printmgr file
printmgr file
printmgr file
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
CHECK POINT SOFTWARE<br />
FORM 20-F DFN ON-BOA<br />
ˆ200FDMqk04iv8sa7bŠ<br />
200FDMqk04iv8sa7<br />
RR Donnelley ProFile wcrdoc1<br />
10.10.12 WCRjacis0in 26-Mar-2012 21:27 EST<br />
229899 TX 26 3*<br />
PAL<br />
09-Apr-2012 13:21 EST CURR<br />
PS PMT 1C<br />
We also offer our SMART-1 security management appliances that combine functionality, storage and<br />
turn-key deployment into a single device.<br />
Our software blades run in a variety of deployment environments and on platforms that include standard<br />
workstations, servers and dedicated appliances. Check Point has both software and dedicated appliance solutions<br />
for gateway and management offerings. Check Point offers integrated solutions that are sold and serviced jointly<br />
with key partners including Crossbeam Systems Inc. and International Business Machines Corporation (IBM).<br />
Different client products run on different client Operating Systems (OS), such as Microsoft Windows, Mac OS,<br />
Microsoft Windows Mobile, Symbian, Linux, iOS and Android.<br />
Technologies<br />
We have developed and acquired a variety of technologies that secure networks, endpoints and information.<br />
• Stateful Inspection technology – Our patented Stateful Inspection technology is a premier network<br />
security technology. In order to provide accurate and highly efficient traffic inspection, Stateful<br />
Inspection extracts and maintains extensive “state information,” i.e., data that provide context for<br />
future screening decisions, from all relevant communication layers. Stateful Inspection runs on a<br />
network gateway or an endpoint, such as a PC, and enables our products to inspect network traffic at<br />
high speed. Our Stateful Inspection technology can be adapted to new protocols, software applications<br />
and security threats. It can be run on a wide range of operating systems.<br />
• Application Intelligence – Provides a set of advanced capabilities that prevents the exploitation of<br />
vulnerabilities in business applications, including vulnerabilities in the application code,<br />
communication protocols and the underlying operating system.<br />
• Security Management Architecture (SMART) – A core component of our unified security architecture,<br />
SMART enables our customers to configure and manage security policies from a central administrative<br />
point. This technology enables the definition and ongoing management of security policies for<br />
enterprises of all sizes. This object-oriented architecture maps real-world entities, such as networks and<br />
users, to graphical representations that can be manipulated in a database. Integrated monitoring and<br />
reporting tools improve the manageability of the system by providing administrators with real-time<br />
information on the state of network and security systems. These tools also provide longer term trending<br />
information that is useful for periodic security management tasks, such as security audits.<br />
• Security and Network Traffic Enforcement – Based on our Stateful Inspection technology, the<br />
INSPECT engine scans all incoming and outgoing traffic at security enforcement points. These are<br />
typically located at the network perimeter as security gateways, on critical servers, or inside the<br />
network, dividing the network into separate segments. We have developed a broad range of<br />
technologies that can be implemented by our INSPECT engine. In addition, third party technologies<br />
can be implemented through our Open Platform for Security (OPSEC) framework.<br />
• SecurePlatform – Bundles the Check Point security solutions together with an operating system (OS) in<br />
a single package that is easy to deploy. It optimizes the performance of security and operating systems<br />
and includes a set of tools that ease setup and network configuration, thus reducing the total cost of<br />
ownership. SecurePlatform runs on a variety of open systems, i.e., systems whose key interfaces are<br />
based on widely supported standards.<br />
• ClusterXL – Provides high availability and load sharing to keep businesses running. It distributes traffic<br />
between clusters of redundant gateways so that the computing capacity of multiple machines may be<br />
combined to increase total throughput. If an individual gateway becomes unreachable, all connections<br />
are redirected to a designated backup without interruption.<br />
• CoreXL – Enables the intelligent balancing of security traffic loads between multiple cores on multicore<br />
processors. It results in a higher level of performance for integrated intrusion prevention.<br />
26