Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Secure Mobile Corporate Desktop with Abra USB Appliance

Check Point : 03 March, 2010  (New Product)
Check Point Software brings more scope to mobile users with a USB device enabling VPN connectivity, strong authentication and encrypted storage which allows secure use of corporate desktop environments whilst on the move
Check Point Software has announced Check Point Abra, a new solution which turns any PC into a fully secure corporate desktop. Abra provides users access to company emails, files and applications anywhere whether offline or online through integrated virtual private network (VPN) connectivity. Abra loads itself automatically on any PC, and contains local encrypted storage to protect any data stored on the device.

Remote workers and contractors accessing the corporate network through personal or third-party equipment can put businesses' sensitive data at risk and threaten the network. For example, mobile workers storing corporate data on a home PC could inadvertently expose company information when a child or another home user visits a peer-to-peer (P2P) file sharing site or send attachments via instant message (IM). Similarly, a contractor could accidentally send a business' proprietary data to another client. Regardless of the intent, the potential damage from data loss is the same.

To provide corporations with a secure and affordable alternative to allowing third-party PCs access the network, Check Point and SanDisk partnered to develop Abra. The device combines proven Check Point virtualization, VPN and security technologies with an encrypted SanDisk high performance USB drive to create a secure, virtual workspace. Users simply plug an Abra stick into a Windows-based PC and enter their credentials to immediately turn any PC into a corporate desktop.

"Abra can change the way people work remotely. It's a new simple way for secure mobility," said Gil Shwed, chairman and chief executive officer at Check Point. "Abra is like no other tool, not only combining virtualization, VPN and strong data security into a single ultra-portable device, but doing it in an easy to use cost effective manner. With Abra, people will be able to work remotely and securely without the need to carry expensive, heavy laptops."

To safeguard sensitive data stored on Abra, the device utilizes several advanced security measures. Hardware and software encryption protects data at rest and when in use. Program Control regulates the types of applications used by Abra to protect the corporate network from malware associated with unauthorized applications. Finally, virtualization technology isolates an Abra work session from the host PC, ensuring sensitive data remains on Abra and preventing data loss.

"In our business we need to demo solutions at our partners' corporate premises, and often they do not allow us to bring our own PC," said Loup-Fred Regent, marketing manager at Computerlinks. "With Abra, we just stick in the key and securely connect to the Intranet. Check Point is the only company to provide this level of ultra mobility. Abra is the best experience and the best overall solution to connect to the Intranet without a PC."

Features and benefits of Check Point Abra include:

- Standard Windows user environment enables easy navigation and rapid end-user adoption
Prevents data loss by controlling outgoing traffic to networks and websites

- File transfer control allows exchange of files between personal and corporate workspace environments to be controlled by security policy

- Compliance scanning automatically scans the host PC to ensure an antivirus solution from a known vendor is active on the endpoint.

- User authentication enforces minimum password strength, as well as certificates and tokens for multi-factor authentication. A 'virtual keyboard' can be used at login to block password theft by key loggers

- Central management with Check Point SmartDashboard provides policy administration and updates through Check Point gateways, including authentication and compliance scanning rules and VPN settings
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo