Jump to content

Check Point Integrity: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Pearle (talk | contribs)
m Changing {{wikify}} to {{wikify-date|June 2006}}
Rescuing 1 sources and tagging 0 as dead. #IABot (v1.5beta)
 
(32 intermediate revisions by 15 users not shown)
Line 1: Line 1:
'''Check Point Integrity''' is an [[endpoint security]] software product developed by [[Check Point Software Technologies]]. It is designed to protect [[personal computer]]s and the [[computer networking|network]]s they connect to from [[computer worm]]s, [[Trojan horse (computing)|Trojan horses]], [[spyware]], and intrusion attempts by [[hacker (computer security)|hackers]]. The software aims to stop new PC threats and attacks before [[digital signature|signature]] updates have been installed on the PC. The software includes.
{{advert}}
* network [[access control]]s that detect and remedy security policy violations before a PC is allowed to connect to a network;
{{references}} {{wikify-date|June 2006}} {{nocat}}
* [[application software|application]] controls that block or terminate [[malicious software]] programs before they can transmit information to an unauthorized party;
'''Check Point Integrity™''' is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect PCs and the enterprise networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers. The primary distinction between the kind of PC security provided by Integrity and that provided by earlier security technologies such as antivirus and intrusion detection systems (IDS) is the ability to stop new PC threats and attacks even before signature updates have been installed on the PC. The security mechanisms employed by Integrity include network access controls that detect and remediate security policy violations before a PC is allowed to connect to a network; application controls that block or terminate malicious software programs before they can transmit information to an unauthorized party; a two way, stateful personal firewall; an intrusion prevention system (IPS); spyware detection and removal; and instant messaging security tools. An administrator manages and enforces various Integrity security policies that apply to groups of users from a central console and server.
* a personal [[firewall (networking)|firewall]];
* an intrusion prevention system (IPS) [http://www.checkpoint.com/products/softwareblades/intrusion-prevention-system.html Check Point Intrusion Prevention System – IPS];
* spyware detection and removal;
* and [[instant messaging]] security tools.
An administrator manages the security policies that apply to groups of [[user (computing)|users]] from a central console and [[server (computing)|server]].


Check Point acquired the Integrity software as part of its acquisition of endpoint security start-up Zone Labs in 2004. Zone Labs pioneered the endpoint security product category in 2001 with the well known ZoneAlarm personal firewall products for individual PCs. The Integrity software, released in early 2002, was derived from the ZoneAlarm security technology and added the central policy management and network access control functions required by businesses and other organizations. Integrity was one of the first endpoint security products integrated with network gateways (the Cisco VPN 3000 Series) in order to ensure that a PC meets such requirements as having a running personal firewall, up-to-date antivirus, and patches installed before it was granted access to an enterprise network. Integrity now controls network access via integration with Check Point's line of perimeter, internal, and Web security products as well as hundreds of other security and networking products that support the IEEE 802.1x authentication standard.
Check Point acquired the Integrity software as part of its [[mergers and acquisitions|acquisition]] of endpoint security [[start-up company|start-up]] Zone Labs in 2004. The Integrity software, released in early 2002, was derived from the [[ZoneAlarm]] security technology and added central policy management and network access control functions. Integrity was integrated with network [[gateway (telecommunications)|gateways]] (the [[Cisco Systems|Cisco]] VPN 3000 series) to ensure that a PC met security requirements before it was granted access to the network.


Demand for Integrity and endpoint security in general grew rapidly in 2003 after the SQL Slammer and MS Blaster computer worms reportedly caused many billions of dollars of damage, despite the near universal use of antivirus on enterprise PCs. The many destructive worms that followed, and the subsequent rise of spyware as a widespread and costly problem for organizations, continued to fuel demand for the product. The need for many organizations in the United States and the European Union to comply with data privacy and integrity regulations, and to pass security audits of their ability to do so, has also contributed to the adoption of Integrity endpoint security. Most recently, infections and damage caused by guest PC access to organizations' networks has emerged as a prime motivator for deploying Integrity.
[[Demand]] for endpoint security grew in 2003 after the [[SQL Slammer]] and [[Blaster (computer worm)|Blaster]] computer worms reportedly caused extensive damage, despite widespread use of [[antivirus]] software on personal computers. A number of destructive worms that followed, and the subsequent rise of spyware as a significant problem, continued to increase demand for endpoint security products. [[Data privacy]] and [[data integrity|integrity]] [[regulation]]s and required [[security audit]]s mandated by governmental and professional authorities, along with infections and damage caused by guest PC access, have also prompted use of such security software.

Competitors include Symantec/Sygate, Cisco Security Agent, McAfee Entercept, and even point products like Determina's Memory Firewall.

==External links==
*[http://www.checkpoint.com/products/endpoint_security/index.html Check Point Software Technologies website page on Check Point Integrity] (aka Check Point Endpoint Security)
*[https://web.archive.org/web/20061028011219/http://www.infoworld.com/article/05/12/05/49TCendpoint_1.html?source=NLC-SEC2005-12-05 ''InfoWorld'' review of Check Point Integrity]
*[http://www.techweb.com/wire/security/59301605 ''Techweb'' story on Check Point Integrity]

{{Firewall software}}
[[Category:Firewall software]]

Latest revision as of 00:02, 4 August 2017

Check Point Integrity is an endpoint security software product developed by Check Point Software Technologies. It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers. The software aims to stop new PC threats and attacks before signature updates have been installed on the PC. The software includes.

An administrator manages the security policies that apply to groups of users from a central console and server.

Check Point acquired the Integrity software as part of its acquisition of endpoint security start-up Zone Labs in 2004. The Integrity software, released in early 2002, was derived from the ZoneAlarm security technology and added central policy management and network access control functions. Integrity was integrated with network gateways (the Cisco VPN 3000 series) to ensure that a PC met security requirements before it was granted access to the network.

Demand for endpoint security grew in 2003 after the SQL Slammer and Blaster computer worms reportedly caused extensive damage, despite widespread use of antivirus software on personal computers. A number of destructive worms that followed, and the subsequent rise of spyware as a significant problem, continued to increase demand for endpoint security products. Data privacy and integrity regulations and required security audits mandated by governmental and professional authorities, along with infections and damage caused by guest PC access, have also prompted use of such security software.

Competitors include Symantec/Sygate, Cisco Security Agent, McAfee Entercept, and even point products like Determina's Memory Firewall.

[edit]