Unified Threat Management from Check Point. The security you need. The simplicity you want

Similar documents
CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

Unified Threat Management from Check Point. The security you need. The simplicity you want

The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

CHECK POINT. Software Blade Architecture

Endpoint Security Considerations for Achieving PCI Compliance

Secure Remote Access for the Distributed Business. Challenges, trends, and considerations

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Leverage IPS to Make Patch Tuesday Just Another Day

CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.

Check Point Corporate Logo Usage Guidelines

Portal On-Demand Cost-effective and hosted managed security

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

The New Face of Intrusion Prevention. Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price

The Power-1 Performance Architecture: Delivering Application-layer Security at Data Center Performance Levels

How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators

How to Implement an Integrated GRC Architecture

Guide to the TCO of Encryption. Deployment of Check Point data security can reduce the total cost of ownership by half

Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper

Neutralizing Spyware in the Enterprise Environment

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C FORM 6-K Report of Foreign Private Issuer

Check Point Whitepaper. Securing Web 2.0. More Security, Lower TCO

Solving the Performance Hurdle for Integrated IPS

FORM 6-K SECURITIES AND EXCHANGE COMMISSION Washington, D.C Report of Foreign Private Issuer

Check Point. Software Blade Architecture

Software Blade Architecture

Check Point GO: A Virtual Secure Workspace Technical Whitepaper

Check Point Endpoint Security. Single agent for endpoint security delivering total protection and simplified management

Check Point Whitepaper. Enterprise IPv6 Transition Technical Whitepaper

USB Drives: Friend or Foe? New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise

Defending Small and Medium Sized Businesses with Cloud-Managed Security

SOFTWARE BLADE ARCHITECTURE

SOFTWARE BLADE ARCHITECTURE

Stateful Inspection Technology

Best Practices for Deploying Intrusion Prevention Systems. A better approach to securing networks

Achieving a Clean Bill of Health in HIPAA Compliance with Check Point Solutions

A Getting Started Guide: What Every Small Business Needs To Know About Internet Security

Virtualized Network Security with. A VPN-1 better approach Power to securing VSX networks

Malicious Code Protector

A Practical Guide to Web Application Security

Check Point QoS. Administration Guide Version NGX R65

User Guide for ZoneAlarm security software

Preventing Data Leaks on USB Ports. Check Point Endpoint Security Media Encryption simply regulates access and data for any plug-and-play peripherals

Pointsec PC. Quick Start Guide

Check Point Endpoint Security Full Disk Encryption. Detailed product overview for Windows and Linux

Zone Labs Integrity Smarter Enterprise Security

Configuring Check Point Firewall-1 to support Avaya Contact Center Solutions - Issue 1.1

Firewall and SmartDefense. Administration Guide Version NGX R65

The Attacker s Target: The Small Business

Check Point Security Administrator R70

LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive

Check Point UserAuthority Guide. Version NGX R61

Integrity Advanced Server Gateway Integration Guide

The Seven Key Factors for Internet Security TCO

Endpoint Security More secure. Less complex. Less costs... More control.

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

Total Cost of Ownership: Benefits of Comprehensive, Real-Time Gateway Security

Firewall and UTM Solutions Guide

The Cisco ASA 5500 as a Superior Firewall Solution

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Securing the Small Business Network. Keeping up with the changing threat landscape

The Dirty Secret Behind the UTM: What Security Vendors Don t Want You to Know

Introduction to Endpoint Security

User Guide for Zone Labs security software

User Guide for Zone Labs security software

Virtualized Security: The Next Generation of Consolidation

McAfee Total Protection Reduce the Complexity of Managing Security

How To Buy Nitro Security

COORDINATED THREAT CONTROL

SECURITY APPLIANCES

How To Protect Your Network From Attack From A Virus And Attack From Your Network (D-Link)

Astaro Gateway Software Applications

Antivirus. Quick Start Guide. Antivirus

User Guide for Zone Labs Security Software

Symantec Protection Suite Small Business Edition A simple, effective and affordable solution designed for small businesses

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Symantec Endpoint Protection

