18.07.2012 Views

printmgr file

printmgr file

printmgr file

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CHECK POINT SOFTWARE<br />

FORM 20-F DFN ON-BOA<br />

ˆ200FDMqk04iv8sa7bŠ<br />

200FDMqk04iv8sa7<br />

RR Donnelley ProFile wcrdoc1<br />

10.10.12 WCRjacis0in 26-Mar-2012 21:27 EST<br />

229899 TX 26 3*<br />

PAL<br />

09-Apr-2012 13:21 EST CURR<br />

PS PMT 1C<br />

We also offer our SMART-1 security management appliances that combine functionality, storage and<br />

turn-key deployment into a single device.<br />

Our software blades run in a variety of deployment environments and on platforms that include standard<br />

workstations, servers and dedicated appliances. Check Point has both software and dedicated appliance solutions<br />

for gateway and management offerings. Check Point offers integrated solutions that are sold and serviced jointly<br />

with key partners including Crossbeam Systems Inc. and International Business Machines Corporation (IBM).<br />

Different client products run on different client Operating Systems (OS), such as Microsoft Windows, Mac OS,<br />

Microsoft Windows Mobile, Symbian, Linux, iOS and Android.<br />

Technologies<br />

We have developed and acquired a variety of technologies that secure networks, endpoints and information.<br />

• Stateful Inspection technology – Our patented Stateful Inspection technology is a premier network<br />

security technology. In order to provide accurate and highly efficient traffic inspection, Stateful<br />

Inspection extracts and maintains extensive “state information,” i.e., data that provide context for<br />

future screening decisions, from all relevant communication layers. Stateful Inspection runs on a<br />

network gateway or an endpoint, such as a PC, and enables our products to inspect network traffic at<br />

high speed. Our Stateful Inspection technology can be adapted to new protocols, software applications<br />

and security threats. It can be run on a wide range of operating systems.<br />

• Application Intelligence – Provides a set of advanced capabilities that prevents the exploitation of<br />

vulnerabilities in business applications, including vulnerabilities in the application code,<br />

communication protocols and the underlying operating system.<br />

• Security Management Architecture (SMART) – A core component of our unified security architecture,<br />

SMART enables our customers to configure and manage security policies from a central administrative<br />

point. This technology enables the definition and ongoing management of security policies for<br />

enterprises of all sizes. This object-oriented architecture maps real-world entities, such as networks and<br />

users, to graphical representations that can be manipulated in a database. Integrated monitoring and<br />

reporting tools improve the manageability of the system by providing administrators with real-time<br />

information on the state of network and security systems. These tools also provide longer term trending<br />

information that is useful for periodic security management tasks, such as security audits.<br />

• Security and Network Traffic Enforcement – Based on our Stateful Inspection technology, the<br />

INSPECT engine scans all incoming and outgoing traffic at security enforcement points. These are<br />

typically located at the network perimeter as security gateways, on critical servers, or inside the<br />

network, dividing the network into separate segments. We have developed a broad range of<br />

technologies that can be implemented by our INSPECT engine. In addition, third party technologies<br />

can be implemented through our Open Platform for Security (OPSEC) framework.<br />

• SecurePlatform – Bundles the Check Point security solutions together with an operating system (OS) in<br />

a single package that is easy to deploy. It optimizes the performance of security and operating systems<br />

and includes a set of tools that ease setup and network configuration, thus reducing the total cost of<br />

ownership. SecurePlatform runs on a variety of open systems, i.e., systems whose key interfaces are<br />

based on widely supported standards.<br />

• ClusterXL – Provides high availability and load sharing to keep businesses running. It distributes traffic<br />

between clusters of redundant gateways so that the computing capacity of multiple machines may be<br />

combined to increase total throughput. If an individual gateway becomes unreachable, all connections<br />

are redirected to a designated backup without interruption.<br />

• CoreXL – Enables the intelligent balancing of security traffic loads between multiple cores on multicore<br />

processors. It results in a higher level of performance for integrated intrusion prevention.<br />

26

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!