Related Links

  • Check Point
  • Reed Exhibitions Ltd is not responsible for the content of external websites.

Top 5 Stories


Check Point scoops up FaceTime application database - adds information security

24 November 2009

Check Point Software Technologies has announced plans to add information security controls for over 50 000 web 2.0 widgets and more than 4500 internet applications, following the just-announced acquisition of FaceTime's application classification and signature database.

According to Gil Shwed, Check Point's chairman and CEO, the new development - combined with the acquired technologies - will provide businesses with granular information security control over application usage.

It will also, he said, enable security administrators to prevent threats associated with the use of certain internet applications.

The plan is for Check Point to offer these information security controls to customers as a software blade that will be available for all gateways.

"As the internet and its use have evolved, Check Point has ensured businesses remain securely connected. This granular application control will enable better use of web 2.0 technologies safely and securely", he explained.

Shwed said that, with these moves, Check Point is continuing to enhance internet firewall technology.

"Adding the world's largest application classification database is a natural extension of our Software Blade architecture, demonstrating the power of our architecture and solution," he said.

Focus on virtualisation and endpoint security

Check Point's move into the granular control of applications follows on from an interview given late last week by its Canadian security engineering manager, in which he said that next year will see Check Point focus its efforts on virtualisation and endpoint information security.

In an interview with IT Business Canada, Kellman Meghu, said that, as more companies look to virtualise their IT infrastructures to save power and be more environmentally friendly, it's important that partners and end-users realise that information security policies and procedures that work well in a physical environment don't always work the same way in a virtual world.

"There are no new threats in a virtual world, but what has changed is the way in which they protect their infrastructures", he said.

"You can't replicate what you're doing [for security] in the physical world and expect that to work the same and scale in the virtual world. There are more policies and extra layers that need to be looked at in a virtual environment."

This article is featured in:
Application Security  •  Internet and Network Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×