How To Protect Your Network From Attack From A Network Security Threat

Unified Threat Management: The Best Defense Against Blended Threats

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Check Point ZoneAlarm

Cisco ASA 5500 Series Content Security Edition for the Enterprise

The Challenge of a Comprehensive Network Protection. Introduction

Solution Brief. Secure and Assured Networking for Financial Services

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

NetDefend Firewall UTM Services

Advantages of Managed Security Services

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Endpoint protection for physical and virtual desktops

NetDefend Firewall UTM Services

Introducing IBM s Advanced Threat Protection Platform

Next Gen Firewall and UTM Buyers Guide

White paper. Keys to SAP application acceleration: advances in delivery systems.

SANS Top 20 Critical Controls for Effective Cyber Defense

Using Palo Alto Networks to Protect the Datacenter

INTRODUCING isheriff CLOUD SECURITY

Cisco ASA 5500 Series SSL / IPsec VPN Edition for the Enterprise

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Transcription:

Unified Threat Management from Check Point The security you need. The simplicity you want

Contents Introduction 3 Complexity of the security problem 3 Comprehensive functional coverage 3 Comprehensive logical coverage 4 Comprehensive physical coverage 5 Sprawl of the typical security solution 5 Unified threat management a fundamentally simpler approach 6 Check Point UTM-1 simplicity without compromise 6 UTM-1 provides extensive functional and logical coverage 8 No compromises 10 Check Point appliance solutions physical coverage and the bigger picture 11 Conclusion 11

Introduction Over the past couple years, the marquee threats of the past denial-of-service attacks, viruses, worms have been joined by an expanding array of newer culprits. The more recognizable ones include information leakage/theft, phishing, spam, spyware, and a growing number of targeted attacks. One possible response to this onslaught is to progressively roll out a corresponding set of countermeasures in the form of independent, single-function solutions, also known as point products. However, this causes the solution to directly mirror the diversity and complexity of the problem. Not surprisingly, evidence indicates that such an approach is not sustainable. Associated costs, such as operating a growing collection of tools, would continue to rise unchecked at the same time that threats inevitably find their ways through the gaps of this type of patchwork defense. It is expensive, inefficient, and ultimately ineffective. Enter unified threat management (UTM) products. The goal of UTM is to simplify the overall security solution despite the growing scope and rising complexity of the security problem. The most apparent aspect of this simplification is the physical consolidation of point products into a single appliance, hence the term unified threat management. Unfortunately, some UTM products have little else to offer. Their level of simplification not to mention security effectiveness is significantly limited due to the relative lack of effort spent on other important characteristics and capabilities, including quality of individual security mechanisms, functional integration, and management unification. Although the concept and promise of UTM makes sense, not all UTM products have the same capability to make good on that promise. Furthermore, this white paper will explore drivers leading to the emergence of UTM products and the inadequacies that many of them exhibit. This will be followed by the introduction of a new solution from Check Point. UTM-1 tackles the challenges facing many other UTM products while complementing other elements of the comprehensive Check Point strategy for UTM and enterprise security. Complexity of the security problem The scope and complexity of the network security problem is driven by underlying trends related to threats, vulnerabilities, and the adoption of new technologies. To better understand these issues we will explore them in terms of the functional, logical, and physical coverage of network security, which need to be accounted for when establishing a comprehensive security solution. Comprehensive functional coverage Ongoing trends applicable to the threat landscape include the following: Falling time needed to generate new threats among other factors, widespread availability of malware development toolkits has reduced the time between the announcement of a new vulnerability and the launch of a corresponding threat to days Rising diversity of threats it is no longer just a battle against viruses and worms. Information-stealing spyware, rootkits, Trojans, and countless phishing schemes have now joined the fray Check Point Software Technologies Ltd. 3

