defending small and medium sized businesses with … · defending small and medium sized businesses...

14
Defending Small and Medium Sized Businesses with Cloud-Managed Security

Upload: trinhtuong

Post on 03-May-2018

218 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

Page 2: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|2

Defending Small and Medium Sized Businesses with Cloud-Managed Security

ContentsIntroduction ………………………………………………………………… 3

Social Networking Could Mean Compromised Networks ……………… 4

Blended Threats More Blended than Ever ……………………………… 5

The Cloud Revolution Continues ………………………………………… 6

The Case for Cloud-Managed Security …………………………………… 7

Why Use the Check Point Cloud-Managed Security Service? ………… 8

The Check Point Managed Security Services Approach ……………… 9

Easy Deployment—Minimal Administration—Powerful Reporting …… 10

Features and Benefits of Check Point Cloud-Managed Security Services ………………………… 12

Conclusion ………………………………………………………………… 13

Page 3: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|3

Defending Small and Medium Sized Businesses with Cloud-Managed Security

IntroductionTechnology is a two edged sword. On one side, the introduction of new applications,

devices, and web services makes people’s lives and jobs easier and more productive.

On the other, the increase in user mobility, the migration to faster data pipes and the

exchange of more information open businesses up to new threats and increased

susceptibility to cyber attacks.

The job of an IT administrator is never finished as security threats are ongoing and

endless. The introduction of new technology in the workplace, often by employees,

keeps IT managers constantly on guard as they balance network accessibility against

data protection.

Increased regulations cut across all companies both large and small and add

additional burden and expense to the IT budget. PCI and HIPAA regulations, for

example, apply to any small, medium and large business that accepts credit card

payments or maintains and transmits personal patient information. Demonstrating

compliance is yet another task that the small and medium sized businesses (SMB)

must satisfy in order to conduct business nationally and internationally.

Smaller businesses may also have the additional challenge of limited personnel

and security technology expertise whose job requirements are already significant

and demanding. These businesses may have one or two IT professionals who are

responsible for all hardware, software, and security deployments. These individuals

may be tasked with supporting large groups of employees and their time is extremely

limited. Learning new technologies and deploying them in the network adds significant

burden. The “do more with less” mantra is alive and well and will always be in fashion,

especially for businesses with limited IT resources.

The IT administrator has the unique challenge of trying to keep up with emerging

threats—identify and evaluate new solutions to combat the threats, and then apply new

technology to combat the threats. This is in addition to the regular day-to-day tasks of

supporting applications on the network, provisioning new users, de-provisioning departing

employees, repairing broken hardware, and replacing older technology with new. Given

the enormity of everyday security tasks, the timing is right for these resource-constrained

businesses to identify better ways to manage their security and shift the heavy lifting to

professionals whose job is devoted 100% to keeping networks safe. It’s time for these

companies to get back to their core strengths and business opportunities.

Given the complexity of managing security in today’s corporate network, it’s not

surprising that many businesses find it difficult to stay ahead of emerging security threats

to safeguard their corporate data. The Web and Web-based social applications have

taken center stage as the preferred medium for cyber attacks. Blended and targeted

threats have put companies, both large and small, at greater risk for loss of data and

confidential information through social networking and other social applications.

Page 4: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|4

Social Networking Could Mean Compromised NetworksThe Web has become the new threat vector for attacking businesses. Instead of only

using email to deliver an attack, cyber criminals know that they can gain access to

valuable information through access to data stored on popular social web sites. In

some cases social sites are being used to gather sensitive personal or corporate

information. Many businesses, including some large companies do not have a handle

on securing social (Web 2.0) sites in the workplace.

Employees are spending more time than ever on social networking sites as they

connect, and stay connected to Facebook, LinkedIn, Twitter, and other social sites

during work. While some would argue that these sites are harmless and necessary

for conducting business, there is reason for concern too. Social networking sites

can be the door to which malware and spam enters a network and employees could

inadvertently divulge or share confidential information through their activity on

these sites. Without some measure of control in place, companies leave themselves

vulnerable to potential information loss damages and attacks.

