11.07.2015 Views

Download - enterpriseinnovation.net

Download - enterpriseinnovation.net

Download - enterpriseinnovation.net

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

awards2009Unified Threat Management (UTM)Check Point UTM-1 TotalSecurity AppliancesFirewall/VPNCheck Point VPN-1 PowerIntrusion Detection/PreventionCheck Point IPS-1 ApplianceCentralized security:more control, less hassleCheck Point scores withsecurity appliancesBy Ross MilburnCheck Point Software Technologieshas been among theglobal leaders in security technologyfor many years, embracingthe two domains of <strong>net</strong>work anddata security. The company wasfounded in 1993 by the presentchairman and CEO, Gil Shwed,who was closely associated withthe development of the first firewalls, and ithas gone on to become a multinational corporation,with international headquarters in TelAviv, subsidiaries in more than 30 countriesand 1900 employees.Check Point’s solutions were originallysoftware-based, but two years ago, a rangeof UTM (Unified Threat Management) applianceswas introduced, containing firewall,virtual private <strong>net</strong>work (VPN), intrusion prevention(IPS), antivirus, anti-spying, URLfiltering, Web security and anti-spam. “Theappliance market is growing in double digits,and it constituted 35 percent of our productsales last year,” said Itzhak Weinreb, VP ofsales. “We also strengthened our hand by acquiringNokia’s high-end security business,after many years of providing software fortheir appliances.”The range of UTMs extends from SMEsizedboxes to huge units with 65Gbps <strong>net</strong>workthroughput.Software blades for customizationUTM-1 models incorporate a new technologycalled software blade architecture, thatenables security functionality such as firewall,IPSec, Anti-virus and anti-malware oranti-spam to be provided on a customizedCheck Point’s Weinreb. Switching capex to opex isgood in the current financial environmentbasis. “The customer only pays for the softwarerequired,” said Weinreb, “so the CPUis used efficiently and the appliance is morecost-effective.”For companies that don’t need all the comprehensivefeatures in the UTM-1 range, ordon’t want to invest in purchase, a subscriptionservice is available, operated by telcosand other service providers, acting as MSPs(Managed Service Providers). “Switchingcapex to opex is good in the current financialenvironment,” notes Weinreb.End-point protection is becoming a moreimportant element of Check Point’s business,as more mobile devices are connectedto enterprise <strong>net</strong>works. The ease with whichmobile devices can be connected to <strong>net</strong>worksposes new security risks. “Enterprises are goingto get the message in one of two ways: oneway is through regulation, as in Japan,” saidWeinreb. “The alternative is when crisis develop,as when thousands of patient recordswere lost thanks to unauthorized memorystick use, as occurred in Hong Kong.”In 2007, Check Point acquired Pointsec, aworldwide provider of mobile device security.“Pointsec delivers a trusted solution forcontinued on page 60 458 Computerworld Hong Kong June 2009 www.cw.com.hk

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!