Check Point expands security blade platform

  • (Network World)
  • — 09 February, 2011 05:48

Check Point is introducing four applications for its a la carte security platform that allows customers to create tailored security appliances on off-the-shelf hardware.

The new software blades - Application Control, Identity Awareness, Data Loss Prevention and Mobile Access - are part of a new release of the company's Security Blade Architecture called R75.

The company is also launching 3D Security, a program to raise awareness of security problems and best practices and linking them to high-level business needs and strategies, educating end users and consolidating security enforcement with an overall business view, says Gil Shwed, Check Point's chairman and CEO.

The 3D plan is to publish best practices for what corporate security policies should include, such as data access control, mobile use policies, how to handle security incidents, how to respond when users violate policies, exception handling and auditing, Shwed says.

One example is a Web-based education service for all corporate employees to familiarize them with security policies and their responsibilities to adhere to them. Many of the areas 3D addresses are also addressed by Check Point products, he says.

As for the new software blades, the Application Control tool can discern 100,000 Web applications and widgets, and allow customers to set policies about them.

The Identity Awareness blade enables tapping Active Directory to assign security policies to groups or individuals, giving granular controls and reducing configuration time. The Data Loss Prevention blade protects data and engages with pop-ups if they are about to jeopardize sensitive information. Mobile Access integrates the company's SSL VPN and encryption technologies to protect corporate communications on mobile devices.

Read more about wide area network in Network World's Wide Area Network section.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Tim Greene

Network World
Topics: Check Point Software Technologies, Configuration / maintenance, security best practices, security, hardware systems, Data Center, server
Comments are now closed.

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Compare & Save

Deals powered by WhistleOut
WhistleOut

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?