Just look around, almost any desktop or laptop and most users are using Facebook,

YouTube or Twitter and any number of other social sites during working hours. Facebook

can either be launched or shut down by the end user. More importantly, Facebook is

becoming as important to the end user as email. Businesses cannot afford to ignore

the power and impact of these social networks as their users drive their usage behind

corporate firewalls. Click-jacking and other types of malware attacks are more prevalent

on these types of sites because of the sheer amount of visitors frequent them each day.

A click-jacked page tricks a user into clicking on a concealed link. The attackers

display dummy buttons on a Facebook page, for example, with enticing information

that encourages users to click. The malware then loads another page over the original

Facebook page. The user believes they are clicking on a visible button but in reality

they are actually performing actions on the hidden page. Often, the attacker is able to

obtain email addresses and other personal information about the user without their

knowledge. Because social network sites are so popular, they are often a target for

click-jack attempts.

Page 5: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|5

Blended Threats More Blended than EverBlended threats, or the use of a combination of tactics and approaches to breach

your network, are being employed routinely to increase the likelihood of access to

your corporate data or to the user's personal information. An attack using a blended

approach, for example, could send a virus via an email attachment, along with a Trojan

that is embedded in an HTML file. Nimda and CodeRed are examples of blended

threats that were very successful in breaching networks and creating considerable

and costly security damages for many companies.

Blended threats are more complicated and difficult to manage, especially for

organizations with limited staff or experience. Administrators know that they must use

endpoint security and perimeter tools to manage these threats, but they must have

a coordinated approach to block unpredictable threats. They use perimeter tools to

block threats at the edge of the network before can enter the network. This security

option works well, but not all the time.

Users who are not always connected to the network can introduce threats when they

reconnect. Some threats manage to enter the network undetected due to device

configurations, permissions granted, and human errors. Endpoint security provides

protection and mitigation at each user's device but requires ongoing updates and

maintenance to ensure that the latest threats are recognized.

Today's attacks are also more targeted and persistent. Rather than announce to

the world their intentions, cybercriminal prefer to remain hidden in the background

of networks and endpoint systems so they won't be discovered right away. If they

can have unrestricted access to a system and remain anonymous they can be more

effective over longer periods of time.

Security professionals agree that threats need to be blocked before they reach your

network where they can obviously do the most damage. There are many products

available to address these challenges including the traditional firewalls and routers

and intrusion prevention systems that monitor inline traffic and search for anomalies

on your network.

One thing is certain. Today’s businesses need all the help they can get to combat the

many diverse and coordinated threats to their network. A single approach to security is

no longer effective or even possible. With so many entry points on a network through

firewalls, gateway appliances, web applications, and end users, many businesses are

playing catch up with their security initiatives.

Page 6: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|6

The Cloud Revolution ContinuesCloud growth continues to accelerate across the globe as more companies become

convinced of its safety and versatility. More small and medium sized businesses are

adopting the cloud to utilize applications to conduct critical aspects of their business

including customer relationship management, payroll processing, and HR activities.

Rather than installing applications on the company’s premises, businesses are turning

to application providers who permit access to a host of cloud-based applications at

a lower cost. The cloud helps businesses avoid costly on site deployments that may

require highly trained staff along with installations on multiple servers and every end

user device.

The reasons that businesses are adopting the cloud are many, for most, it is

convenience and cost. It is far easier to get people up and running on a cloud based

application. Generally, all that is needed is a web browser for the client and some

configuration changes at the gateway to allow access. There may be some other

configuration issues for the IT administrator such as granting security access to cloud

apps or enabling Active Directory users to authenticate to the cloud.

With a cloud-based service, the rollout time is reduced considerably as there are

minimal costly hardware deployments and no client updates. A business can utilize

easy subscription billing for cloud-based applications as well. The client is charged

only for the specific services they subscribe to and the number of users who actually

use the cloud applications, so expenses are more predictable and can be budgeted

more accurately.

