Check Point VPN-1 UTM Edge All-in-One Appliance Simplifies Security Deployment With Integrated ADSL Modem and Network Access Control.REDWOOD CITY Redwood City, city (1990 pop. 66,072), seat of San Mateo co., W Calif., on San Francisco Bay; inc. 1868. Manufactures include commmunications, electrical, electronic, and medical equipment. , Calif. -- First Comprehensive Security Solution for Remote Sites to Integrate Endpoint Compliance Enforcement
Check Point(R) Software Technologies Ltd. (Nasdaq:CHKP CHKP Check Point Software Technologies Ltd. (stock abbreviation, AMEX) ), the worldwide leader in securing the Internet, today announced the immediate availability of Check Point VPN-1(R) UTM (Unified Threat Management) Refers to a stand-alone appliance or a software package that combines a firewall, antivirus, spam and content filtering as well as intrusion detection. See firewall, antivirus, antispam and IDS. Edge with built-in ADSL See DSL.
ADSL - Asymmetric Digital Subscriber Line modem, an all-in-one appliance that simplifies security deployment without decreasing the level of security or manageability for companies with branch offices. Check Point VPN-1 UTM Edge with ADSL includes all the necessary components for remote offices by consolidating comprehensive security, ADSL, WiFi, and print server support to enable businesses to get remote offices up and running quickly with the same security and complete network protection as core offices and data centers are throughout the organization. Complete network protection is enabled via Cooperative Enforcement(TM) with the Check Point Integrity endpoint security solution. This allows administrators to enforce endpoint compliance with corporate security policies before granting access onto the branch office network.
With new support for industry initiatives such as 802.1x port-based authentication for better network access control, VPN-1 UTM Edge protects the core and branch office network. Cooperative Enforcement with the Check Point Integrity endpoint security solution enables administrators to check a computer's compliance to a security policy before it is allowed onto the branch office network. Secure enforcement of industry regulations through open standards Specifications for hardware and software that are developed by a standards organization or a consortium involved in supporting a standard. Available to the public for developing compliant products, open standards imply "open systems;" that an existing component in a system can be replaced ensures compliance without locking companies into a single vendor's vision.
VPN-1 UTM Edge can be deployed by companies in under five minutes to securely connect remote offices without on-site IT staff and without additional equipment to purchase. With all-in-one security -- powerful stateful inspection A firewall technology that ensures that all inbound packets are the result of an outbound request. Also called "stateful packet inspection" (SPI), it was designed to prevent harmful or unrequested packets from entering the computer. firewall, industrial strength intrusion prevention, gateway antivirus and IPSEC VPN (Virtual Private Network) A private network that is configured within a public network (a carrier's network or the Internet) in order to take advantage of the economies of scale and management facilities of large networks. , VPN-1 UTM Edge also contains wide support for ADSL and WLAN See wireless LAN.
WLAN - wireless local area network protocols to provide companies with the most flexibility and interoperability in deployment. Security management is made simple with a unified security architecture that operates on a single console and policy to provide total control and visibility into the entire enterprise; this provides companies with the ability to examine logs from all locations in a single view.
"Too often, people think easy-to-use means less secure or less manageable," said Dave Burton, director of product marketing for Check Point Software Technologies. "Customers of VPN-1 UTM Edge can testify that simple deployment, centralized management, consistent security, network access control and scalability can be synonymous with ease-of-use and can help organizations secure a common weak link in the enterprise network chain -- the branch office. VPN-1 UTM Edge has a strong history of combining enterprise-class security and plug-and-play simplicity at remote sites and continues that reputation with its latest enhancements."
New features in VPN-1 UTM Edge include:
--Complete Branch Office Connectivity -- Latest ADSL2+ Standard Modem drastically simplifies deployment by condensing con·dense
v. con·densed, con·dens·ing, con·dens·es
1. To reduce the volume or compass of.
2. To make more concise; abridge or shorten.
a. features into one box -- including support for the latest ADSL2+ standard, ADSL2, T.1413, G.DMT See DSL. and G.Lite. By condensing the number of boxes to purchase or rent, deployment is simplified and there are less boxes to maintain.
--Endpoint Security Enforcement -- 802.1x Port-based authentication to RADIUS server ensures that branch office users are not a threat to the network by dynamically assigning users to proper VLAN See virtual LAN.
VLAN - Virtual Local Area Network . Cooperative enforcement with the Check Point Integrity endpoint security solution enables administrators to check a computer's compliance to a security policy before it is allowed onto the branch office network.
--Enables Secure Virtual Access Points -- Up to four SSID (Service Set IDentifier) The name assigned to a wireless Wi-Fi network. All devices must use this same, case-sensitive name to communicate, which is a text string up to 32 bytes long. (WLAN identifiers) can be included on a single VPN-1 UTM Edge appliance, enabling administrators to provision WLAN services based on the level of trust of an individual -- for example, limiting guests exclusively to the Internet.
Pricing and Availability
Pricing for VPN-1 UTM Edge starts at $600 and is available immediately.
For more information about VPN-1 UTM Edge with ADSL and the complete portfolio of perimeter, internal, web and endpoint security solutions from Check Point, please visit http://www.checkpoint.com.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. It is a market leader in the worldwide enterprise firewall, consumer Internet security and VPN markets. Through its NGX NGX Natural Gas Exchange Inc. (Canada)
NGX Next Generation X platform, the company delivers a unified security architecture for a broad range of perimeter, internal, Web, and endpoint security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company's ZoneAlarm Internet Security Suite and additional consumer security solutions are among the highest rated in the industry today, proactively protecting millions of people from hackers, spyware, viruses and identity theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC (OPerations SECurity) The U.S. military term for concealing critical information as part of a counterintelligence plan. A form of "security by obscurity," OPSEC determines what information adversaries can obtain or piece together from observation and to provide measures for ), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,200 Check Point partners in 88 countries and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.
(C)2003-2006 Check Point Software Technologies Ltd. All rights reserved.
Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor, ClusterXL, ConnectControl, Connectra, Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Eventia, Eventia Analyzer, Eventia Reporter, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, NGX, Open Security Extension, OPSEC, OSFirewall, Policy Lifecycle Management, Provider-1, Safe@Office, SecureClient, SecureKnowledge, SecuRemote, SecurePlatform, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, SiteManager-1, SmartCenter, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL (Secure Sockets Layer) The leading security protocol on the Internet. Developed by Netscape, SSL is widely used to do two things: to validate the identity of a Web site and to create an encrypted connection for sending credit card and other personal data. Network Extender See Media Center Extender, bus extender and DOS extender. , Stateful Clustering, TrueVector, Turbocard, UAM UAM Universidad Autónoma de Madrid (Spain)
UAM Universidad Autonoma Metropolitana (México)
UAM Uniwersytet im. , UserAuthority, User-to-Address Mapping, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Power, VPN-1 Power VSX (Verification Suite for X/Open) A testing procedure from X/Open that verifies compliance with their endorsed standards. VSX3 has over 5,500 tests for compliance with XPG3. See XPG.
VSX - Verification Suite for X/open. , VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988, and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications.