"Data loss prevention is a universal business challenge. At some point, we have all sent an e-mail with sensitive information to the wrong recipient. For the first time in the industry, Check Point solves the challenge of data leakage," said Gil Shwed, chairman, founder and chief executive officer at Check Point. "By combining innovative technology with our UserCheck remediation solution, Check Point DLP enables businesses to enforce corporate policies and educate users while preventing intentional and unintentional data loss."
With Check Point DLP, companies have the option to activate UserCheck technology that will alert employees with a pop-up window, or an email, when data may be at risk. Employees are prompted to quickly remediate incidents before a data breach can occur. Check Point's unique user remediation function educates users on self-incident handling and corporate data policies while minimizing IT exposure to sensitive data.
Files that are sent or uploaded to the web are processed by Check Point's new technology: MultiSpect, a multi-data classification engine that inspects traffic flow for all data-in-motion and provides high accuracy in correlating users, data types and processes. To help companies achieve day-one prevention without costly professional services, Check Point DLP solution provides over 250 pre-defined best practice policies that prevent exposure to personally identifiable information and compliance-related data.
"We evaluated DLP in the past and found a lot of the solutions in the market were extremely complicated and difficult to implement," said Etienne Greeff, professional service director at MIS CDS, an independent security consultancy firm. "Check Point DLP removes the security complexities associated with data loss prevention. We were able to easily apply customizable and pre-defined policies to our business needs and were fully deployed in less than three hours."
"I love the Check Point DLP solution. The user interface is simple to manage and it's easy to understand what types of data are at risk," said Kevin Capp, chief technology officer for the Town of Castle Rock. "It's a relief knowing there is a solution in place that gives us a complete security view of what's happening with our data."
Features and benefits of Check Point DLP solution include:
The Check Point DLP software blade can be deployed on all Check Point security gateways and is also available as a dedicated DLP-1 appliance. More information on Check Point DLP can be found at: http://www.checkpoint.com/products/dlp/index.html.
"Check Point DLP takes a new approach to data loss prevention by combining unique technology and user empowerment. We are excited to provide a solution that will change the DLP landscape from complex to simple and from detection to true prevention," concluded Shwed.
Check Point DLP is available in April and can be purchased through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.