Check Point Raises The Bar For Endpoint Security

REDWOOD CITY, Calif. – November 8, 2004 – Check Point Software Technologies® Ltd. (NASDAQ: CHKP), the world leader in securing the Internet, today announced a major new component in its Perimeter, Internal and Web security strategy with its Total Access Protection (TAP) endpoint security initiative. TAP provides a security policy enforcement framework for heterogeneous networks to secure all PCs from the risks of hackers, targeted attacks, spyware and malicious code. The next milestone in the company’s TAP endpoint security initiative will deliver an industry first – truly manageable host intrusion prevention for endpoint PCs.

The TAP initiative enables enterprises to defend all their network-connected PCs regardless of location, ownership or connection method with unified remote access, endpoint security, host intrusion prevention and policy enforcement. With the introduction of Check Point Application Intelligence(TM) and Malicious Code Protector technologies on the endpoint, Check Point provides the only intrusion prevention solution that meets customer requirements for easy and timely deployment. These unique technologies are especially well-suited for safeguarding endpoints and, unlike existing competitive solutions, eliminate the need for complex rule definitions that require months to implement.

“Enterprises face increasing demands for anywhere/anytime connectivity from a wide assortment of PCs and small mobile devices, many of which are unmanaged,” said John Girard, vice president and research director, Gartner. “Security policy must be evaluated and enforced on every access request, wired or wireless, from inside or outside the corporate firewall.”

TAP strengthens policy enforcement across the enterprise by extending cooperation between Check Point Integrity(TM), the company’s endpoint security solution, and other members of the Check Point portfolio of Perimeter, Internal and Web security offerings, including VPN-1 Pro(R), InterSpect(TM) and Connectra(TM). Recent accomplishments in the TAP initiative include:

– May, 2004 Shipment of Check Point Connectra delivers easy-to- deploy, integrated endpoint security and policy compliance for clientless SSL VPNs and Web security.
– August, 2004 Shipment of Integrity SecureClient eases installation and configuration with integrated best-of-breed endpoint security, policy enforcement and remote access.
– October, 2004 Shipment of InterSpect 2.0 ensures policy enforcement and compliance with integrated Cooperative Enforcement(TM) technology.

The next milestone in the TAP initiative will occur at the end of Q4 2004 with the introduction of a comprehensive solution that will mitigate the widest variety of endpoint risks with the lowest TCO. This unified, best-of-breed solution will incorporate endpoint security, policy enforcement, host intrusion prevention and remote access.

“In a world of competing standards, vendor complexity and difficult-to-integrate solutions, only Check Point offers a complete policy enforcement solution that preserves existing infrastructure investments,” said Gil Shwed, chairman and chief executive officer of Check Point Software Technologies. “TAP solves the integration and interoperability problems introduced by competitive initiatives, while sealing off security gaps and streamlining management.”

For more information about TAP as well as the complete portfolio of Perimeter, Internal and Web security solutions that Check Point offers, please visit

About Check Point Software
Check Point Software Technologies Ltd. ( is the worldwide leader in securing the Internet. It is the confirmed market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of intelligent Perimeter, Internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company’s Zone Labs ( division is one of the most trusted brands in Internet security, creating award-winning endpoint security solutions that protect millions of PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry’s framework and alliance for integration and interoperability with “best-of-breed” solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries.

Don't miss