About
Subscribe
  • Home
  • /
  • Software
  • /
  • Check Point's Application Control Blade will change way firewalls operate

Check Point's Application Control Blade will change way firewalls operate

Johannesburg, 10 Aug 2010

SecureData Security, part of JSE-listed SecureData Holdings and the sub-Saharan distributor for Check Point Software Technologies, today announced the latter's Application Control Software Blade that enables organisations to secure and manage the use of thousands of Web 2.0 applications in the enterprise.

The new blade integrates Check Point's unique UserCheck technology to engage employees in the decision-making process, and enables IT administrators to tailor application usage policies.

In addition, it delivers unmatched application visibility by leveraging Check Point AppWiki, the world's largest application library, with over 50 000 Web 2.0 widgets and more than 4 500 Internet applications, including social networking, instant messaging and media streaming. For the first time, companies benefit from a unique combination of technology, user awareness and broad application control in a single solution.

According to a recent Check Point and Ponemon global survey of over 2 100 IT security administrators, the majority of respondents believe employees are essential to helping organisations mitigate security risks associated with emerging Internet applications in the enterprise.

Check Point is bringing a differentiated, modern approach to application control that provides a unique combination of robust security technology and user awareness, both necessary for employees to utilise Web 2.0 tools without jeopardising the security of the network.

Check Point's new Application Control software blade enables organisations to define granular policy controls for Web applications tailored to meet the organisation and employees' specific needs. In addition, the new blade integrates Check Point's innovative UserCheck technology to alert users of the potential risks applications may cause, and asks employees whether the purpose is for business or personal use. The solution educates users on corporate use policies, while providing key usage trends to IT administrators.

"This announcement, based on the technology that Check Point acquired from FaceTime, brings a new dynamic to application control by giving businesses a strong combination of technology, employee awareness and access to the largest database of Web applications in the industry," commented Doros Hadjizenonos, Product Manager at SecureData for Check Point Software Technology's products. "Organisations will benefit from granular policy control that is properly tailored to their employee, business and security needs. For instance, it would allow a company to give their staff access to Facebook, but block non-business applications, such as games or chat."

Based on Check Point's Software Blade architecture, the Application Control blade can be activated with a single click on any Check Point security gateway, enabling organisations to leverage their existing infrastructure. The new blade is centrally managed from a single security management console, and IT administrators can monitor and control application usage based on identity, user or group, frequency and level of risk with unified event analysis. The new blade also provides seamless, agent-based and agent-less, Active Directory integration to allow individual or group access to specific applications, while restricting others.

"Internet threats today leverage Web applications, especially social networking, to gain access to the corporate network," continued Hadjizenonos. "Any company looking at solutions to provide Web 2.0 protection needs to consider the strength of the technology, the volume of the library of protections available, where the solution is deployed in the network and what role employees have in the process of mitigating risk. Check Point's new Application Control Software Blade is a strong and complete solution that addresses these requirements.

"Check Point's latest firewall innovation, combined with its application library, which is 50 times larger than any other in the industry, provides organisations with the broadest and most flexible protection, without taking away the business advantages of using Web 2.0," concluded Hadjizenonos.

For further information, please contact Doros Hadjizenonos at tel. +27 11 790 2500; fax +27 11 790 2599; e-mail dorosh@securedata.co.za.

Share

Check Point Software Technologies

Check Point Software Technologies is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customised to fit customers' dynamic business needs. This combination is unique and is a result of its leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100% of Fortune 100 companies and tens of thousands of businesses and organisations of all sizes.

SecureData

SecureData is a specialist, value-added distributor of perimeter, application, network, endpoint, storage and identity information security solutions and risk management solutions for the African sub-continent and Indian Ocean islands. A cross-section of the available solutions from SecureData illustrates wide coverage of the following information security and risk management domains: business continuity, security appliances and devices, hardware authentication, identity and access management, security and vulnerability management, secure content management, threat management and security services.

SecureData's information security and risk management solutions include best-of-breed solutions, devices and appliances for the perimeter, data centres, applications, network, endpoints, messaging and Web. In addition, as a value-add to vendor, channel and customer, SecureData also provides a full complement of support, pre-sales and professional services around the solutions positioned in each discrete security vertical.

For more information, visit SecureData at http://www.securedata.co.za.

Editorial contacts

Paul Booth
Global Research Partners
(+27) 82 568 1179
pabooth@mweb.co.za