Subscribe
About
  • Home
  • /
  • Networking
  • /
  • Check Point introduces release R75 for better security, visibility, control

Check Point introduces release R75 for better security, visibility, control

By Biodata
Johannesburg, 14 Feb 2011

Biodata Westcon Security, local distributor of Check Point Software products, today announced the immediate availability of Check Point R75, the latest version of its leading network security suite based on the Software Blade Architecture.

Check Point R75 is the first release to implement elements of the Check Point 3D Security vision that redefines security as a business process combining policies, people and enforcement for stronger protection across all layers of security.

Check Point R75 introduces four new software blades for Application Control, Identity Awareness, Data Loss Prevention and Mobile Access. The new release enables businesses to gain greater visibility and control over data, Web 2.0 applications, and mobile access - bringing organisations multidimensional security in a single, integrated solution.

"We are pleased to bring to market a release that delivers on our vision of 3D Security," said Dorit Dor, vice-president of products at Check Point Software Technologies. "Check Point R75 enables customers to extend the firewall into a multifunctional and multidimensional gateway that consolidates protections into a single, unified solution - allowing customers to enforce the security controls they need to respond to evolving needs and threats."

New in Check Point R75 is the Application Control Software Blade, which brings a differentiated, modern approach to application control by providing a combination of robust security technology, user awareness and broad application control - each necessary for employees to utilise Web 2.0 tools without jeopardising the security of the enterprise. The new blade integrates Check Point's unique UserCheck technology to engage employees in the remediation process and enables IT administrators to tailor application usage policies based on level of risk and user needs. In addition, it delivers unmatched application visibility by leveraging Check Point App Wiki, the world's largest application library, now with over 100 000 Web 2.0 application and widgets.

Also new is Identity Awareness, a software blade that enables organisations to manage security policies by users and groups. With Identity Awareness, organisations get unmatched application and access control through the creation of accurate identity-based policies. Identity Awareness integrates seamlessly with Active Directory for fast and easy deployment.

"For us, the value of Check Point R75 is twofold. The new identity awareness capabilities have given us much more context behind what is happening on the network and by whom," said Gary Pasikowski, manager of security operations at Vertafore, a leading provider of insurance software. "Ultimately, this helps us refine security policies in the future so we can protect corporate resources, without inhibiting our employees."

Other new or updated Software Blades in Check Point R75 enable customers to easily implement 3D Security and customise their own Check Point R75 security gateway with critical protections:

* Data Loss Prevention (DLP) Software Blade - Prevents loss of data and critical business information by scanning e-mails and Web. While Check Point's robust data classification engine combines users, content and processes to identify and block potential breaches, the unique UserCheck technology brings a human factor to DLP by empowering users to remediate incidents in real-time and educating them on data loss prevention policies.
* Intrusion Prevention (IPS) Software Blade - Provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in total system security and performance. Recommended by NSS Labs, Check Point IPS excelled in the industry's most comprehensive third-party intrusion prevention group testing to date.
* Mobile Access Software Blade - Delivers secure connectivity for iPhones and iPads while protecting data with proven encryption technology. Ideal for mobile workers using managed or unmanaged devices, the Mobile Access Software Blade is easy to install and use with the Check Point Mobile application now available in the App Store.

"Today's corporations need to do more than layer technologies to secure their business. They need to develop a security blueprint that supports their corporate needs, while strengthening their information security. Check Point R75 takes them in that direction, providing a strong foundation for 3D Security in a single, unified solution," concluded Dor.

Share

Check Point Software Technologies

Check Point Software Technologies (www.checkpoint.com), the worldwide leader in securing the Internet, is the only vendor to deliver total security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade Architecture. The dynamic Software Blade Architecture delivers secure, flexible and simple solutions that can be fully customised to meet the exact security needs of any organisation or environment. Check Point customers include tens of thousands of businesses and organisations of all sizes, including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

Biodata Westcon Security - www.westcon.co.za

With the merger of Biodata and Westcon, we have manage to set a new standard of excellence by combining the most prominent names in network security-based solutions and which is supported by our advanced support services. Westcon Security is a leading value-added distributor of networking and security technologies and professional services, and with security threats, time is critical, expertise is essential and with more than a decade of our combined years of expertise in the security business, we know what it takes to build and securely protect your infrastructure.

Aside from providing resellers with the best possible selection of security solutions, we partner with our resellers to enable them to grow their security business. We achieve this by supporting resellers with expert knowledge, vendor-accredited sales and technical training, strategic marketing assistance and a range of value-add professional services.

Editorial contacts

Melandi Jordaan
Biodata-removed
(+27) 11 234 3650
melandij@biodata.co.za