About
Subscribe

Check Point changes way mobile users work

Johannesburg, 09 Mar 2010

SecureData Security, part of JSE-listed SecureData Holdings and the sub-Saharan distributor for Check Point Software Technologies, the worldwide leader in securing the Internet, today announced the latter's Check Point Abra, a new solution which turns any PC into a fully secure corporate desktop.

Abra provides users access to company e-mails, files and applications anywhere, whether offline or online through integrated virtual private network (VPN) connectivity. Abra loads itself automatically on any PC and contains local encrypted storage to protect any data stored on the device.

Remote workers and contractors accessing the corporate network through personal or third party equipment can put businesses' sensitive data at risk and threaten the network. For example, mobile workers storing corporate data on a home PC could inadvertently expose company information when a child or another home user visits a peer-to-peer (P2P) file-sharing site or sends attachments via instant message (IM). Similarly, a contractor could accidentally send a business' proprietary data to another client. Regardless of the intent, the potential damage from data loss is the same.

To provide corporations with a secure and affordable alternative to allowing third party PCs to access the network, Check Point and SanDisk partnered to develop Abra. The device combines proven Check Point virtualisation, VPN and security technologies with an encrypted SanDisk high performance USB drive to create a secure, virtual workspace. Users simply plug an Abra stick into a Windows-based PC and enter their credentials to immediately turn any PC into a corporate desktop.

"Abra can change the way people work remotely. It's a new simple way for secure mobility," commented Gil Shwed, chairman and chief executive officer at Check Point. "Abra is like no other tool, not only combining virtualisation, VPN and strong data security into a single ultra-portable device, but doing it in an easy-to-use cost-effective manner. With Abra, people will be able to work remotely and securely without the need to carry expensive, heavy laptops."

To safeguard sensitive data stored on Abra, the device utilises several advanced security measures. Hardware and software encryption protects data at rest and when in use. Program Control regulates the types of applications used by Abra to protect the corporate network from malware associated with unauthorised applications. Finally, virtualisation technology isolates an Abra work session from the host PC, ensuring sensitive data remains on Abra and preventing data loss.

“This capability provides the capability to turn any PC into a corporate desktop and thus includes the protection normally associated with such devices,” added Doros Hadjizenonos, Product Manager for Check Point at SecureData. “In essence, it is the 'equivalent' of carrying a corporate desktop PC in your pocket.”

The features and benefits of Check Point Abra include:

* A standard Windows user environment that enables easy navigation and rapid end-user adoption.
* The prevention of s data loss by controlling outgoing traffic to networks and Web sites.
* A file transfer control that allows exchange of files between personal and corporate workspace environments to be controlled by security policy.
* Compliance scanning that automatically scans the host PC to ensure an anti-virus solution from a known vendor is active on the endpoint.
* User authentication that enforces minimum password strength, as well as certificates and tokens for multi-factor authentication. A 'virtual keyboard' can be used at login to block password theft by key loggers.
* Central management with Check Point SmartDashboard that provides policy administration and updates through Check Point gateways, including authentication and compliance scanning rules and VPN settings.

"Abra empowers workers with even greater network access, putting their office right in their pocket," concluded Shwed.

For further information, please contact Doros Hadjizenonos at tel. +27 11 790 2500; fax +27 11 790 2599; e-mail dorosh@securedata.co.za.

Share

Check Point Software Technologies

Check Point Software Technologies is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customised to fit customers' dynamic business needs. This combination is unique and is a result of its leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100% of Fortune 100 companies and tens of thousands of businesses and organisations of all sizes.

SecureData

SecureData is a specialist, value-added distributor of perimeter, application, network, endpoint, storage and identity information security solutions and risk management solutions for the African sub-continent and Indian Ocean islands. A cross-section of the available solutions from SecureData illustrates wide coverage of the following information security and risk management domains: business continuity, security appliances and devices, hardware authentication, identity and access management, security and vulnerability management, secure content management, threat management and security services.

SecureData's information security and risk management solutions include best-of-breed solutions, devices and appliances for the perimeter, data centres, applications, network, endpoints, messaging and Web. In addition, as a value-add to vendor, channel and customer, SecureData also provides a full complement of support, pre-sales and professional services around the solutions positioned in each discrete security vertical.

For more information, visit SecureData at http://www.securedata.co.za.

Editorial contacts