|
PRODUCTS
|
|
VPN-1/Firewall-1
SmallOffice
Please follow link for further information
|
VPN-1/FireWall-1 SmallOffice is a software
solution aimed at delivering enterprise-class security to small
businesses and enterprise small remote offices.
Based on the market-leading VPN-1/FireWall-1 security suite, the SmallOffice
edition has been integrated onto high-performance low-cost security
appliances (such as Intrusion.com's
PDS 2100) enabling all-in-one security solutions that are flexible affordable
and easy to use
|
|
FireWall-1
|
A Single application suite for complete
enterprise security with over 60% share of the firewall market in the
UK (Source: IDC).
|
|
VPN-1
Please follow link for further information
|
A family of products providing secure
Internet-based connectivity to corporate networks, remote and mobile
users, satellite offices and partner
sites
|
|
VPN-1 SecureClient
Please follow link for
further information
|
VPN-1 SecureClient extends market-leading
network security solutions by enforicng security on client machines.
|
|
FloodGate-
Please follow link for further information
|
A Policy-based bandwidth management solution
offering flexible, scaleable management and control of the network
traffic mix.
|
|
MetalP
|
The industry's first scalable, standards-based
IP management solution to satisfy enterprise, corporate and
departmental IP addressing and naming requirements
|
|
RealSecure
|
Detects network intrusion and misuse
in real-time. Automatic responses include reconfiguration of FW-1 to defeat
an attack
|
|
Provider-1
|
Allows MSPs to manage multiple security
policies from a single point.
|
|
ConnectControl
|
Advanced traffic management funtionality
that balances incoming connections among multiple servers.
|
|
High Availability Module
|
Provides Seamless failover for mission-critical
VPN-1 and Firewall-1 deployments
|
|
LDAP Account Management
|
Allows critical user information to be
shared amoung multiple network applications, including FW-1/VPN-1 Gateways,
throughout the enterprise
|
|
Visual Policy Editor
|
The Visual Policy Editor provides a comprehensive
picture of enterprise security deployment by drawing a map of
security objects — firewalls, VPNs, servers,
networks, routers, etc. — and the relationships between them. By seeing
everything in one place, and at one time, security managers gain increased
understanding and greater control
over their Internet security policy
|
|
UserAuthority
|
Extends Check Point's SVN Architecture
to Secure eBusiness Applications such as Oracle, BroadVision etc.
|