Check Point Software
Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network (SVN) TM architecture meets the Internet security challenges facing companies in the age of E-Business. SVN incorporates all the critical elements for a secure Internet environment. Unlike currently available VPNs and firewalls, the SVN approach provides secure and seamless Internet connectivity between networks, systems, applications and users across the Internet, intranets and extranets.

Check Point's OPSEC (Open Platform for Security) Alliance Programme is open to other vendors whose products demonstrate high standards of interoperability with FireWall-1

PRODUCTS

VPN-1/Firewall-1 SmallOffice Please follow link for further information

VPN-1/FireWall-1 SmallOffice is a software solution aimed at delivering enterprise-class security to small businesses and enterprise small remote offices. Based on the market-leading VPN-1/FireWall-1 security suite, the SmallOffice edition has been integrated onto high-performance low-cost security appliances (such as Intrusion.com's PDS 2100) enabling all-in-one security solutions that are flexible affordable and easy to use

FireWall-1

A Single application suite for complete enterprise security with over 60% share of the firewall market in the UK (Source: IDC).

VPN-1
Please follow link for further information

A family of products providing secure Internet-based connectivity to corporate networks, remote and mobile users, satellite offices and partner sites

VPN-1 SecureClient
Please follow link for further information

VPN-1 SecureClient extends market-leading network security solutions by enforicng security on client machines.

FloodGate-
Please follow link for further information

A Policy-based bandwidth management solution offering flexible, scaleable management and control of the network traffic mix.

MetalP

The industry's first scalable, standards-based IP management solution to satisfy enterprise, corporate and departmental IP addressing and naming requirements

RealSecure

Detects network intrusion and misuse in real-time. Automatic responses include reconfiguration of FW-1 to defeat an attack

Provider-1

Allows MSPs to manage multiple security policies from a single point.

ConnectControl

Advanced traffic management funtionality that balances incoming connections among multiple servers.

High Availability Module

Provides Seamless failover for mission-critical VPN-1 and Firewall-1 deployments

LDAP Account Management

Allows critical user information to be shared amoung multiple network applications, including FW-1/VPN-1 Gateways, throughout the enterprise

Visual Policy Editor

The Visual Policy Editor provides a comprehensive picture of enterprise security deployment by drawing a map of security objects — firewalls, VPNs, servers, networks, routers, etc. — and the relationships between them. By seeing everything in one place, and at one time, security managers gain increased understanding and greater control over their Internet security policy

UserAuthority

Extends Check Point's SVN Architecture to Secure eBusiness Applications such as Oracle, BroadVision etc.