18.07.2012 Views

printmgr file

printmgr file

printmgr file

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHECK POINT SOFTWARE<br />

FORM 20-F DFN ON-BOA<br />

ˆ200FDMqk04f7o5e7(Š<br />

200FDMqk04f7o5e7<br />

RR Donnelley ProFile wcrdoc1<br />

10.10.12 WCRjacis0in 26-Mar-2012 17:20 EST<br />

229899 TX 22 2*<br />

PAL<br />

09-Apr-2012 13:21 EST CURR<br />

PS PMT 1C<br />

• Virtual Private Networks (VPNs) software blade – Provides the means to enable private communication<br />

over a network by encrypting traffic between various sub-networks (site-to-site) or individual computers<br />

(such as laptops and other mobile devices) and the enterprise network.<br />

• Antivirus and Anti-Malware software blade – Stops viruses and other malware at the gateway before they<br />

affect users. Enables screening of specific application protocols such as Web traffic to allow/block access to<br />

specific Web addresses based on their content. It also includes screening for viruses to detect downloads of<br />

malicious applications.<br />

• Anti-Spam and Email Security software blade – Provides comprehensive protection for an enterprise’s<br />

messaging infrastructure. A multi-dimensional approach protects the email infrastructure, provides highly<br />

accurate spam protection, and defends organizations from a wide variety of virus and malware threats<br />

delivered within email. Continual updates though a Check Point software update service help to intercept<br />

threats before they spread.<br />

• Web Security software blade – Protects users and enterprises by restricting access to an array of potentially<br />

dangerous sites and content, blocking inappropriate Web surfing to over 20 million URLs. Content pro<strong>file</strong>s<br />

are updated continually through a Check Point software update service.<br />

• Advanced Networking & Clustering – The Check Point Advanced Networking and Clustering Software<br />

Blade simplifies network security deployment and management within complex and highly utilized<br />

networks, while maximizing network performance and security in multi-Gbps environments. Built on top of<br />

the Software blades architecture, the Advanced Networking & Clustering blade provides advanced routing,<br />

multicast support, QOS, ISP redundancy, Load Balancing, and Security Acceleration technologies. Please<br />

note that the Advanced Networking blade (ADN) and the Acceleration & Clustering blade (ACCL) should<br />

not appear in the PL unless specifically searched for (like the IAS systems).<br />

• Data Loss Prevention software blade – Introduced in 2010, it combines technology and processes to<br />

pre-emptively protect sensitive information – regulatory, confidential and proprietary – from unintentional<br />

loss. Its unique UserCheck technology brings a human factor to DLP by empowering users to remediate<br />

incidents in real-time while educating them on DLP policies. The included MultiSpect technology creates<br />

a data classification engine to assist in preventing inadvertent data loss.<br />

• Application Control software blade – Introduced in 2010, it enables enterprises to identify, allow, block or<br />

limit usage of thousands of Web 2.0 applications and leverages Check Point AppWiki, one of the world’s<br />

largest application libraries with over 90,000 Web 2.0 widgets and more than 4,500 Internet applications,<br />

including social networking, instant messaging and media streaming. Enterprises benefit from a unique<br />

combination of technology, user awareness with UserCheck and broad application control.<br />

• URL Filtering software blade – With a new version launched in 2011, the Check Point URL Filtering<br />

Software Blade integrates with Application Control, allowing unified enforcement and management of all<br />

aspects of web security. URL Filtering provides optimized web control through full integration in the<br />

gateway to prevent bypass through external proxies, an integration of policy enforcement with Application<br />

Control for full Web and Web 2.0 protection, and empowers and educates users on web usage policy in real<br />

time with embedded Check Point UserCheck technology.<br />

• Mobile Access software blade – Launched in 2010 as a safe and easy solution to connect to corporate<br />

applications over the internet with smartphones, iPhones, tablets, iPads or PC. It provides enterprise-grade<br />

remote access via SSL VPN, allowing a simple, safe and secure connectivity to email, calendar, contacts<br />

and corporate applications. Users can easily download the Check Point Mobile App on their smartphone<br />

free of charge, get an activation code from their administrator and start to access their corporate resource<br />

safely.<br />

• Antibot software blade – Announced in 2011 and available in the second quarter of 2012, the new Anti-Bot<br />

Software Blade detects bot-infected machines, prevents bot damages by blocking bot “Command &<br />

Control” communications, and integrates with other software blades to provide a comprehensive threat<br />

prevention solution on a single gateway.<br />

22

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!