Check Point Announces New Application Control SoftwareCheck Point Announces New Application Control Software
Application Control Software Blade enables organizations to secure and manage the use of thousands of Web 2.0 apps
August 3, 2010
Redwood City, CA — August 02, 2010
Check Point' Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced its new Application Control Software Blade that enables organizations to secure and manage the use of thousands of Web 2.0 applications in the enterprise. The new blade integrates Check Point’s unique UserCheck technology to engage employees in the decision-making process and enables IT administrators to tailor application usage policies. In addition, it delivers unmatched application visibility by leveraging Check Point AppWiki, the world’s largest application library, with over 50,000 Web 2.0 widgets and more than 4,500 Internet applications, including social networking, instant messaging and media streaming. For the first time, companies benefit from a unique combination of technology, user awareness and broad application control – all available in a single solution.
According to a recent Check Point and Ponemon global survey of over 2,100 IT security administrators, the majority of respondents believe employees are essential to helping organizations mitigate security risks associated with emerging Internet applications in the enterprise. Check Point is bringing a differentiated, modern approach to application control that provides a unique combination of robust security technology and user awareness, both necessary for employees to utilize Web 2.0 tools without jeopardizing the security of the network. Check Point’s new Application Control software blade enables organizations to define granular policy controls for web applications tailored to meet the organization and employees’ specific needs. In addition, the new blade integrates Check Point’s innovative UserCheck technology to alert users of the potential risks applications may cause and asks employees whether the purpose is for business or personal use. The solution educates users on corporate use policies, while providing key usage trends to IT administrators.
“We’re bringing a new dynamic to application control by giving businesses a strong combination of technology, employee awareness and access to the largest database of web applications in the industry,” said Dorit Dor, vice president of products at Check Point Software Technologies. “Organizations will benefit from granular policy control that is truly customized based on their employee, business and security needs.”
“Internally, we struggle with how to enable access to certain applications or websites based on employee roles and responsibilities. For example, we may want to give employees’ access to Facebook, but block non-business applications, such as games or chat,” said Erik Yunghans, network security administrator at Bentley Systems, Inc. “It’s great knowing Check Point gives our security policies that level of granularity and flexibility.”
Based on Check Point’s Software Blade architecture, the Application Control blade can be activated with a single click on any Check Point security gateway, enabling organizations to leverage their existing infrastructure. The new blade is centrally managed from a single security management console, and IT administrators can monitor and control application usage based on identity, user or group, frequency and level of risk with unified event analysis. The new blade also provides seamless, agent-based and agent-less, Active Directory integration to allow individual or group access to specific applications, while restricting others.
“Internet threats today leverage Web applications, especially social networking, to gain access to the corporate network,” said Charles Kolodgy, security research analyst at IDC. “Any company looking at solutions to provide Web 2.0 protection should consider the strength of the technology, the volume of the library of protections available, where the solution is deployed in the network and what role employees have in the process of mitigating risk. Check Point’s new Application Control Software Blade is a strong and complete solution that addresses these requirements.”
Additional information about Check Point Application Control Software Blade can be found at: http://www.checkpoint.com/products/softwareblades/application-control.html. To browse through a sampling of applications in the Check Point AppWiki, visit: http://appwiki.checkpoint.com.
“Check Point’s latest firewall innovation, combined with our application library – 50 times larger than any other in the industry – provides organizations with the broadest and most flexible protection, without taking away the business advantages of Web 2.0 use,” concluded Dor.
Availability General availability for the Check Point Application Identity/Control Software Blade will be available for purchase through the Check Point worldwide network of value-added resellers in the fourth quarter of 2010. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023