Customers Can Now Use Check Point Software Blades with a Virtual Appliance in the Cloud

Redwood City, CA - Wed, 04 Jan 2012

. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced its security gateways are now available to customers through Amazon Web Services, enabling organizations to extend their security to the cloud with a full range of protections, or Check Point , , , many more. With a few simple steps, customers can easily deploy a Check Point virtual appliance - a security gateway for virtual environments - in the Amazon Cloud to activate protections that prevent network attacksdata breaches, while enabling secure connectivity in dynamic cloud computing environments.

As the adoption of cloud computing brings enterprises many benefits, including business continuity, flexible computing powercost savings, businesses are increasingly leveraging the cloud to spend less time managing IT resources,more time focusing on core business objectives. To keep an organization's infrastructurebusiness secure, organizations must enforce the appropriate levels of protection both on premisein the cloud.

"Infrastructure in the cloud is a reality. As many businesses plan to manage their IT infrastructure in the cloud, it's important to protect both cloudon-premise infrastructure to ensure that all corporate assets remain secure," said Oded Gonda, vice president of network security products at Check Point Software Technologies. "One of the best ways to achieve this is to enforce a consistent security policy across the organization."

With Check Point's virtual appliances, customers can embrace the benefits of cloud computing with confidence. Whether an organization runs their entire business operations on AWS or utilizes AWS for flexible scaling needs, customers can enable advanced security with a few simple steps, implementing a unified policy that protects all corporate assets residing in either on-premise infrastructure or in the cloud. For example, businessesonline retailers or educational institutions, can leverage the Amazon Cloud to run production workloadsmanage seasonal peaks in web trafficcustomer orders, while the Check Point virtual appliance further reinforces protection in the cloud infrastructure - ensuring all datachannels of business communication remain secure.

"Security gateways in cloud environments are equally as important as they are in on premise locations, therefore unifying their policiesreporting capabilities in a centralized way are critical to ensuring both the securitycompliance mandates of enterprises worldwide," said Lawrence Pingree, research director at Gartner.

To mitigate sophisticated threatsprevent sensitive information from being exposed in the cloud, Check Point customers can now benefit from the same flexiblecomprehensive security solutions available for on-premise networks with over 30 software blade protections, including , , , , (DLP), without additional hardware or management complexity.

"We offer a shared-responsibility security model that enables customers to choose a security solution that best meets their application's needs, while AWS remains focused on providing a safesecure infrastructure," said Stephen Schmidt, chief information security officer at Amazon Web Services. "We are excited that Check Point has embraced this modelis providing an innovative solution for customers."

Key FeaturesBenefits:

  • Security for the cloud - Select Check Point Software Blades to enable a solution that meets an organization's exact cloud security needs. Businesses can protect assets in the cloud with , , ; enable secure connectivitymobility with ;prevent all datacorporate resources from loss with Check Point .
  • Fast Deployment - Through Amazon Web Services, customers can simply click on the Check Point virtual appliance to begin enabling software blades in the cloud.
  • Unified ManagementReporting - Manage a virtual appliance in Amazon Cloud using industry leading security management. Customers can simplify complianceaudits with unified logsreporting, while enforcing consistent security across the organization.

To learn more about the new Check Point virtual appliance, visit: .

"From start-ups to large enterprises, the cloud creates a lot of new opportunities for companies to grow their businesses in a cost-effective way. We are pleased to be working with Amazon Web Services to help our customers safeguard corporate assetsenforce consistent security policies throughout their organization," concluded Gonda.

PricingAvailability
Pricing for the Check Point virtual appliance is based on the existing software blade licensingcan be purchased through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit: .

About Check Point Software Technologies Ltd.
), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexitylowers total cost of ownership. Check Point first pioneered the industry with FireWall-1its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexiblesimple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technologydefine security as a business process. Check Point 3D Security uniquely combines policy, peopleenforcement for greater protection of information assetshelps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all FortuneGlobal 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spywareidentity theft.

Forward-Looking Statements
This announcement contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933Section 21E of the Securities Exchange Act of 1934. Actual results may differ significantly from management's expectations. These forward-looking statements involve risksuncertainties that include, among others, risks related to competition, management of growth, new products, servicestechnologies, potential fluctuations in operating results, international expansion, outcomes of legal proceedingsclaims, fulfillment center optimization, seasonality, commercial agreements, acquisitionsstrategic transactions, foreign exchange rates, system interruption, inventory, government regulationtaxation, paymentsfraud. More information about factors that potentially could affect 's filings with the SecuritiesExchange Commission, including its most recent Annual Report on Form 10-Ksubsequent filings.

distribué par

Ce noodl a été diffusé par Check Point Software Technologies Ltd. et initialement mise en ligne sur le site http://www.checkpoint.com. La version originale est disponible ici.

Ce noodl a été distribué par noodls dans son format d'origine et sans modification sur 2012-01-04 16:31:36 PM et restera accessible depuis ce lien permanent.

Cette annonce est protégée par les règles du droit d'auteur et toute autre loi applicable, et son propriétaire est seul responsable de sa véracité et de son originalité.