Check Point Unveils DLP SolutionCheck Point Unveils DLP Solution
Check Point DLP provides granular policy definitions that align to existing corporate data processes
April 8, 2010
Redwood City, Calif. " April 13, 2010 " Check Point' Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced its new network-based Data Loss Prevention (DLP) solution that helps businesses move data loss from detection to prevention by pre-emptively protecting sensitive information—regulatory, confidential and proprietary—from unintentional loss. Check Point DLP provides granular policy definitions that align to existing corporate data processes, educating users on such processes while enforcing them. In addition to a multi-data correlation engine that delivers high accuracy in identifying data breaches, Check Point brings a human factor to DLP by enabling users to remediate potential violations in real-time.
"Data loss prevention is a universal business challenge. At some point, we have all sent an e-mail with sensitive information to the wrong recipient. For the first time in the industry, Check Point solves the challenge of data leakage," said Gil Shwed, chairman, founder and chief executive officer at Check Point. "By combining innovative technology with our UserCheck remediation solution, Check Point DLP enables businesses to enforce corporate policies and educate users while preventing intentional and unintentional data loss."
With Check Point DLP, companies have the option to activate UserCheck technology that will alert employees with a pop-up window, or an email, when data may be at risk. Employees are prompted to quickly remediate incidents before a data breach can occur. Check Point's unique user remediation function educates users on self-incident handling and corporate data policies while minimizing IT exposure to sensitive data.
Files that are sent or uploaded to the web are processed by Check Point's new technology: MultiSpect, a multi-data classification engine that inspects traffic flow for all data-in-motion and provides high accuracy in correlating users, data types and processes. To help companies achieve day-one prevention without costly professional services, Check Point DLP solution provides over 250 pre-defined best practice policies that prevent exposure to personally identifiable information and compliance-related data.
"We evaluated DLP in the past and found a lot of the solutions in the market were extremely complicated and difficult to implement," said Etienne Greeff, professional service director at MIS CDS, an independent security consultancy firm. "Check Point DLP removes the security complexities associated with data loss prevention. We were able to easily apply customizable and pre-defined policies to our business needs and were fully deployed in less than three hours."
"I love the Check Point DLP solution. The user interface is simple to manage and it's easy to understand what types of data are at risk," said Kevin Capp, chief technology officer for the Town of Castle Rock. "It's a relief knowing there is a solution in place that gives us a complete security view of what's happening with our data."
Features and benefits of Check Point DLP solution include:
UserCheck, self-administered incident handling that educate users on data use policies, reducing future mistakes and IT involvement
Three-tiered MultiSpect engine that correlates and classifies sensitive data including intellectual property, personally identifiable information (PII), compliance-related data (HIPAA, SOX, PCI DSS, etc.)
Over 250 pre-defined best practice policies tuned to optimize security, performance and meet compliance requirements
Check Point open scripting language that creates custom data types without costly professional services
Central policy management with Check Point Security Management or Provider-1 enables security policies to be managed in a single, user-friendly interface
Coverage of traffic transport types for all TCP protocols including SMTP, HTTP and FTP
The Check Point DLP software blade can be deployed on all Check Point security gateways and is also available as a dedicated DLP-1 appliance. More information on Check Point DLP can be found at: http://www.checkpoint.com/products/dlp/index.html.
"Check Point DLP takes a new approach to data loss prevention by combining unique technology and user empowerment. We are excited to provide a solution that will change the DLP landscape from complex to simple and from detection to true prevention," concluded Shwed.
Check Point DLP is available in April and can be purchased through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
You May Also Like
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023