Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

2/24/2009
10:11 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point Releases ZoneAlarm Extreme Security Software Suite

Check Point integrates security suite with advanced browser virtualization technology to offer Internet security, identity theft protection, safe browsing

Redwood City, CA — February 23, 2009 -- Check Point Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced the release of ZoneAlarm Extreme Security, a new all-in-one premium software suite that combines core technologies with comprehensive browser security to give consumers unrivaled protection against sophisticated computer and Web attacks. ZoneAlarm Extreme Security also includes secure online backup and system maintenance tools, providing online consumers with the ultimate protection for their home computers. Check Point also released today updated versions of ZoneAlarm Internet Security Suite, ZoneAlarm Pro and ZoneAlarm Antivirus that are compatible with Vista 64 bit as well as XP and Vista 32 bit operating systems.

"There has been a dramatic rise in attacks that target vulnerabilities in the Web browser," said Jon Crotty, security research analyst at IDC. "To help stay safe online while shopping and even browsing, consumers should utilize a strong, robust software security package that not only secures their computer but also their Web browser."

The multiple security layers included in the new ZoneAlarm Extreme Security suite provide critical protection against computer and Web-based attacks that by-pass traditional security suites. First introduced with ZoneAlarm ForceField, the virtualized browser technology offers consumers unparalleled protection against new and constantly evolving online threats. The Internet Explorer 7 browser flaw, for example, enabled hackers to infect existing Web sites or set-up rogue ones, which then exposed users to identity-stealing malware. Similarly, the Waledac botnet recently ran a targeted "campaign" around Valentine's Day, soliciting people with phony holiday themed emails and greeting cards. When users clicked through to a Web site to receive their message, malicious software was silently and automatically downloaded to their computer enabling hackers to steal credit card numbers or online passwords. In both of these examples and many others, only Check Point's ZoneAlarm security product line successfully defended these attacks the first moment they occurred. For more information on Waledac please visit http://blog.zonealarm.com/ or for the latest Web attacks please visit www.zonealarm.com/stopattacks.

"Check Point focuses on creating technologies that help consumers stay ahead of online threats, earning us an unparalleled record for stopping Web attacks," said Juliette Sultan, head of global marketing for Check Point. "With the new ZoneAlarm offering we have taken PC security beyond its traditional level by integrating the most advanced browser security available today with system tools and secure online backup to provide the protection necessary to keep consumers safe in today's sophisticated threat environment."

Built on the award-winning technologies found in ZoneAlarm Internet Security Suite and ZoneAlarm ForceField, ZoneAlarm Extreme Security includes:

The most advanced firewall along with antivirus, anti-spam, anti-spyware and a comprehensive set of additional top-rated PC defenses ZoneAlarm ForceField, the state-of-the-art virtualized browser security solution, enabling users to bank, shop and surf safely online Online backup tools provide data security by safeguarding the files and data consumers care about most, protecting them from loss, theft, accidental deletion or disk failure Optional private-key encryption further strengthens data security by protecting important documents should the storage server ever be compromised PC tune-up and system maintenance tools that automatically clean, organize and streamline the system Support for Windows XP and Windows Vista 64-bit and 32-bit platforms More information and a full list of ZoneAlarm Extreme Security features and benefits can be found at http://www.zonealarm.com/.

"ZoneAlarm Extreme Security was created to give consumers the peace of mind that their daily online activities and stored personal information are constantly protected from existing and future Web attacks," concluded Sultan.

Pricing & Availability ZoneAlarm Extreme Security by Check Point is available immediately and can be purchased from the ZoneAlarm Web site for USD 69.95 (3-user license). For a full list of product features and benefits or to purchase ZoneAlarm Extreme Security, visit www.zonealarm.com.

About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.
CVE-2021-32553
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-17 package apport hooks, it could expose private data to other local users.