printmgr file
printmgr file
printmgr file
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CHECK POINT SOFTWARE<br />
FORM 20-F DFN ON-BOA<br />
ˆ200FDMqk04f7o5e7(Š<br />
200FDMqk04f7o5e7<br />
RR Donnelley ProFile wcrdoc1<br />
10.10.12 WCRjacis0in 26-Mar-2012 17:20 EST<br />
229899 TX 22 2*<br />
PAL<br />
09-Apr-2012 13:21 EST CURR<br />
PS PMT 1C<br />
• Virtual Private Networks (VPNs) software blade – Provides the means to enable private communication<br />
over a network by encrypting traffic between various sub-networks (site-to-site) or individual computers<br />
(such as laptops and other mobile devices) and the enterprise network.<br />
• Antivirus and Anti-Malware software blade – Stops viruses and other malware at the gateway before they<br />
affect users. Enables screening of specific application protocols such as Web traffic to allow/block access to<br />
specific Web addresses based on their content. It also includes screening for viruses to detect downloads of<br />
malicious applications.<br />
• Anti-Spam and Email Security software blade – Provides comprehensive protection for an enterprise’s<br />
messaging infrastructure. A multi-dimensional approach protects the email infrastructure, provides highly<br />
accurate spam protection, and defends organizations from a wide variety of virus and malware threats<br />
delivered within email. Continual updates though a Check Point software update service help to intercept<br />
threats before they spread.<br />
• Web Security software blade – Protects users and enterprises by restricting access to an array of potentially<br />
dangerous sites and content, blocking inappropriate Web surfing to over 20 million URLs. Content pro<strong>file</strong>s<br />
are updated continually through a Check Point software update service.<br />
• Advanced Networking & Clustering – The Check Point Advanced Networking and Clustering Software<br />
Blade simplifies network security deployment and management within complex and highly utilized<br />
networks, while maximizing network performance and security in multi-Gbps environments. Built on top of<br />
the Software blades architecture, the Advanced Networking & Clustering blade provides advanced routing,<br />
multicast support, QOS, ISP redundancy, Load Balancing, and Security Acceleration technologies. Please<br />
note that the Advanced Networking blade (ADN) and the Acceleration & Clustering blade (ACCL) should<br />
not appear in the PL unless specifically searched for (like the IAS systems).<br />
• Data Loss Prevention software blade – Introduced in 2010, it combines technology and processes to<br />
pre-emptively protect sensitive information – regulatory, confidential and proprietary – from unintentional<br />
loss. Its unique UserCheck technology brings a human factor to DLP by empowering users to remediate<br />
incidents in real-time while educating them on DLP policies. The included MultiSpect technology creates<br />
a data classification engine to assist in preventing inadvertent data loss.<br />
• Application Control software blade – Introduced in 2010, it enables enterprises to identify, allow, block or<br />
limit usage of thousands of Web 2.0 applications and leverages Check Point AppWiki, one of the world’s<br />
largest application libraries with over 90,000 Web 2.0 widgets and more than 4,500 Internet applications,<br />
including social networking, instant messaging and media streaming. Enterprises benefit from a unique<br />
combination of technology, user awareness with UserCheck and broad application control.<br />
• URL Filtering software blade – With a new version launched in 2011, the Check Point URL Filtering<br />
Software Blade integrates with Application Control, allowing unified enforcement and management of all<br />
aspects of web security. URL Filtering provides optimized web control through full integration in the<br />
gateway to prevent bypass through external proxies, an integration of policy enforcement with Application<br />
Control for full Web and Web 2.0 protection, and empowers and educates users on web usage policy in real<br />
time with embedded Check Point UserCheck technology.<br />
• Mobile Access software blade – Launched in 2010 as a safe and easy solution to connect to corporate<br />
applications over the internet with smartphones, iPhones, tablets, iPads or PC. It provides enterprise-grade<br />
remote access via SSL VPN, allowing a simple, safe and secure connectivity to email, calendar, contacts<br />
and corporate applications. Users can easily download the Check Point Mobile App on their smartphone<br />
free of charge, get an activation code from their administrator and start to access their corporate resource<br />
safely.<br />
• Antibot software blade – Announced in 2011 and available in the second quarter of 2012, the new Anti-Bot<br />
Software Blade detects bot-infected machines, prevents bot damages by blocking bot “Command &<br />
Control” communications, and integrates with other software blades to provide a comprehensive threat<br />
prevention solution on a single gateway.<br />
22