Free Newsletter
Register for our Free Newsletters
Access Control
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
ProSecurityZone Sponsor
Company Directory
Check Point
Unit 4 Lindenwood, Crockford Lane,
Chineham Business Park, Chineham
Basingstoke, Hampshire
RG24 8QY
[t] +44 1256 374560
[f] +44 1256 708565
Check Point Examines Security Approaches To The Year Ahead
18 January, 2011
Nick Lowe of Check Point peers deeply into the prediction for endpoint and data security trends of 2011 with particular emphasis on emerging threats
High Score For Check Point In NSS Labs Testing
12 January, 2011
High levels of security effectiveness in real world security performance testing from NSS Labs revealed for the IPS Software Blade from Check Point Software Technologies
Survey Indicates Increased Mobile Workforce Security Complexity in 2011
09 December, 2010
IT consumerisation and the growing use of mobile terminals puts user management and remote access at the top of IT security concerns for the coming year
Secure SSL VPN Access For Mobile Users
26 October, 2010
The Mobile Access Software Blade from Check Point delivers secure corporate data access for remote mobile users via secure VPN
Preventing Data Leakage Through Reducing Employee Mistakes
16 September, 2010
Nick Lowe of Check Point discusses the loss of data through employee error and suggests ways of applying preventive measures to reduce these instances of non-malicious data loss incidents
Virtual Security Gateway for Public and Private Cloud Protection
01 September, 2010
Security Gateway software blades from Check Point provide virtual network protection to meet the requirements of cloud-based service providers
Branch Office Gateway Appliance With 1.5 Gigabit Performance
12 August, 2010
Check Point has released the Series 80 Appliance based on software blade architecture with high performance at low cost for remote branch office network security
Security Management Segmentation By Virtual Domain
12 August, 2010
Multi-Domain Management software blades from Check Point enable virtual security management for all sizes of business
Web 2.0 Application Security A Concern For UK Businesses
03 August, 2010
Business and IT professionals in the UK are unconvinced that employees take security risks into account when using web 2.0 applications in the workplace according to research from Check Point and the Ponemon Institute
Web 2.0 Application Control Available
03 August, 2010
Check Point is tackling the problem of web 2.0 application security in the workplace with the release of an Application Control Software Blade to bring social networking widgets and applications under tighter security control and policy enforcement
ToolTalk Database Server Vulnerability Discovered
29 July, 2010
Remote injection attack possibility on ToolTalk Database protected against for Check Point customers
How to Avoid Becoming the Victim of a Browser Attack
21 June, 2010
Guy Guzner of Check Point explains browser attacks, how they operate, why cyber-criminals are increasingly using them and what you can do to prevent them
Check Point Buys Into Protection Of Intellectual Property Held In Documents
10 June, 2010
Specialist in document encryption and content security, Liquid Machines has been bought by IT security company Check Point, giving the company access to the Liquid Machines enterprise rights management portfolio of patents and products
Mitigation of Data Loss On Stolen Laptops
09 June, 2010
With laptop theft reaching as much as 10%, the risk of losing more than just the equipment is extremely high unless certain measures are taken to reduce the impact of losing hardware, as explained by Belinda Sproston of Check Point
Technology Agreements Brings Enhanced Protection Against Online Threats
08 June, 2010
RSA and Check Point have agreed to share real-time threat intelligence to provide improved protection to consumers against viruses, trojans, phishing attacks and other threats
Free ZoneAlarm Firewall Available from Check Point
25 May, 2010
Bolstering anti-virus protection, the new ZoneAlarm Firewall makes use of community information to update itself to latest threats offering additional protection for no extra cost
Improved UTM Appliances For Smaller Businesses at Lower Cost
05 May, 2010
Check Point is delivering Unified Threat Management with gigabit firewall to smaller businesses at a price of $750
Magic Quadrant Placement For Check Point Enterprise Firewalls
08 April, 2010
Gartner recognizes Check Point Software Technologies for its success in the development and sales of Enterprise Network Firewalls
Secure Mobile Corporate Desktop with Abra USB Appliance
03 March, 2010
Check Point Software brings more scope to mobile users with a USB device enabling VPN connectivity, strong authentication and encrypted storage which allows secure use of corporate desktop environments whilst on the move
Endpoints remain unprotected in the enterprise
14 January, 2010
Study reveals that as little as 27% of companies surveyed protect their data through encryption leading to exposure to compromised data
Full Disk Encryption for Snow Leopard
10 December, 2009
Macintoshes operating OS X Snow Leopard con now benefit from Full Disk Encryption technology from Check Point for increased data security
Half of UK corporate laptops vulnerable to loss
04 December, 2009
An e-mail survey from Check Point Technologies has revealed that over half of corporate laptops have no anti-virus protection or data encryption installed
Granular control over internet application and widget usage
24 November, 2009
With the acquisition of FaceTime's application database, Check Point can now offer businesses the ability to control web uses at an application level including Web 2.0 Widgets
Full Disk Encryption Product Gains Certification from UK Government
23 November, 2009
