CHECK POINT INTRODUCES RELEASE R75 FOR BETTER SECURITY, VISIBILITY AND CONTROL

Latest release makes Check Point’s 3D Security vision a reality by combining policy, people and enforcement
CALGARY, AB – MARCH 29, 2011Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, recently announced the immediate availability of Check Point R75, the latest version of its leading network security suite based on the Software Blade Architecture.  Check Point R75 is the first release to implement elements of the Check Point 3D Security vision that redefines security as a business process combining policies, people and enforcement for stronger protection across all layers of security.
Check Point R75 introduces four new software blades for Application Control, Identity Awareness, Data Loss Prevention, and Mobile Access. The new release enables businesses to gain greater visibility and control over data, Web 2.0 applications, and mobile access – bringing organizations multi-dimensional security in a single, integrated solution.
“We are pleased to bring to market a release that delivers on our vision of 3D Security,” said Paul Comessotti, Check Point’s Canadian Regional Director. “Check Point R75 enables customers to extend the firewall into a multi-functional and multi-dimensional gateway that consolidates protections into a single, unified solution – allowing customers to enforce the security controls they need to respond to evolving needs and threats.”
New in Check Point R75 is the Application Control Software Blade, which brings a differentiated, modern approach to application control by providing a combination of robust security technology, user awareness and broad application control – each necessary for employees to utilize Web 2.0 tools without jeopardizing the security of the enterprise. The new blade integrates Check Point’s unique UserCheck technology to engage employees in the remediation process and enables IT administrators to tailor application usage policies based on level of risk and user needs. In addition, it delivers unmatched application visibility by leveraging Check Point AppWiki, the world’s largest application library, now with over 100,000 Web 2.0 application and widgets.
Also new is Identity Awareness, a software blade that enables organizations to manage security policies by users and groups. With Identity Awareness, organizations get unmatched application and access control through the creation of accurate identity-based policies. Identity Awareness integrates seamlessly with Active Directory for fast and easy deployment.
“For us, the value of Check Point R75 is twofold. The new identity awareness capabilities have given us much more context behind what is happening on the network and by whom,” said Gary Pasikowski, manager of security operations at Vertafore, a leading provider of insurance software. “Ultimately, this helps us refine security policies in the future so we can protect corporate resources, without inhibiting our employees.”
 
Other new or updated Software Blades in Check Point R75 enable customers to easily implement 3D Security and customize their own Check Point R75 security gateway with critical protections:

  • Data Loss Prevention (DLP) Software Blade Prevents loss of data and critical business information by scanning emails and web. While Check Point’s robust data classification engine combines users, content and processes to identify and block potential breaches, the unique UserCheck technology brings a human factor to DLP by empowering users to remediate incidents in real-time and educating them on data loss prevention policies. 
  • Intrusion Prevention (IPS) Software Blade – Provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in total system security and performance. Recommended by NSS Labs, Check Point IPS excelled in the industry’s most comprehensive third-party intrusion prevention group testing to date.
  • Mobile Access Software Blade – Delivers secure connectivity for iPhones and iPads while protecting data with proven encryption technology. Ideal for mobile workers using managed or unmanaged devices, the Mobile Access Software Blade is easy to install and use with the Check Point Mobile application now available in the App Store.

 
For more information on Check Point R75, visit:
http://www.checkpoint.com/campaigns/r75/index.html.
“Today’s corporations need to do more than layer technologies to secure their business.  They need to develop a security blueprint that supports their corporate needs, while strengthening their information security. Check Point R75 takes them in that direction, providing a strong foundation for 3D Security in a single, unified solution,” added Comessotti.
 
Pricing and Availability
Check Point R75 is available immediately. Existing customers can upgrade to R75 with no additional cost. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/.

Leave a Reply