| Internet
technology has changed not only the way
organizations do business, but also the
way they approach network security. The
dynamic nature of todays corporate
networks means that they are no longer
defined by physical boundaries, but
instead by enterprise-wide security
policies. To be effective, these policies
must include a broad range of security
services that govern access to network
resources, while protecting these same
resources from both internal and external
threats. A complete
enterprise security solution must provide
the ability to:
- Grant
selective network access to
authorized remote and corporate
users
- Authenticate
network users with strong
authentication techniques before
granting access to sensitive
corporate data
- Ensure the
privacy and integrity of
communications over untrusted,
public networks like the Internet
- Provide
content security at the gateway
to screen malicious content, such
as viruses and malevolent
Java/ActiveX applets
- Detect
network attacks and misuse in
real time and respond
automatically to defeat an attack
- Protect
internal network addressing
schemes and conserve IP addresses
- Ensure
high availability to network
resources and applications
- Deliver
detailed logging and accounting
information on all communication
attempts
With
its Enterprise Security Management
product family, Check Point Software
Technologies offers a comprehensive set
of solutions that meet these demanding
requirements. Check Points
FireWall-1/VPN-1 security suites enable
all functionality to be deployed and
managed with a single enterprise-wide
security policy for straightforward
management and administration.
Enterprise
security solutions are unified by Check
Point's OPSEC [Open Platform for Secure
Enterprise Connectivity] policy
management framework which provides
central integration, configuration and
management for Check Point products as
well as other third-party security
applications. Only Check Point provides
organizations with the ability to define
a single, integrated security policy that
can be distributed across multiple
gateways and managed remotely from
anywhere on the enterprise network. There
is never any need to individually
reconfigure each security gateway.
All
of Check Points security solutions
are built on Stateful Inspection, the de
facto standard for network security that
was invented and patented by Check Point.
Stateful Inspection provides full
application-layer awareness without
requiring a separate proxy for every
Internet service and protocol. This
provides unparalleled performance,
scalability, and the ability to support
new and custom applications and services
quickly and easily.
@1999 Check Point
Software Technologies Ltd. All rights
reserved. Used with permission
|