Companies who utilize cloud based applications do not need to concern themselves

with upgrades or ongoing maintenance and support of the software as this is handled

by the service provider in the cloud. Whenever there is an upgrade to a newer version

of the application, all users get the benefit of the automatic upgrade delivered by the

cloud service provider without the headaches of an enterprise or end user upgrade.

Fewer people in IT are needed to manage cloud based applications, allowing them to

devote their time to other business enablement activities instead.

According to a recent study by IT social business Spiceworks, cloud adoption among

small and medium sized businesses has doubled in the first six months of 2011. Twenty-

eight percent of the businesses surveyed deployed at least one cloud computing service,

up from 14 percent in the second half of 2010. This jump surpassed earlier estimates by

Spiceworks. In July 2010, the social network predicted SMB cloud adoption would total

only 24 percent. Spiceworks expects cloud adoption to continue to increase over the

months to come, with SMB cloud adoption predicted to reach 42 percent by mid-2011.

Page 7: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|7

Businesses are attracted to the cloud for its many positive business and budget

benefits. One area of the cloud that is also gaining traction and acceptance is the

utilization of the cloud as a provider of security services. Some cloud applications

are designed to provide security services on-premise and help customers manage

their devices through the cloud. Other cloud applications are designed to manage the

security functionality that you already have in place, offloading the monitoring and

tracking of security threats to an off-site professional team that is dedicated solely to

this task.

The Case for Cloud-Managed SecurityThe cloud is the becoming the preferred infrastructure for small and medium sized

businesses to utilize applications and conduct business. Therefore, it makes sense

that cloud managed security becomes a key component to safeguarding these

businesses from malware attacks, protect sensitive company data and demonstrate

compliance where needed. Superior security is not just for big businesses with big IT

budgets. It should also be available for the small and medium sized operations that

are just as vulnerable to attacks as the next company.

Small and medium sized businesses must have adequate security protections in

place and they’ve heard the message loud and clear for many years. The challenge

for them is how to provide enough security to protect their corporate assets, maintain

and demonstrate compliance, and enable employees with secure technology, all while

staying within budget.

On site network security is time consuming to manage and expensive. The supporting

staff required must be who are knowledgeable on the functionality of multiple, complex

security products. For the typical small businesses, often with a limited IT staff, too much

time must be dedicated to network security. This takes away the ability for IT to make a

positive impact for the company on other strategic plans or rollouts of new technology.

Cloud managed security services are available today through the Check Point Cloud-

Managed Security Service. This service provides comprehensive threat protection,

policy enforcement, data security, and compliance for the client’s network. The cloud

is the best platform to deliver management for a comprehensive security to protect

networks, remote users, mobile users, laptops, and desktops under any security threat.

Page 8: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|8

Why Use the Check Point Cloud-Managed Security Service?When a business considers their security options, they often consider the effectiveness

of a solution and the cost. They also have to factor in deployment time and maintenance/

support expenses once they have selected a solution. If their IT staff does not have

experience with a particular product they will have to be trained on the installation,

configuration, and use of the security product. This adds time and expense to any

security implementation.

By contrast, a managed security service does not require the same degree of work and

preparation by the client’s IT team because the heavy lifting of security is transferred

away from the client to the service provider who manages all aspects of your ongoing

network security. This type of security is known as a cloud managed security service.

This type of security provides the benefits of on-site security functionality while being

professionally managed in the cloud.

The cloud managed security service is simple to deploy in comparison to other

on premises security solutions. Once the type of security is selected, it is a matter

of delivering a simple appliance on site and configuring policies to manage user

activates. The appliance comes installed with pre-configured security technologies

which provide the client with all the critical security components including Firewall,

VPN, Antivirus, Anti-Spam, IPS, URL Filtering, and logging/reporting.

The cloud managed security service also provides a complete security solution

with a predictable pricing model of monthly, annual, and triennial payment options.

