Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Check Point unveils groundbreaking new consumer virtulised browser security with ZoneAlarm ForceField

  • 26 September, 2007 11:09

<p>Sydney, Australia – September 25, 2007 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today unveiled a public beta of the new ZoneAlarm ForceField at the DEMOfall 07 technology conference in San Diego.</p>
<p>ZoneAlarm ForceField is the first virtualised, on-demand browser security solution to enable consumers to bank and shop online, or surf dangerous areas of the Internet without fear or limitation. Built from the ground-up specifically to fight the emerging classes of browser-based Web threats, ForceField also erases all personal information after a Web browsing session to further protect consumer privacy online. Features include browser virtualisation, powerful anti-phishing technology, ZoneAlarm’s Spy Site Blocker (also found in the award-winning ZoneAlarm Internet Security Suite) and additional dangerous download defenses.</p>
<p>“ZoneAlarm ForceField uniquely defends against the escalating wave of malicious, privacy-infringing Web threats,” said Scott Ferguson, regional vice president, Asia at Check Point. “We use precision virtualisation technologies and powerful data security principles to secure Web surfers in a two-way ‘bubble of security,’ uniquely protecting them from Web threats as well as spyware or keyloggers that may already reside on a PC.”</p>
<p>“Utilising Web browsers as a new primary attack vector, hackers and crackers are now heavily focused on stealing personal information for financial gain,” said Charles Kolodgy, research director at IDC. “The result is a proliferation of Web threats, such as phishing attacks, drive-by downloads and keyloggers that pose enormous risk to personal privacy and invoke fear among consumers that have begun to significantly alter their online behavior.”</p>
<p>Employing a state-of-the-art precision virtualisation engine plus additional active security layers, ZoneAlarm ForceField provides distinctive and powerful protection against a breadth of Web-based attacks including browser exploits, drive-by downloads, and phishing attacks, plus keyloggers and spyware already on the PC. ForceField leverages the power of Check Point’s Smart Defense Advisor, a hosted service that enables the company to offer users real-time protection against zero-hour threats.</p>
<p>Light, fast and easy-to-use, ZoneAlarm ForceField does not interfere with users’ Web routines. At general availability launch expected in Q1 2008, ForceField will offer an instant version that deploys instantly to any PC without requiring manual installation to provide on-the-go, anytime use on any PC. The instant version will be included with the downloadable version of the product.</p>
<p>“A new generation of relentlessly connected consumers has helped transform the Web into a collaborative and dynamic environment capable of connecting the world like never before,” said Chris Shipley, analyst and executive producer of DEMO. “ZoneAlarm ForceField really speaks to this new era of the Internet by taking a step away from the traditional, and developing a solution that quickly and seamlessly eradicates modern Web threats.”</p>
<p>ZoneAlarm ForceField Features and Benefits</p>
<p>· Virtual surfing creates a duplicate, disposable version of “you” to block Web attacks, leaving users safe to surf safely</p>
<p>· Two-way protection not only defends the PC against Internet attacks, but also protects Web sessions from threats already on the PC-, like spyware and keyloggers.</p>
<p>· Advanced anti-phishing utilises sophisticated heuristics and the best signature system available to prevent users from visiting fraudulent Web sites that try to trick users into revealing personal data.</p>
<p>· Privacy mode permits users to surf anywhere and type anything without leaving a single trace on the computer.</p>
<p>· Dangerous download detector checks every file download form the Internet to make sure it’s clean.</p>
<p>· Anti-keylogger/screengrabber discovers and blocks silent spyware programs that try to steal users’ identity by recording keys that users type and pagers that users view.</p>
<p>· Web site auditor checks credentials on every Web site to see if it is safer to enter data or download files.</p>
<p>· Spyware scanner scans users’ browsing session for dangerous spyware that may be running.</p>
<p>· Spy site blocking finds and blocks spyware distribution sites as users surf the Web.</p>
<p>· Temp file encryption encrypts the temporary files that are automatically created on users’ PCs as they type information on the Web, so they cannot be compromised by spyware on their PCs.</p>
<p>· Browser exploit immunity inoculates users’ computers from automatic downloads and other threats that occur through the numerous browser exploits that arise each year.</p>
<p>· Instant ForceField gives travelers the temporary use of ForceField on borrowed computers at kiosks, on friends’ PCs and at other public places.</p>
<p>· Security Services subscription offers access to Instant ZoneAlarm ForceField along with computer backup, real-world identity theft protection, customer support and new services that are added over time.</p>
<p>Availability and Pricing:</p>
<p>Users can download the free public beta of ZoneAlarm ForceField at The final version of the product is expected to become available in early 2008 and will be offered for $29.95USD.</p>
<p>ZoneAlarm ForceField integrates seamlessly with Internet Explorer or Firefox Web browsers. The product is also security-ready, working in conjunction with any brand of antivirus, anti-spyware, firewall and security suite product including the complete line of ZoneAlarm solutions. ZoneAlarm ForceField is PC-only compatible.</p>
<p>About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. ( is a leader in securing the Internet. The company is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point’s PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Through its NGX platform, Check Point delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market leading data security solutions through the Pointsec product line, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm Internet Security Suite and additional consumer security solutions protect millions of consumer PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from hundreds of leading companies. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organisations of all sizes.</p>
<p>Across Australia and New Zealand Check Point has offices in Sydney, Melbourne and Wellington to support its network of distributors and resellers. Check Point solutions are distributed through LAN Systems and Firewall Systems in Australia and New Zealand.</p>
<p>Additional information can be obtained by visiting or by contacting Check Point on +61 2 9493 6000.</p>
<p>©2003–2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.</p>

Most Popular