protection for laptops, PCs, removable media and mobile devices. Independently certified data security products ensure that the enterprise, government and law enforcement customers remain in compliance with regulatory standards. By leveraging a strong and efficient blend of full disk encryption, access control, removable...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Intrusion Prevention From an Analyst's Perspective

    Providing robust security to protect the organization's network and business against increasingly sophisticated attacks is key to driving the business. Yet deploying intrusion prevention systems can be complex and time consuming, monopolizing the expert resources. The presenters share insight on the practical business benefits that companies can gain by implementing...

    Provided By Check Point Software Technologies

  • Webcasts // Jan 2009

    Endpoint Security: Compliance at the Endpoint Is "Out of Sight, Out of Mind" a Risky Security Strategy?

    Endpoint Compliance is a tricky process. While gateways are a cost effective solution, they don't see all the traffic, especially from mobile users. For increasingly diverse users and their devices, endpoint security struggles to address state, federal, international, and industry regulations, internal policies (acceptable use and intellectual property protection), malicious...

    Provided By Check Point Software Technologies