2013 CHECK POINT ANNUAL SECURITY REPORT
038
Check Point Software Technologies Ltd. (www.
checkpoint.com), the worldwide leader in securing
the Internet, provides customers with uncompromised
protection against all types of threats, reduces security
complexity and lowers total cost of ownership. Check
Point first pioneered the industry with FireWall-1 and its
patented Stateful Inspection technology. Today, Check
Point continues to develop new innovations based on the
Software Blade Architecture, providing customers with
flexible and simple solutions that can be fully customized
to meet the exact security needs of any organization.
Check Point is the only vendor to go beyond technology
and define security as a business process. Check Point
3D Security uniquely combines policy, people and
enforcement for greater protection of information assets
and helps organizations implement a blueprint for security
that aligns with business needs. Customers include tens
of thousands of organizations of all sizes, including
all Fortune and Global 100 companies. Check Point‘s
award-winning ZoneAlarm solutions protect millions of
consumers from hackers, spyware and identity theft.
Check Point 3D Security
Check Point 3D Security redefines security as a
3-dimensional business process that combines policies,
people and enforcement for stronger protection across
all layers of security—including network, data and
endpoints. To achieve the level of protection needed in
the 21
st
century, security needs to grow from a collection
of disparate technologies to an effective business process.
With 3D Security, organizations can now implement
a blueprint for security that goes beyond technology to
ensure the integrity of all information security.
Check Point 3D Security enables organizations to
redefine security by integrating these dimensions into a
business process:
Check Point Software Blade Architecture
As a key tool in creating true 3D Security, the Check Point
Software Blade Architecture™ allows companies to enforce
security policies while helping to educate users on those
policies. The Software Blade architecture is the first and
only security architecture that delivers total, flexible and
manageable security to companies of any size. What’s
more, as new threats and needs emerge, Check Point
Software Blade Architecture quickly and flexibly extends
security services on-demand—without the addition of
new hardware or management complexity. Solutions are
centrally managed through a single console that reduces
complexity and operational overhead. Multilayered
protection is critical today to combat dynamic threats such
as bots, Trojans and Advanced Persistent Threats (APTs).
Firewalls today are more like multi-function gateways but
Enforce
, consolidate and control
all layers of security- network, data,
application, content and user
Security that involves
People
in policy definition, education
and incident remediation
Policies
that support business
needs and transform security
into a business process
06
ABOUT CHECK POINT
SOFTWARE TECHNOLOGIES
1...,27,28,29,30,31,32,33,34,35,36 38,39,40,41,42,43,44,45,46,47,...50