All software updates are handled through the service so the client does not have to

worry about complicated or costly updates that occur too frequently for its IT team to

adequately manage.

Cloud-Managed Security Service (manages, monitors and reports on all security activities)

Firewall

VPN

Antivirus

Anti-Spam

IPS

URL Filtering

Logging / Reporting

Network Security Solutions (Pre-configured: all-in-one solution)

Page 9: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|9

The Check Point Managed Security Services ApproachThe Check Point Cloud-Managed Security Service delivers comprehensive web,

network, and data protection. This best-in-class patented technology provides

the same proven technologies protecting the Fortune 100 companies to small and

medium sized businesses –at an affordable price. Businesses can effectively transfer

management of their security to a team of Check Point security experts who monitors

and support all security activities within the company with a 24/7 coverage.

Your existing security can be complimented by the Check Point Cloud-Managed

Security Services. Standard and powerful reports help you track security traffic on your

network, so you have a clear understanding of all the activities happening within your

network. Check Point security helps the businesses demonstrate and stay compliant

to various mandates and regulations (HIPAA, PCI, etc.) when the appliance and service

are configured properly.

Check Point Cloud-Managed Security Services deliver security in two simple-to-

deploy and all-in-one packages:

• Standard Package

• Premium Package

The Standard Package, including Firewall, VPN, Reporting and 24x7 management

and support, provides cost-effective enterprise-class security for businesses that are

looking for added network perimeter and VPN protection.

The Premium Package further extends protection beyond the Standard Package

adding Antivirus, Anti-Spam, URL Filtering and IPS for a comprehensive security

solution. Both packages include the Safe@Office appliance which can be installed by

Check Point, an authorized partner, or by the client’s owe IT team. Pricing is based

on the package selected and the number of users covered by the service. There is no

additional cost for the appliance.

Page 10: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|10

Easy Deployment—Minimal Administration —Powerful ReportingThe Check Point Cloud-Managed Security Service deploys in a simple two-step

process –selecting your protection package and activating your service. This easy

two-step process means you can simply “set it and forget it” and get back to focusing

on growing your business.

Security policy delimitations are pre-set, but can easily be modified by the partner or

the client to meet specific security and compliance needs. Policies can be set and

enforced for both local and remote users. Comprehensive policies can be defined for

all areas of security included in each of the bundled services.

The clear and easy-to-understand service logs and activity reports provide greater

visibility and better understanding of your network activities. A few sample reports are

shown for the following security technologies:

Check Point Cloud-Managed Security Services

Standard Managed Security(Starting at $19/mo)

Premium Managed Security(Starting at $33/mo)

Firewall Protection Firewall Protection

VPN Protection VPN Protection

Reporting & Logging Antivirus Protection

Management Services Anti-spam Protection

24x7 Support Services URL Filtering

Intrusion Prevention

Reporting / Logging

Management Services

24x7 Support Services

All inclusive pricing provides predictable security expenses

Page 11: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|11

Defending Small and Medium Sized Businesses with Cloud-Managed Security

• Firewall—displays blocked outgoing connections. Click on the port to view more details

• Blocked URLs—Shows top categories and web sites that have been blocked for

view on your network

• Virus Protection—Displays virus found by protocol and virus name

Page 12: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|12

• Anti-Spam—Displays potential spam by the date and the resulting action taken

Features and Benefits of Check Point Cloud-Managed Security Services

Check Point Cloud-Managed Security Services

Feature Advantage Benefit

On premise appliance • Fast and effective on-site delivery of security services

• Single product provides all needed security services

• Effective enforcement of policies and blocking of malware

• Reduces multiple point products and minimizes confusion

Cloud-Managed • Security is managed by professionals

• Incidents investigated, timely action taken to alert the clients and to resolve threat issues

Automatic Security Updates

• Software patches, fixes, updates are provided by Check Point

• Saves you time and money as you don’t have to deal with these extra tasks

One-Click Protection • Fast and easy configuration, just set it and forget it

• Eliminates security headaches for the SMB and offloads the work to the security professionals

Page 13: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

Defending Small and Medium Sized Businesses with Cloud-Managed Security

©2011CheckPointSoftwareTechnologiesLtd.Allrightsreserved.Classification:[Protected]—Allrightsreserved.|13

ConclusionThe Web and web applications have become a prominent vehicle for delivering attacks

and breaching network security. Nearly every user is connected to social media sites

during working hours. These sites can be used as a way to breach network security

through click-jacking and other means to obtain personal information.