CCTM Accreditation opens Public Sector market opportunities for Check Point with its Endpoint Security Full Disk Encryption R72 product for Windows, MAX OS X and Linux
Pointsec PC 6.3.1 achieves EAL 4 certification
10 November, 2009
Full disk encryption product from Check Point Software Technologies achieves Common Criteria Evaluation Assurance Level 4 certification
Mobile data protection recognition from Gartner
06 November, 2009
Gartner has acknowledged Check Point's value in the market for Mobile Data Protection technology
ZoneAlarm Extreme Security for Windows 7
23 October, 2009
Check Point's consumer ZoneAlarm security suite now available for Windows 7 including identity protection and hard drive encryption
Endpoint security compatible with Windows 7
22 October, 2009
Common endpoint security technology from Check Point provides companies with the ability to operate mixed operating system environments with common protection levels
YearÃÂÃâ€ÂÃâ€Âs ZoneAlarm Pro license available free on Patch Tuesday
13 October, 2009
Promotional offer from Check Point enables free download of a full year's license of the full version of ZoneAlarm Pro 2010 software on Patch Tuesday only
Data Loss Prevention for EBS Building Society
02 October, 2009
Irish building society chooses Check Point Media Encryption to prevent the loss of confidential data from removable media and mobile computer systems
Unpatched Microsoft IIS exploit protection
08 September, 2009
Check Point's IPS products provide protection from exploits that have not yet been patched by Microsoft
Security for laptops expanded in latest Zone Alarm release
02 September, 2009
Check Point's popular consumer IT security suite, Zone Alarm gains significant enhancements in the Windows 7 ready 2010 version including full disk encryption, unification of anti-virus and anti-spyware engines as well as OS firewall
Data loss prevention at Camden Council
18 August, 2009
Check Point is providing London Council with full disk encryption for its laptops to reduce the risk of sensitive mobile data going astray
BIND vulnerability protection for Check Point customers
05 August, 2009
IPS solutions from Check Point Technologies provides protection to Windows and UNIX DNS servers against the Berkeley Internet Name Domain vulnerability
Change management add-on for security infrastructure
15 July, 2009
Check Point is following its modular software blade architecture with the release of SmartWorkflow, a security management tool for change management
Removing employee responsibility from the data security loop
24 June, 2009
Nick Lowe of Check Point uses a case study involving NHS Blood and Transplant to illustrate the protection of corporate data without impacting employee functions
Nine Ball protection for Check Point Endpoint Security users
23 June, 2009
Malicious site re-direct malware will not compromise the endpoints of users of Check Point's Endpoint Security software where the exploit will be stopped
Secure remote network access for financial services provider
05 June, 2009
The Norwich and Peterborough Building Society has chosen Connectra NGX R66 from Check Point for enabling secure remote access to its corporate network
Security Software Blades integrated into IP appliances
02 June, 2009
High speed IP appliance incorporates R70 security gateway and the latest intrusion prevention software blade
UK Government certification for Check Point products
28 May, 2009
Unified Threat Management and media encryption products from Check Point Technologies gains CCTM certification for use in UK Government applications
A guide to web 2.0 security
11 May, 2009
Nick Lowe of Check Point examines the issus of Web 2.0 security and how it can be achieved by businesses
EAL4 certification for IPS and firewall from Check Point
01 May, 2009
Check Point's secure gateway and SmartConsole management system have gained EAL4 certification
High performance security gateway for data centres
22 April, 2009
Flexible Power-1 11000 series of high performance gateways combine software blade architecture with Xeon 5500 processing power for serving large networks
Nokia Security Appliance Business acquired by Check Point
15 April, 2009
IP appliances from Nokia loaded with Check Point security gateway without the requirement for two separate company contracts
Half of UK organisations risk data breaches through lack of data encryption security
18 March, 2009
More than half of UK public and private sector organisations still risk data breaches and leaks, because they do not have data encryption in place to secure information on laptops, handheld devices and removable storage media.
Software blade architecture from Check Point
25 February, 2009
Innovative approach to security software architecture announced by Check Point enables organizations to meet their specific software security requirements within one modular and selectable architecture
Wider threat coverage with Check Point R70
25 February, 2009
R70 security gateway from Check Point delivers complete intrusion prevention and is based on software blade architecture
ZoneAlarm Extreme Security incorporates browser virtualisation technology
24 February, 2009
The ultimate protection suite for home users combines ZoneAlarm security suite with other tools including browser virtualisation, maintenance tools and on-line backup capability
Enterprise class UTM for small businesses
19 February, 2009
UTM-1 130 from Check Point offers small businesses the opportunity to gain enterprise level unified threat management capabilities
Gateway consolidation appliance for data centres and service providers
19 February, 2009
The Check Point VSX-1 appliance provides consolidation capabilities for security gateways in larger enterprises, service providers and data centres
First | Prev  | 1 | 2 | 3  | Next  | Last