Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor

Software Blad Based Network Security Suite

Check Point : 09 February, 2011  (New Product)
Check Point releases R75 bringing 3D security vision to network environments making use of the company's Software Blade Architecture

Check Point has announced the immediate availability of Check Point R75, the latest version of its leading network security suite based on the Software Blade Architecture.

Check Point R75 is the first release to implement elements of the Check Point 3D Security vision, that redefines security as a business process combining policies, people and enforcement for stronger protection across all layers of security.  With 3D Security, corporations can now implement a blueprint for security that goes beyond technology to ensure the integrity of all information security.

Check Point R75 introduces four new software blades for Identity Awareness, Application Control, Data Loss Prevention, and Mobile Access. The new R75 release enables businesses to gain greater visibility and control over data, Web 2.0 applications, and mobile access – bringing organizations multi-dimensional security in a single, integrated solution.

New in Check Point R75 is Identity Awareness, a software blade that enables organizations to manage security policies by users and groups. With Identity Awareness, organizations get unmatched application and access control through the creation of accurate identity-based policies. Identity Awareness integrates seamlessly with Active Directory for fast and easy deployment.

Also new is the Application Control Software Blade, which brings a differentiated, modern approach to application control by providing a combination of robust security technology, user awareness and broad application control – each necessary for employees to utilize Web 2.0 tools without jeopardizing the security of the enterprise. The new blade integrates Check Point’s unique UserCheck technology to engage employees in the remediation process and enables IT administrators to tailor application usage policies based on level of risk and user needs. In addition, it delivers unmatched application visibility by leveraging Check Point AppWiki, the world’s largest application library, now with over 100,000 Web 2.0 application and widgets.

“We are pleased to bring to market a release that delivers on our vision of 3D Security,” said Dorit Dor, vice president of products at Check Point Software Technologies. “Check Point R75 enables customers to extend the firewall into a multi-functional and multi-dimensional gateway that consolidates protections into a single, unified solution – allowing customers to enforce the security controls they need to respond to evolving needs and threats.”

Other new or updated Software Blades in Check Point R75 enable customers to easily implement 3D Security and customize their own Check Point R75 security gateway with critical protections:

* Data Loss Prevention (DLP) Software Blade – Prevents loss of data and critical business information by scanning emails and web. While Check Point’s robust data classification engine combines users, content and processes to identify and block potential breaches, the unique UserCheck technology brings a human factor to DLP by empowering users to remediate incidents in real-time and educating them on data loss prevention policies.

* Intrusion Prevention (IPS) Software Blade – Provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in total system security and performance. Recommended by NSS Labs, Check Point IPS excelled in the industry's most comprehensive third-party intrusion prevention group testing to date.

* Mobile Access Software Blade – Delivers secure connectivity for iPhones and iPads while protecting data with proven encryption technology. Ideal for mobile workers using managed or unmanaged devices, the Mobile Access Software Blade is easy to install and use with the Check Point Mobile application now available in the App Store.

“Today’s corporations need to do more than layer technologies to secure their business.  They need to develop a security blueprint that supports their corporate needs, while strengthening their information security. Check Point R75 takes them in that direction, providing a strong foundation for 3D Security in a single, unified solution,” concluded Dor.
Bookmark and Share
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
   © 2012
Netgains Logo