16.08.2012 Views

FORM 20-F - Check Point

FORM 20-F - Check Point

FORM 20-F - Check Point

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

� User Directory software blade – Enables <strong>Check</strong> <strong>Point</strong> gateways to leverage directory servers (LDAP)<br />

based user information stores, eliminating the risks associated with manually maintaining and<br />

synchronizing redundant data stores.<br />

� IPS Event Analysis software blade – Provides a complete IPS event management system providing<br />

situational visibility, easy to use forensic tools, and reporting.<br />

� SmartProvisioning software blade – Provides centralized administration and provisioning of <strong>Check</strong> <strong>Point</strong><br />

security devices via a single management console.<br />

� SmartWorkflow software blade – Delivers a formal process of policy change management that helps<br />

administrators reduce errors and enhance compliance.<br />

� Reporting software blade – Turns vast amounts of security and network data into graphical, easy-tounderstand<br />

reports.<br />

� SmartEvent software blade – Centralized, real-time security event correlation and management for <strong>Check</strong><br />

<strong>Point</strong> and third-party devices.<br />

In addition, we offer our SMART-1 security management appliances that combine functionality, storage<br />

and turn-key deployment into a single device.<br />

Our software blades run in a variety of deployment environments and on platforms that include standard<br />

workstations, servers and dedicated appliances. <strong>Check</strong> <strong>Point</strong> has both software and dedicated appliance solutions<br />

for gateway and management offerings. <strong>Check</strong> <strong>Point</strong> offers integrated solutions that are sold and serviced jointly<br />

with key partners including Crossbeam Systems Inc. and International Business Machines Corporation (IBM).<br />

Different client products run on different client Operating Systems (OS), such as Microsoft Windows, Mac OS,<br />

Microsoft Windows Mobile, Symbian, Linux and PalmOS.<br />

Technologies<br />

We have developed and acquired a variety of technologies that secure networks, endpoints and<br />

information.<br />

� Stateful Inspection technology – Our patented Stateful Inspection technology is a premier network security<br />

technology. In order to provide accurate and highly efficient traffic inspection, Stateful Inspection extracts<br />

and maintains extensive “state information,” i.e., data that provides context for future screening decisions,<br />

from all relevant communication layers. Stateful Inspection runs on a network gateway or an endpoint,<br />

such as a PC, and enables our products to inspect network traffic at high speed. Our Stateful Inspection<br />

technology can be adapted to new protocols, software applications, and security threats. It can be run on a<br />

wide range of operating systems.<br />

� Application Intelligence – Provides a set of advanced capabilities that prevents the exploitation of<br />

vulnerabilities in business applications, including vulnerabilities in the application code, communication<br />

protocols, and the underlying operating system.<br />

� Security Management Architecture (SMART) – A core component of our unified security architecture,<br />

SMART enables our customers to configure and manage security policies from a central administrative<br />

point. This technology enables the definition and ongoing management of security policies for enterprises<br />

of all sizes. This object-oriented architecture maps real-world entities, such as networks and users, to<br />

graphical representations that can be manipulated in a database. Integrated monitoring and reporting tools<br />

improve the manageability of the system by providing administrators with real-time information on the<br />

state of network and security systems. These tools also provide longer term trending information that is<br />

useful for periodic security management tasks, such as security audits.<br />

24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!