FORM 20-F - Check Point
FORM 20-F - Check Point
FORM 20-F - Check Point
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
� User Directory software blade – Enables <strong>Check</strong> <strong>Point</strong> gateways to leverage directory servers (LDAP)<br />
based user information stores, eliminating the risks associated with manually maintaining and<br />
synchronizing redundant data stores.<br />
� IPS Event Analysis software blade – Provides a complete IPS event management system providing<br />
situational visibility, easy to use forensic tools, and reporting.<br />
� SmartProvisioning software blade – Provides centralized administration and provisioning of <strong>Check</strong> <strong>Point</strong><br />
security devices via a single management console.<br />
� SmartWorkflow software blade – Delivers a formal process of policy change management that helps<br />
administrators reduce errors and enhance compliance.<br />
� Reporting software blade – Turns vast amounts of security and network data into graphical, easy-tounderstand<br />
reports.<br />
� SmartEvent software blade – Centralized, real-time security event correlation and management for <strong>Check</strong><br />
<strong>Point</strong> and third-party devices.<br />
In addition, we offer our SMART-1 security management appliances that combine functionality, storage<br />
and turn-key deployment into a single device.<br />
Our software blades run in a variety of deployment environments and on platforms that include standard<br />
workstations, servers and dedicated appliances. <strong>Check</strong> <strong>Point</strong> has both software and dedicated appliance solutions<br />
for gateway and management offerings. <strong>Check</strong> <strong>Point</strong> offers integrated solutions that are sold and serviced jointly<br />
with key partners including Crossbeam Systems Inc. and International Business Machines Corporation (IBM).<br />
Different client products run on different client Operating Systems (OS), such as Microsoft Windows, Mac OS,<br />
Microsoft Windows Mobile, Symbian, Linux and PalmOS.<br />
Technologies<br />
We have developed and acquired a variety of technologies that secure networks, endpoints and<br />
information.<br />
� Stateful Inspection technology – Our patented Stateful Inspection technology is a premier network security<br />
technology. In order to provide accurate and highly efficient traffic inspection, Stateful Inspection extracts<br />
and maintains extensive “state information,” i.e., data that provides context for future screening decisions,<br />
from all relevant communication layers. Stateful Inspection runs on a network gateway or an endpoint,<br />
such as a PC, and enables our products to inspect network traffic at high speed. Our Stateful Inspection<br />
technology can be adapted to new protocols, software applications, and security threats. It can be run on a<br />
wide range of operating systems.<br />
� Application Intelligence – Provides a set of advanced capabilities that prevents the exploitation of<br />
vulnerabilities in business applications, including vulnerabilities in the application code, communication<br />
protocols, and the underlying operating system.<br />
� Security Management Architecture (SMART) – A core component of our unified security architecture,<br />
SMART enables our customers to configure and manage security policies from a central administrative<br />
point. This technology enables the definition and ongoing management of security policies for enterprises<br />
of all sizes. This object-oriented architecture maps real-world entities, such as networks and users, to<br />
graphical representations that can be manipulated in a database. Integrated monitoring and reporting tools<br />
improve the manageability of the system by providing administrators with real-time information on the<br />
state of network and security systems. These tools also provide longer term trending information that is<br />
useful for periodic security management tasks, such as security audits.<br />
24