More elusive threats blended threats are now status quo. By taking advantage of multiple exploit mechanisms, payloads, and propagation techniques, blended threats increasingly elude organization defenses and cause damage. Targeted attacks present even bigger problems ones that are purpose-built to account for the unique characteristics of a given computing environment and its defensive configuration Providing an adequate level of protection depends on architecting a security solution that incorporates a wide range of functional capabilities For example, firewalls should be complemented with intrusion prevention systems, and purely preventive mechanisms should be supplemented with intrusion-detection or log-auditing features. Combine these capabilities with threat-specific countermeasures such as antivirus, anti-spyware, and anti-spam, and you get a sufficient blend of defenses. However, functional blending alone is not enough. This concept needs to be extended to account for the logical coverage of a comprehensive security solution, which, ideally, would be bundled with messaging security update and support services. Comprehensive logical coverage The following highlights from the vulnerability landscape can help us better understand logical coverage: There are already many vulnerabilities that require enterprise attention. Approximately 5,000 vulnerabilities were disclosed in 2007 alone. And this number only covers the most common products. Many of these vulnerabilities were targeted by new malware and other attacks Vulnerabilities affected more than networking and operating systems. During parts of 2007, Web applications made up anywhere from 58 to 61 percent of documented vulnerabilities The number of vulnerabilities will rise. Whatever benefit is gained from coding improvement is far exceeded by the rate at which organizations adopt emerging technologies, buy or build new applications, or implement new versions of existing software. The result is a growing population of new code-flaw vulnerabilities and weaknesses introduced through configuration errors Thus, we can conclude that a comprehensive security solution requires more functional coverage than ever before. It is necessary to address the capabilities associated with vulnerability management, including vulnerability alerting services, asset inventory and management, vulnerability scanning, and patch, configuration, and other remediation management tools. Identifying and fixing vulnerabilities is an effective way to help secure an organization s computing environment. In addition, a comprehensive security solution requires complete logical coverage. Threats and vulnerabilities will need to be addressed at all network and application layers. Protection is necessary not only for network- and system-level components, but also for applications and data. Logical coverage is necessary to counter the prevailing trend of exploits happening at higher network and application layers. Hackers have pursued this approach because it enables them to elude lower-level network-layer countermeasures that organizations have deployed so far. Enterprises must recognize that blended defenses entail more than implementing countermeasures that account for all security functions. With many of these capabilities especially those focused on access control and threat detection Check Point Software Technologies Ltd. 4

The security you need. The simplicity you want it is necessary to address each logical network and application layer. In practice, a single device like a multi-layer firewall could do it, as could separate applicationor technology-specific firewalls. While adding full logical coverage is necessary, it will not be sufficient in and of itself for network security. Comprehensive physical coverage The third dimension of network security, physical coverage, concerns increased user mobility, proliferation of remote offices, and greater interconnectivity and integration among organizations and their customers, partners, and other third parties. The primary issue is introducing more threat points with access to the organization network. These threat points also cause the data and resources requiring protection to be more highly distributed. As a result, organizations should no longer rely so heavily on countermeasures deployed primarily from their main Internet connections. It is now necessary for organizations to provide comprehensive physical coverage. Main locations, branch offices, and even individual endpoints must be accounted for. Countermeasures need to be implemented at established boundaries, in closer proximity to important information resources, and at choke points on internal networks. It is important to consider the countermeasures needed at each location. Ideally, they should be multi-functional and multi-layered. Sprawl of the typical security solution The problems associated with the information security problem should not be taken lightly. The trends for threats, vulnerabilities, and technology adoption dictate architecting a solution that provides comprehensive functional, logical, and physical coverage. In doing so, coordination of processes, procedures, and tools will be necessary. And comprehensive security means reducing the sprawl of security solutions that has cropped up over time. Individual aspects of the security problem and the products introduced to address them emerged over many years. Firewalls and antivirus led to virtual private networking. Denial-of-service attacks and worms drove the need for intrusion prevention and vulnerability management systems. Soon came instant messaging, P2P file sharing, and a dramatic rise in spam. Now we are dealing with information leakage, phishing, and spyware. Largely, it has been unavoidable that organizations would wind up with a security infrastructure composed of numerous, disparate, disconnected countermeasures. In recent years, organizations have come to understand that a patchwork approach is not only unsustainable, but it leads to disadvantages that include: High capital costs each security issue requires a separate, expensive IT project Runaway operating expenses all security products and systems must be operated and maintained individually, but still coordinated in some fashion Incomplete and/or ineffective coverage organizations will forgo a product with unique capabilities if it overlaps significantly with its installed base, leaving network security gaps. And since products are configured separately, conflicting or incomplete rule sets can occur due to false assumptions about which products treat which threats Check Point Software Technologies Ltd. 5

