Check Point Adds Intrusion-Prevention Services To Offering

Check Point Application Intelligence and Malicious Code Protector deliver in-line intrusion-prevention capabilities at each desktop. The services are available immediately. Pricing begins at $100 per user per month. Solution providers will receive a percentage, although Check Point declined to specify the amount.

Fred Felman, vice president of marketing at Check Point, said the new intrusion-prevention services will empower solution providers to guarantee customers up-to-the-minute protection against viruses and other network threats. Calling upon the SmartDefense service and Zone Labs Security Advisories, Check Point will upgrade the service automatically, so its list of vulnerabilities is always up-to-date, he said.

The new capabilities are part of the Redwood City, Calif.-based vendor's Total Access Protection initiative to extend cooperation between its Integrity end-point security solution and other offerings in the Check Point product portfolio, such as the integrated firewall, VPN-1 Pro; the internal security gateway, InterSpect; and Connectra, the company's Web security gateway. The strategy is intended to help enterprises defend their network-connected PCs with unified remote access, end-point security, policy enforcement and hosted intrusion prevention.

Eric Eder, president of Intelligent Connections, a security solution provider in Detroit, said his customers have needed more automation for handling incidents. "With the outbreak of viruses and things happening so quickly, companies have been desperate for ways to shore up security automatically, right at the desktop," said Eder. "The ability to have centralized management control and have it be consistent across a variety of areas is really something [customers] like."

id
unit-1659132512259
type
Sponsored post

The next milestone in Check Point's Total Access Protection initiative should come at the end of the year with the introduction of a best-of-breed solution that combines end-point security, policy enforcement, hosted intrusion prevention and remote access, Felman said. He declined to elaborate.