Gateway protects internal corporate networks.

Press Release Summary:



Check Point InterSpect(TM) Internal Security Gateway(TM) safeguards corporate networks from damaging cyber attacks that are introduced inside network. It intelligently inspects internal traffic to identify and block unauthorized or malicious behavior, provides security segmentation to prevent unauthorized access between network zones, and quarantines computers generating suspicious activity.



Original Press Release:



Check Point Unveils World's First Internal Security Gateway To Protect Internal Corporate Networks And Applications



New Check Point InterSpect Safeguards Enterprises with the Industry's Deepest and Most Intelligent Security

REDWOOD CITY, Calif., -- January 20, 2004 - Check Point Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today unveiled Check Point InterSpect(tm), a new family of Internal Security Gateway(tm) solutions to revolutionize the way that customers protect their internal networks and applications. The industry's first complete internal security solution, Check Point InterSpect provides the deepest and most intelligent security available for safeguarding corporate networks from damaging cyber attacks that are introduced inside the network.

The InterSpect system is delivered as a dedicated security appliance designed for quick, easy and non-disruptive deployment inside enterprise networks. It uses sophisticated security technology to intelligently inspect internal traffic to identify and block unauthorized or malicious behavior and specific attacks, provides security segmentation to prevent unauthorized access between network zones, and quarantines computers generating suspicious activity.

The Threat From Within
Multiple layers of security are required to protect networks from attacks that originate from internal sources - such as desktops and laptops used by mobile or traveling employees. In such cases, organizations may successfully defend against cyber attacks, only to have the network become infected again as soon as one of the "road warriors" returns to the office and reconnects their laptop. An example of an attack that propagated among users of the network after being introduced by an internal source includes the Blaster worm that caused an excess of $500 million (USD) in economic damages (source: Computer Economics, Inc.). "In 2003, the world watched Slammer, Sobig and Blaster ravage and bring down internal networks," said Richard Stiennon, Vice President, Gartner. "Combating today's sophisticated attack environment requires intelligent, pre-emptive attack solutions that go beyond protecting the Internet perimeter to protect an organization's internal network. Such a solution must be easy-to-manage, capable of segmenting networks into security zones, provide quarantines, and have good in-line performance."

Meeting the Internal Security Challenge
Check Point InterSpect integrates new software on a new hardware platform designed for fast, flexible and non-disruptive deployment into existing network environments in minutes. Check Point InterSpect provides:

o Intelligent Worm Defender(tm)
Blocks the spread of worms and attacks inside the network through Check Point Stateful Inspection and Application Intelligence(tm) technologies

o Network Zone Segmentation
Segments the internal network into organizational security zones to contain a potential attack and minimize unrestricted employee access

o Quarantine of Suspicious Computers
Isolates attacks and compromised devices to prevent further contamination of network devices and aids in patch management

o LAN Protocol Protection
Provides the deepest and most comprehensive support for Microsoft and other LAN protocols to ensure the stability of internal networks

o Pre-emptive Attack Protection
Provides proactive defenses against vulnerabilities before they are exploited to provide the highest levels of security

Broad Internal Application and Protocol Support
Through Check Point Application Intelligence(tm) and Stateful Inspection technologies, InterSpect provides the industry's deepest and most granular inspection for protocols and applications used for internal networks. Other solutions have been designed for perimeter security and do not have the awareness of internal applications and protocols needed to provide this protection inside the network.

Examples of primarily LAN-based protocols are SQL for database applications like MS SQL Server and Oracle, and MS RPC for Exchange and other Microsoft applications. These protocols are critical business operations inside the network, so internal security solutions must not only support these protocols, but also implement advanced security controls to prevent attacks and misuse.

Solving Real-world Customer Challenges
Via its Early Access Program, Check Point InterSpect is already protecting the internal networks of numerous customers worldwide who have successfully tested and deployed it at their sites. "As a leading provider of content and analytic solutions for many of the world's largest consumer packaged goods, retail, and healthcare companies, we have volumes of marketplace information to secure and simply can not afford to have our network down for any amount of time," said Greg Murray, Vice President of Information Security at Information Resources, Inc., an InterSpect beta customer. "Check Point InterSpect is one of the most robust products available today that meets our needs for a comprehensive internal security solution. It enables us to preemptively protect against attacks and rapidly eradicate worms and viruses, thereby maximizing up-time and significantly improve security operations."

"Check Point is committed to providing the industry's most intelligent solutions for addressing dynamic and evolving Internet security challenges. One of the most critical issues customers face today is protecting against attacks that originate or propagate inside the network," said Gil Shwed, chairman and CEO of Check Point Software. "InterSpect raises the bar for internal security solutions and enables Check Point to solve customers internal security challenges."

Pricing and Availability
Check Point InterSpect is available immediately in three models with prices ranging from $9,000 and $39,000 USD. For more information on Check Point InterSpect, please visit: http://checkpoint.com/products/enterprise/interspect.html.

About Check Point Software Technologies
Check Point Software Technologies is the worldwide leader in securing the Internet. It is the market leader of both the worldwide VPN and firewall markets. Through its Next Generation product line, the company delivers a broad range of perimeter, internal and Web security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from over 350 leading companies. Check Point solutions are sold, integrated and serviced by a network of more than 2,300 Check Point partners in 92 countries. For more information, please call us at (800) 429-4391 or (650) 628-2000, or visit us on the Web at www.checkpoint.com or at www.opsec.com.

©2004 Check Point Software Technologies Ltd.
All rights reserved. Check Point, Check Point Express, the Check Point logo, ClusterXL, ConnectControl, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FireWall-1 XL, FloodGate-1, INSPECT, INSPECT XL, InterSpect, IQ Engine, Open Security Extension, OPSEC, Provider-1, Safe@Office, SecureKnowledge, SecurePlatform, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, UAM, User-to-Address Mapping, UserAuthority, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, , and VPN-1 VSX are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668 and 5,835,726 and may be protected by other U.S. Patents, foreign patents, or pending applications.

All Topics