As a result, most organizations now realize that when they build a compre hensive security solution they must emphasize simplicity in the infrastructure and its management. Unified threat management a fundamentally simpler approach Unified threat management involves combining multiple functional and logical security capabilities in a single product. UTM directly targets the enterprise need for simplicity, but it is not designed to tackle every security issue. Instead, it takes on a significant number of security issues that can be addressed with a compatible set of network technologies including firewall, VPN, antivirus, and intrusion prevention. It does not eliminate the need for other countermeasures. UTM can also lower costs and improve security not just as a result of physical consolidation, but because of integration and unification of underlying security services and how they are managed. In reality, many UTM products fall short because they exhibit one or more deficiencies, such as: Not using best-of-breed security components Not supporting a core capability like antivirus Little or no integration of individual security capabilities such as sharing security information and event management data, which would increase overall security effectiveness Insufficient performance or capacity of system resources to support operation of all services under normal and extreme conditions i.e., during attacks or heavy network traffic Little or no unification of management capabilities in terms of policy development, event handling, logging, and reporting For example, some UTM products utilize only best-of-breed security from marketleading solution providers. However, they completely lack integration, requiring the customer to purchase and operate a separate management application for each security function. Others may provide better management, but lack the quality of individual security components. Check Point UTM-1 simplicity without compromise UTM-1 is a Check Point appliance that provides extensive functional and logical network-based threat management and security coverage. It does so without exhibiting the shortcomings of other UTM offerings. UTM-1 delivers proven, tightly integrated security to achieve an ideal blend of simplicity and high levels of security effectiveness. Check Point UTM-1 appliances provide robust security coverage without compromising performance. When compared with other vendors in the market, Check Point delivers better firewall performance when compared with Fortinet, Juniper, and Cisco products. Check Point Software Technologies Ltd. 6

FW Large Packet Performance (Mbps) FW IMIX Performance (Mbps) VPN Large Packet Performance (Mbps) UTM-1 276 FG 300A ASA 5510 SRX 100 600 400 300 600 240 Not available Not available 175 100 120 170 65 Max FW Connections 400 K 400K 50K 32 K FW Large Packet Performance (Mbps) FW IMIX Performance (Mbps) VPN Large Packet Performance (Mbps) UTM-1 576 FG 800 ASA 5520 SRX 210 1,100 1,000 450 750 500 Not available Not available 250 220 200 225 75 Max FW Connections 500 K 600K 280K 64 K FW Large Packet Performance (Mbps) FW IMIX Performance (Mbps) VPN Large Packet Performance (Mbps) UTM-1 1076 FG 1000A ASA 5540 SRX 240 2,000 2,000 650 1,500 630 Not available Not available 500 250 600 325 250 Max FW Connections 1.1 M 600K 400K 128 K UTM-1 provides extensive functional and logical coverage UTM-1 appliances examine hundreds of predefined applications, protocols, and services out-of-the-box, ensuring that the vast majority of programs are threat-free entering or exiting the network. This includes common and emerging applications that are difficult to secure, such as Voice over IP (VoIP), instant messaging, and P2P file sharing. Overall, UTM-1 goes well beyond typical UTM products in terms of the scope of security coverage that it provides. UTM-1 appliances come packaged with the most comprehensive and flexible security solution available. All UTM-1 appliances can include firewall, intrusion prevention (IPS), antivirus, anti-spyware, URL filtering, Web security, and antispam Software Blades. The new Check Point Software Blade Architecture makes it easy to add new security features without purchasing new gateways or swapping out hardware modules. Check Point Software Technologies Ltd. 7

