053
ENTERPRISE SECURITY BLUEPRINT
CHECK POINT SOFTWARE-DEFINED PROTECTION
CP
SDP
C
About
Check Point
CP
For 20 years, Check Point’s mission has been to secure the Internet. From inventing the Firewall to now
leading the Network Security industry, Check Point focuses on developing the technologies needed to
secure enterprises as the Internet continues to evolve.
Today the Internet is not only a legitimate platform for businesses; it’s also a green field for
cybercriminals. Given this environment, Check Point has developed an architecture to enable the
deployment of multi-layer threat prevention that provides maximum protection against all threats
including zero-day attacks.
Check Point’s comprehensive enterprise security solutions are based on the flexible Check Point
Software Blade Architecture™ which is uniquely suited for enterprise implementation of the security
blueprint described in this document. A Software Blade is a modular security functionality building
block that can be enabled on a wide range of enforcement points, including an extensive set of Check
Point security appliances, endpoints, mobile devices and cloud environments.
Built on this architecture, Check Point's award-winning Next Generation Firewall, Secure Web
Gateway, Threat Prevention and Data Protection solutions have been proven to prevent and mitigate
cyber-attacks from DDoS, APTs, botnets, viruses, zero-day malware, and targeted and mainstream
attacks, as well as limit the data theft that often results from these threats.
Check Point’s security products and services leverage ThreatCloud™, a cloud-based threat intelligence
repository updated by Check Point research labs, industry malware feeds and a network of global
threat sensors that collect attack information from worldwide gateways.
Check Point recognizes that technology alone is not enough to address new security challenges. A
unified and seamless security strategy is needed—one that integrates security into an overall business
process. This strategy begins with a well-defined corporate policy mapped to user needs and integrated
into the organization’s security solution. It includes educating people, as the majority of risk businesses
face involves users unintentionally violating policy or compromising sensitive data. And finally, it
requires that security enforcement include a high degree of visibility and control by managing security
with a single and holistic view of the corporate environment.
Check Point combines this holistic approach to security with its innovative technology solutions to
address today’s threat challenges and to redefine security as a business enabler.
Consistently identified by analysts as a market leader in network security, Check Point Software has
provided customers with innovative enterprise-class security solutions and best practices for the past
20 years. Check Point customers include more than 100,000 organizations of all sizes, including all
Fortune and Global 100 companies.