At the same time as these threats continue to mount, cloud adoption also continues to

expand. More businesses are moving to embrace cloud computing and trust its safety

and versatility. The cloud is a logical choice for offloading the management of security,

allowing the companies to focus on business issues and growth and leave the network

protection to the professionals.

The primary benefits for adopting the Check Point Cloud-Managed Security Service

are its fast and easy deployment, expert management and reduced cost of ownership.

Now is the time for the small and medium sized companies to offload the management

of their security infrastructure to the cloud. Check Point Cloud-Managed Security

Service only requires a single on-premises appliance and no client software. The

service provides proven technologies and brings order to the chaotic world of security.

Combined with Check Point’s award-winning customer support services, businesses

finally have an effective, compelling and affordable security solution.

Cloud managed security can reduce costs, improve security, and increase manageability

for the small and medium size organizations. Clients can leverage Check Point’s security

expertise and proven enterprise security to protect their networks, employees and

critical business assets. This easy-to-deploy solution dramatically simplifies ongoing

support and maintenance. Leave network security to Check Point, so you can focus on

your business.

Page 14: Defending Small and Medium Sized Businesses with … · Defending Small and Medium Sized Businesses with Cloud ... According to a recent study by IT social business Spiceworks,

©2003–2011 Check Point Software Technologies Ltd. All rights reserved. Check Point, Abra, AlertAdvisor, Application Intelligence, Check Point DLP Check Point Endpoint Security, Check Point Endpoint Security On Demand, the Check Point logo, Check Point Full Disk Encryption, Check Point Horizon Manager, Check Point Media Encryption, Check Point NAC, Check Point Network Voyager, Check Point OneCheck, Check Point R70, Check Point Security Gateway, Check Point Update Service, Check Point WebCheck, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, DefenseNet, DLP-1, DynamicID, Endpoint Connect VPN Client, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IP Appliances, IPS-1, IPS Software Blade, IPSO, Software Blade, IQ Engine, MailSafe, the More, better, Simpler Security logo, MultiSpect, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, Secure Virtual Workspace, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, , SiteManager-1, Smart-1, SmartCenter, , SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, SmartEvent, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartReporter, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SmartWorkflow, SMP, SMP On-Demand, SofaWare, Software Blade architecture, the softwareblades logo, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, UserCheck, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Edge, VPN-1 MASS, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VE, VPN-1 VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Antivirus, ZoneAlarm DataLock, ZoneAlarm Extreme Security, ZoneAlarm ForceField, ZoneAlarm Free Firewall, ZoneAlarm Pro, ZoneAlarm Internet Security Suite, ZoneAlarm Security Toolbar, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013 and 7,725,737 and may be protected by other U.S. Patents, foreign patents, or pending applications.

September 13, 2011

AboutCheckPointSoftwareTechnologiesLtd.Check Point Software Technologies Ltd. (www.checkpoint.com), worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented Stateful Inspection technology. Today, Check Point continues to innovate with the development of the software blade architecture. The dynamic software blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

CHECKPOINTOFFICES

WorldwideHeadquarters5 Ha’Solelim Street Tel Aviv 67897, Israel Tel: 972-3-753 4555 Fax: 972-3-624-1100 email: [email protected]

U.S.Headquarters800 Bridge Parkway Redwood City, CA 94065 Tel: 800-429-4391 ; 650-628-2000 Fax: 650-654-4233 URL: http://www.checkpoint.com