Specific capabilities include: Multi-layer, stateful firewall Based on FireWall-1 the industry s most proven firewall for more than 10 years UTM-1 provides robust traffic inspection and access control for network-layer protocols and services and a growing list of applications an essential UTM capability because threats continue to exploit application-layer vulnerabilities. Intrusion prevention UTM-1 includes a number of mechanisms for identifying and responding to threats directed at any network or application layer. Among these are a vast collection of signatures and heuristics that can address both known and unknown threats. Backed by an expert threat and vulnerability research team, UTM-1 can receive timely updates via Check Point SmartDefense Services, which ensure protection from even the latest, emerging threats. Antivirus Gateway-based antivirus effectively complements desktop antivirus. For UTM 1, an ICSA-certified antivirus engine provides it with the capability to scan email (POP3 and SMTP), file transfers (FTP), and Web (HTTP) traffic in real time for possible threats hidden inside legitimate content. Messaging security and anti-spam Messaging security and anti-spam, including the Check Point six dimensions of comprehensive security, provide a solution that offers six protections for enterprise messaging infrastructure: IP reputation-based anti-spam, pattern-based anti-spam, administrator-defined block/allow lists, email antivirus, Zero-Hour malware detection, and email intrusion prevention. This multi-dimension approach protects the email infrastructure, provides highly accurate spam protection, and protects organizations from a wide variety of virus and malware threats within email. Anti-spyware UTM-1 includes two anti-spyware-specific features: SmartDefense-supplied signatures, which enable the gateway to stop spyware communications, and a Web filtering engine that can block access to known spyware sites. Web application firewall Web Intelligence, an optional component of UTM-1, is a Web application firewall that protects against attacks such as cross-site scripting, directory traversal, and SQL injection. By incorporating the patent-pending Malicious Code Protector, it also detects and blocks buffer overflow attacks and malicious executables that target Web servers. Uncommon among UTM products, these capabilities enable organizations to implement a Web application firewall without purchasing a separate solution. Check Point Software Technologies Ltd. 8

One-Click VPNs Secure site-to-site and remote access VPN communications can be established in just One Click with UTM-1. By establishing security parameters and identifying community endpoints, VPNs can be enabled automatically among all associated gateways or between a gateway and remote users. New endpoints added to the community inherit the same properties and are automatically configured for VPN communications. In addition to out-of-the-box support for IPSec tunnels, SSLbased access can be implemented without separate hardware by licensing the Check Point SSL Network Extender plugin. Web filtering UTM-1 can control access to specific Web sites with built-in Web filtering. The UTM-1 Web classification database is among the largest and most accurate in the industry, maximizing the value proposition of Web filtering. Benefits include enhanced employee productivity, reduced corporate liability, increased network bandwidth, and lowered malware exposure. Integrated endpoint security An optional module of UTM-1, Check Point Endpoint Security On Demand helps ensure that unmanaged computers even those outside the control of the IT department do not introduce threats into the corporate environment. It inspects unmanaged computers for malicious software and enforces policies for up-to-date antivirus, presence of a personal firewall, and so on prior to granting network access. UTM-1 Total Security value proposition According to the IDC study Is UTM a Threat to Routers? We Think So!, the advantages of UTM appliances over routers are numerous. It goes on to state, UTM devices are the choice for many organizations because of their convenience, ease of installation, affordability, security, and centralized management capabilities. In keeping with the spirit of that study, Check Point UTM-1 appliances are all-inclusive, turnkey solutions that deliver everything you need to secure your network in a simple, cost-effective way. With the Check Point Software Blade architecture, it is easy to add security features without purchasing new gateways or swapping out hardware modules. New security functions are license key enabled to provide modularity. Each solution includes the proven security features you need along with complete security updates, hardware warranty, and reduced support costs for up to three years. Based on the same Check Point technologies that secure the Fortune 500, UTM-1 appliances provide uncompromising security with streamlined deployment and administration. Check Point Software Technologies Ltd. 9

