Check Point® Software Technologies Ltd., the worldwide leader in securing the Internet, today announced the immediate availability of Check Point R75, the latest version of its leading network security suite based on the Software Blade Architecture. Check Point R75 is the first release to implement elements of the Check Point 3D Security vision that redefines security as a business process combining policies, people and enforcement for stronger protection across all layers of security.
Check Point R75 introduces four new software blades for Application Control, Identity Awareness, Data Loss Prevention, and Mobile Access. The new release enables businesses to gain greater visibility and control over data, Web 2.0 applications, and mobile access - bringing organizations multi-dimensional security in a single, integrated solution.
"We are pleased to bring to market a release that delivers on our vision of 3D Security," said Dorit Dor, vice president of products at Check Point Software Technologies. "Check Point R75 enables customers to extend the firewall into a multi-functional and multi-dimensional gateway that consolidates protections into a single, unified solution - allowing customers to enforce the security controls they need to respond to evolving needs and threats."
New in Check Point R75 is the Application Control Software Blade, which brings a differentiated, modern approach to application control by providing a combination of robust security technology, user awareness and broad application control - each necessary for employees to utilize Web 2.0 tools without jeopardizing the security of the enterprise. The new blade integrates Check Point's unique UserCheck technology to engage employees in the remediation process and enables IT administrators to tailor application usage policies based on level of risk and user needs. In addition, it delivers unmatched application visibility by leveraging Check Point AppWiki, the world's largest application library, now with over 100,000 Web 2.0 application and widgets.
Also new is Identity Awareness, a software blade that enables organizations to manage security policies by users and groups. With Identity Awareness, organizations get unmatched application and access control through the creation of accurate identity-based policies. Identity Awareness integrates seamlessly with Active Directory for fast and easy deployment.
"For us, the value of Check Point R75 is twofold. The new identity awareness capabilities have given us much more context behind what is happening on the network and by whom," said Gary Pasikowski, manager of security operations at Vertafore, a leading provider of insurance software. "Ultimately, this helps us refine security policies in the future so we can protect corporate resources, without inhibiting our employees."
Other new or updated Software Blades in Check Point R75 enable customers to easily implement 3D Security and customize their own Check Point R75 security gateway with critical protections:
• Data Loss Prevention (DLP) Software Blade - Prevents loss of data and critical business information by scanning E:s and web. While Check Point's robust data classification engine combines users, content and processes to identify and block potential breaches, the unique UserCheck technology brings a human factor to DLP by empowering users to remediate incidents in real-time and educating them on data loss prevention policies.
• Intrusion Prevention (IPS) Software Blade - Provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in total system security and performance. Recommended by NSS Labs, Check Point IPS excelled in the industry's most comprehensive third-party intrusion prevention group testing to date.
• Mobile Access Software Blade - Delivers secure connectivity foriPhones and iPads while protecting data with proven encryption technology. Ideal formobile workers using managed or unmanaged devices, the Mobile Access Software Blade is easy to install and use with the Check Point Mobile application now available in the App Store.
For more information on Check Point R75, please visit checkpoint.com/.
"Today's corporations need to do more than layer technologies to secure their business. They need to develop a security blueprint that supports their corporate needs, while strengthening their information security. Check Point R75 takes them in that direction, providing a strong foundation for 3D Security in a single, unified solution," concluded Dor.
Pricing and Availability
Check Point R75 is available immediately. Existing customers can upgrade to R75 with no additional cost. To find a Check Point partner, visit partners.us.checkpoint.com/partnerlocator/.
About Check Point Software Technologies Ltd
Check Point Software Technologies Ltd. (checkpoint.com), the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.