Check Point Partners With Amazon To Offer New Security Solution In The Cloud
Partnership will enable organizations to deploy a Check Point virtual appliance in the Amazon Cloud to prevent network attacks and data breaches
REDWOOD CITY, Calif. - January 4, 2012 - Check Point' Software Technologies Ltd (http://www.checkpoint.com). (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced its security gateways are now available to customers through Amazon Web Services, enabling organizations to extend their security to the cloud with a full range of protections, or Check Point software blades http://www.checkpoint.com/products/softwareblades/architecture/index.html , such as Firewall http://www.checkpoint.com/products/firewall-software-blade/index.html , Intrusion Prevention http://www.checkpoint.com/products/ips-software-blade/ , Application Control http://www.checkpoint.com/products/application-control-software-blade/index.html , URL Filtering http://www.checkpoint.com/products/url-filtering-software-blade/ and many more. With a few simple steps, customers can easily deploy a Check Point virtual appliance - a security gateway for virtual environments - in the Amazon Cloud to activate protections that prevent network attacks and data breaches, while enabling secure connectivity in dynamic cloud computing environments.
As the adoption of cloud computing brings enterprises many benefits, including business continuity, flexible computing power and cost savings, businesses are increasingly leveraging the cloud to spend less time managing IT resources, and more time focusing on core business objectives. To keep an organization's infrastructure and business secure, organizations must enforce the appropriate levels of protection both on premise and in the cloud.
More Security Insights
- Forrester Study: The Total Economic Impact of VMware View
- Securing Executives and Highly Sensitive Documents of Corporations Globally
"Infrastructure in the cloud is a reality. As many businesses plan to manage their IT infrastructure in the cloud, it's important to protect both cloud and on-premise infrastructure to ensure that all corporate assets remain secure," said Oded Gonda, vice president of network security products at Check Point Software Technologies. "One of the best ways to achieve this is to enforce a consistent security policy across the organization."
With Check Point's virtual appliances, customers can embrace the benefits of cloud computing with confidence. Whether an organization runs their entire business operations on AWS or utilizes AWS for flexible scaling needs, customers can enable advanced security with a few simple steps, implementing a unified policy that protects all corporate assets residing in either on-premise infrastructure or in the cloud. For example, businesses, such as online retailers or educational institutions, can leverage the Amazon Cloud to run production workloads and manage seasonal peaks in web traffic and customer orders, while the Check Point virtual appliance further reinforces protection in the cloud infrastructure - ensuring all data and channels of business communication remain secure.
"Security gateways in cloud environments are equally as important as they are in on premise locations, therefore unifying their policies and reporting capabilities in a centralized way are critical to ensuring both the security and compliance mandates of enterprises worldwide," said Lawrence Pingree, research director at Gartner.
To mitigate sophisticated threats and prevent sensitive information from being exposed in the cloud, Check Point customers can now benefit from the same flexible and comprehensive security solutions available for on-premise networks with over 30 software blade protections, including Firewall (http://www.checkpoint.com/products/firewall-software-blade/index.html), IPS (http://www.checkpoint.com/products/ips-software-blade/), Virtual Private Network (http://www.checkpoint.com/products/ipsec-vpn-software-blade/) (VPN), Application Control (http://www.checkpoint.com/products/application-control-software-blade/index.html), URL Filtering (http://www.checkpoint.com/products/url-filtering-software-blade/), Mobile Access (http://www.checkpoint.com/products/mobile-access-software-blade/index.html) and Data Loss Prevention (http://www.checkpoint.com/products/dlp-software-blade/index.html) (DLP), without additional hardware or management complexity.
"We offer a shared-responsibility security model that enables customers to choose a security solution that best meets their application's needs, while AWS remains focused on providing a safe and secure infrastructure," said Stephen Schmidt, chief information security officer at Amazon Web Services. "We are excited that Check Point has embraced this model and is providing an innovative solution for customers."
Key Features and Benefits:
Security for the cloud - Select Check Point Software Blades to enable a solution that meets an organization's exact cloud security needs. Businesses can protect assets in the cloud with Firewall http://www.checkpoint.com/products/firewall-software-blade/index.html , IPS http://www.checkpoint.com/products/ips-software-blade/ , Application Control http://www.checkpoint.com/products/application-control-software-blade/index.html and URL Filtering http://www.checkpoint.com/products/url-filtering-software-blade/ ; enable secure connectivity and mobility with VPN http://www.checkpoint.com/products/ipsec-vpn-software-blade/ and Mobile Access http://www.checkpoint.com/products/mobile-access-software-blade/index.html ; and prevent all data and corporate resources from loss with Check Point DLP http://www.checkpoint.com/products/dlp-software-blade/index.html.
Fast Deployment - Through Amazon Web Services, customers can simply click on the Check Point virtual appliance to begin enabling software blades in the cloud.
Unified Management and Reporting - Manage a virtual appliance in Amazon Cloud using industry leading security management. Customers can simplify compliance and audits with unified logs and reporting, while enforcing consistent security across the organization.
To learn more about the new Check Point virtual appliance, visit: http://www.checkpoint.com/products/virtual-appliance-for-amazon-web-services/.
"From start-ups to large enterprises, the cloud creates a lot of new opportunities for companies to grow their businesses in a cost-effective way. We are pleased to be working with Amazon Web Services to help our customers safeguard corporate assets and enforce consistent security policies throughout their organization," concluded Gonda.
Pricing and Availability Pricing for the Check Point virtual appliance is based on the existing software blade licensing and can be purchased through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/ http://partners.us.checkpoint.com/partnerlocator/ .
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com http://www.checkpoint.com ), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.