No compromises The scope of security coverage provided by UTM-1 is impressive. However, it is important to realize that no compromises have been made integrating these capabilities. The following points prove every effort has been made to maximize the benefits of UTM-1: 1. Each security capability included in UTM-1 has a track record of superior effectiveness, consistent with the Check Point history of providing innovative, best-in-class security 2. There are UTM-1 appliances to meet the performance needs of every size of organization. Performance ranges from 400 Mbps firewall and 100 Mbps VPN throughput up to 4.5 Gpbs firewall and 1.1 Gbps VPN throughput. 3. Management functionality is robust, integrated, and easy to use. With its setup wizard, initial deployment and configuration can be accomplished in less than 10 minutes. Once set up, UTM-1 appliances can be centrally managed from Check Point SmartCenter. As an optional, embedded component of UTM 1, organizations can implement SmartCenter without deploying a separate, dedicated system to manage UTM-1 appliances. Specific capabilities of SmartCenter include: SmartDashboard, which enables centralized, cross-functional configuration of security policies. Sites and gateways can be managed individually or simultaneously, reducing administrative burden and ensuring consistency across the network Version control for all security objects and policies to support quick roll-back and applicable audit requirements SmartView Monitor and SmartViewTracker, which provide comprehensive logging, real-time monitoring, and in-depth, customizable reporting, offering valuable insight into real-time security issues as well as the ability to track trends and developments 4. UTM-1 is reliable by design. As a purpose-built solution, sufficient resources have been designed into it. In addition, with several models to choose from, customers can pick the UTM-1 appliance with the performance and capacity that matches their needs. And UTM-1 supports clustering and back up network connections. 5. Updates via optional SmartDefense Services which provide ongoing, automatic updates to defenses, policies, and other security elements ensure that UTM-1 security engines can counter emerging threats. Other optional modules enable organizations to build systems that fit their requirements and to make modifications as their needs change. Check Point Software Technologies Ltd. 10

Check Point appliances solutions physical coverage and the bigger picture Physical coverage is a critical objective of a comprehensive security strategy. So realize that UTM-1 alone may not be enough to secure your perimeter. Check Point also offers UTM-1 Edge appliances with lower throughput for smaller enterprises and branch offices at a more cost-effective price point. In addition, VPN-1 UTM is a Check Point software option that can be installed on your choice of hardware for the high-performance, high-capacity requirements typical of larger enterprises. Beyond the need for a UTM solution, if an even higher-performance solution is required, Check Point also offers its IP and Power-1 offering of IT security appliances, providing customers with the greatest choice for deploying our awardwinning security solutions. Customers have many options. They can deploy Check Point software on open servers, Check Point appliances, Check Point Integrated Appliance Solutions, or dedicated appliance platforms from partners such as Crossbeam. All Check Point appliances are built around a unified security architecture, enabling organizations to perform all aspects of security management via a single, unified console. This offers customers the flexibility to deploy a complete security solution on their choice of hardware platform. See the Check Point Appliance brochure for more information. Conclusion For most organizations, the complexity of information-security infrastructure has risen in lockstep with the growing diversity and complexity of computing systems and their arrayed threats. The result has been spiraling costs with diminishing returns of effectiveness. Unified threat management products can help address this situation by simultaneously simplifying network security and lowering associated costs, while strengthening organization defenses. However, many UTM products focus solely on physical consolidation and fail to fully deliver these benefits. In contrast, organizations will not be shortchanged with UTM-1. Purpose-built as a UTM solution, UTM-1 combines an unmatched range of best-of-breed security components, multi-level integration, and unification with its management capabilities for fundamentally simpler network security. Check Point Software Technologies Ltd. 11

About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented Stateful Inspection technology. Today, Check Point continues to innovate with the development of the software blade architecture. The dynamic software blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft. CHECK POINT OFFICES Worldwide Headquarters 5 Ha Solelim Street Tel Aviv 67897, Israel Tel: 972-3-753 4555 Fax: 972-3-624-1100 email: info@checkpoint.com U.S. Headquarters 800 Bridge Parkway Redwood City, CA 94065 Tel: 800-429-4391 ; 650-628-2000 Fax: 650-654-4233 URL: http://www.checkpoint.com 2009 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Endpoint Security On Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Full Disk Encryption, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, Sentivist, SiteManager-1, Smart-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartView Tracker, SMP, SMP On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications. August 24, 2009