Skip to main content

Check Point Named ``Information Security(TM)'' Magazine and SearchSecurity.com(TM) 2007 Readers' Choice Award Winner in UTM Category

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced that TechTargets® Information Security magazine and SearchSecurity.com have selected Check Point VPN-1 UTM as the Gold award winner in the UTM category for its 2007 annual Readers Choice Awards.

In addition to receiving a Gold award in the UTM category, Check Point security products also received awards in the wireless (VPN-1 Edge), network firewall (Firewall-1), remote access (VPN-1), and security events management (Eventia) categories. Award recipients are defined in categories and criteria that encompass the most critical security technologies and functionalities, spanning 15 product groups and more than 340 products. From these categories, 45 new or enhanced products are chosen that enterprise IT professionals are encouraged to consider adding to their lists of security products to evaluate.

According to readers, Check Points VPN-1 UTM received high marks for the depth of security it provides and its form factor. VPN-1 UTM offers firewall, intrusion prevention, anti-virus, anti-spyware, Web application firewall, and both IPsec and SSL VPN into a single platform. All these functions can all be centrally controlled and updated in real time.

TechTargets recognition of product excellence for VPN-1 UTM is an outstanding honor. VPN-1 UTM provides customers with a world-class security product thats easy to deploy and run, said Laura Yecies, vice president of marketing for Check Point Software Technologies. Due to its scalability, this product is ideal for enterprises of all sizes for conforming to internal and external auditing requirements, and provides numerous monitoring, reporting and management options.

VPN-1 UTM gateways are the first to marry the simplicity of unified threat management with the highly evolved security found in Check Point solutions. Going beyond firewall, VPN, intrusion prevention, and antivirus, VPN-1 UTM includes SSL VPN, Web application firewall, host checking and more. VPN-1 UTM examines more than 150 predefined applications, services, and protocols, ensuring that the vast majority of applications used by businesses are free of threats when entering the network. Examples include VoIP, Instant Messaging and P2P applications. Additionally, VPN-1 UTM delivers both IPSec and SSL VPN functionality to provide a simple and flexible way to connect remote sites and users.

About Information Security

Information Security is the enterprise security and risk managers' leading source of critical, objective information on strategic and practical security issues. Information Security's team of veteran security journalists and experts break down the security problems challenging enterprises and provide practical resolutions. Its in-depth, comprehensive reports and analyses provide security managers--department managers to CXOs -- with the tools, knowledge and information they need to make informed decisions about how to safeguard their enterprises, comply with regulations and standards, and reduce risk. The publications analysis of technology and products provide a guide for budgeting and purchasing decisions and trends reports, case studies and industry-leading exposes offers security managers insight into how their peers are addressing and solving key security issues. Information Security is an indispensable guide for any security manager and executive charged with protecting information assets and reducing risk.

About SearchSecurity.com

More then 400,000 IT security pros turn to SearchSecurity.com for the information they require to keep their corporate data and assets secure. We're the only online information resource that provides immediate access to breaking industry news, virus alerts, webcasts, white papers, security schools, a selection of highly focused security e-newsletters and more - all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional.

Headquartered in Needham, MA, SearchSecurity.com is part of the TechTarget® network (www.techtarget.com). TechTarget publishes integrated media that enable information-technology (IT) marketers to reach targeted communities of IT professionals and executives in all phases of the technology decision-making and purchase process.

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. The company is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point's PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Through its NGX platform, Check Point delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market leading data security solutions through the Pointsec product line, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm Internet Security Suite and additional consumer security solutions protect millions of consumer PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from hundreds of leading companies. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, Check Point Pointsec Protector, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.

Data & News supplied by www.cloudquote.io
Stock quotes supplied by Barchart
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms and Conditions.