2013 CHECK POINT ANNUAL SECURITY REPORT
038
Check Point Software Technologies Ltd. (www.
checkpoint.com) is the worldwide leader in securing
the Internet. Check Point provides its customers with
uncompromised protection against all types of threats. Its
product offerings reduce security complexity and lower
total cost of ownership. Check Point first pioneered the
security industry with FireWall-1 and its patented Stateful
Inspection technology. Today, Check Point continues to
develop innovative products based on the Software Blade
Architecture™, providing customers with flexible and
simple solutions that can be fully customized to meet the
exact security needs of any organization. Check Point
is the only vendor to go beyond technology and define
security as a business process. Check Point 3D Security
uniquely combines policy, people and enforcement best
practices to achieve a greater level of information asset
protection. This unique approach enables organizations
to implement an effective security policy blueprint that
aligns with actual business needs. Check Point serves
customers of all sizes, industries and geographies. Its client
portfolio includes all Fortune and Global 100 companies.
As well, Check Point’s award-winning ZoneAlarm®
security solutions protect millions of individuals and
small businesses from hackers, spyware and identity theft.
Check Point 3D Security
Check Point 3D Security redefines security as a
3-dimensional business process that combines policies,
people and enforcement for a stronger protection across all
layers of security including network, data and endpoints. To
achieve the level of protection needed in the 21
st
century,
security needs to grow from a collection of disparate
technologies to an integrated business process. With 3D
Security, organizations can now implement a blueprint for
security that goes beyond technology to ensure information
security integrity.
Check Point 3D Security enables organizations to
redefine security by integrating these dimensions into an
effective business process:
Check Point Software Blade Architecture™
As a key tool in creating true 3D Security, the Check Point
Software Blade Architecture™ allows companies to enforce
security policies while helping to educate users on those
policies. This is the first and only security architecture
that delivers total, flexible and manageable security to
companies of any size. More importantly, as new threats and
needs emerge, Check Point Software Blade Architecture™
quickly and flexibly extends security services on-demand
and without the addition of new hardware or management
complications. Solutions are centrally managed through
a single console that reduces complexity and operational
overhead. Multilayered protection is critical to combat
06
ABOUT CHECK POINT
SOFTWARE TECHNOLOGIES
Enforce
, consolidate and control all
layers of security (i.e. network, data,
application, content and user)
Security that involves
People
in policy definition, education
and incident remediation
Policies
that support business
needs and transform security
into a business process