Check Point Software Technologies has announced the second phase of its secure virtual network (SVN) architecture to enable "true Internet security" for e-business applications.
The solution is the industry's first comprehensive Internet security infrastructure integrating security with B2B applications, according to the software vendor.
SVN Phase II offers e-business applications advanced security services that are currently enabled only at the network level, including seamless authentication to multiple applications and support for multiple authentication and public key infrastructure (PKI) mechanisms.
It also offers encryption, centralised user and security policy management and unified communications across the Internet, intranets and extranets.
Check Point's regional manager for Australia and New Zealand, Peter Sandilands, described the launch as the first step towards the next generation of e-business security.
The first products in this phase of the SVN architecture are the UserAuthority API and UserAuthority, a new module to Check Point's VPN-1.
Check Point's UserAuthority provides e-business applications with a glue', or common language, to interoperate with hundreds of disparate forms of security currently used by applications on corporate networks.
UserAuthority enables business partners and customers to securely connect to otherwise incompatible application environments, a Check Point spokesman said. SVN Phase II provides an infrastructure for comprehensive Internet security, manageability and mission-critical reliability, Check Point said.
Oracle is already working with Check Point Software to certify the integration of VPN-1/FireWall-1 with Oracle Internet Directory and to help ensure that enterprise security and access information can be directly accessed through Check Point's firewall module.
According to Oracle's server platform technologies vice president, Bill Maimone, the added ability for Check Point's UserAuthority to share key user information with applications such as Oracle's Virtual Private Database architecture permits tighter integration of security policy enforcement, further advancing the horizon of e-business security solutions.
UserAuthority spans multiple applications and Web servers to provide users with transparent, reliable and seamless secure access to e-business resources.