Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Check Point increases intrusion prevention effectiveness with new IPS-1 release

  • 11 April, 2008 10:25

<p>Sydney, 11 April 2008 - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced IPS-1® R65.1, its new release of dedicated intrusion prevention. Check Point IPS-1 features superior management tools that increase administration efficiency and provide unique rapid response mitigation. IPS-1 demonstrates high throughput performance on Intel multi-core and parallel processing technology and integrates with Check Point’s security architecture providing customers with Check Point’s management interface and unified installation.</p>
<p>“Intrusion prevention is a key layer in the network security architecture of today’s businesses,” said Steve MacDonald, Engineering Manager, Australia and New Zealand for Check Point. “However, customers struggle with IPS point products that don’t deliver clear, actionable intrusion information. The integration of our best-in-class IPS solution into Check Point’s security architecture brings greater visibility of threats to customers and enables administrators to focus and respond faster to critical events.”</p>
<p>Management efficiency</p>
<p>Check Point IPS-1 is the first intrusion prevention system (IPS) to utilise Situational Visibility, a real-time graphical interface that isolates and highlights critical attacks against essential business systems. Situational Visibility allows customers to graphically monitor these business systems and then drill down on key events to get attack details, including attack source and type, effects of the attack, recommended remediation methods and the actual packet capture of the attack. The exclusive information and forensic tools available in IPS-1 accelerate administrators’ ability to recognise, evaluate and act upon suspicious network events.</p>
<p>“Check Point IPS-1 R65.1 possesses many superb tools that give us maximum administration efficiency as well as rapid response to problem resolution,” said Stephan Trebachev, deputy department head at IBA. “The unique information and forensic tools available in IPS-1 give our administrators not only the power and ability to recognise, evaluate, and act upon suspicious network events, but also to comply with regulations and business goals.”</p>
<p>Performance and investment protection</p>
<p>By leveraging Intel’s multi-core and parallel processing technologies, customers gain high performance levels in both the appliance and software-only versions of IPS-1. IPS-1 OpenSensor, the software-only version of Check Point IPS solution, leverages standard-based, economical CPU architectures and provides customers with enterprise security as well as the scalability to meet future bandwidth and threat protection requirements.</p>
<p>Integration with Check Point security architecture</p>
<p>IPS-1 is now integrated with Check Point’s security architecture, giving customers common Check Point usability components and characteristics. The integration improves installation, simplifies the user interface and allows shared administrators.</p>
<p>Additional IPS-1 R65.1 features include:</p>
<p>· Hybrid Detection Engine™ protects networks and applications from attacks by leveraging multiple detection and analysis techniques</p>
<p>· Attack Confidence Indexing™ offers full-prevention deployment through directing and calibrating security enforcement</p>
<p>· Integration with SecurePlatform® simplifies installation and administration</p>
<p>Concluded MacDonald, “By integrating IPS-1 with Check Point’s security architecture, Check Point delivers accurate intrusion prevention to customers with rapid response mitigation and at high performance levels.”</p>
<p>Check Point IPS-1 R65.1 is available immediately and can be purchased through Check Point’s worldwide network of value-added resellers. For more information, please visit</p>
<p>About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. ( is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customised to fit customers’ dynamic business needs. We are unique in this offering as a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets,</p>
<p>Check Point’s pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organisations of all sizes.</p>
<p>Across Australia and New Zealand Check Point has offices in Sydney, Melbourne and Wellington to support its network of distributors and resellers. Check Point solutions are distributed through LAN Systems and Firewall Systems in Australia and New Zealand.</p>
<p>Additional information can be obtained by visiting or by contacting Check Point on +61 2 9493 6000.</p>
<p>©2003–2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security on Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyser, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Provider-1, PureAdvantage, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power, VPN-1 Power Multi-core, VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.</p>

Most Popular