Press release
Check Point Introduces, New UTM-1 Total Security Solutions, Including Best-In-Class Messaging Security
Strategically-packaged solutions offer all-inclusive, comprehensive security to protect businesses against a superior breadth of network and e-mail-based attacksDecember 3, 2007 – Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the launch of the company’s new UTM-1 Total Security appliances, offering the most comprehensive, powerful network protection on the market in a single, easy-to-purchase, easy-to-manage, cost-effective platform.
UTM-1 Total Security solutions change the UTM industry paradigm with an all-inclusive approach to fully protect mid-sized business networks against a wide range of Internet attacks. The unique, unprecedented combination offers core integrated UTM security features conveniently packaged with up to 3 years of dynamic, subscription-based security services, plus software updates and a hardware warranty at a single, business-friendly price.
“Many customers want a comprehensive unified threat management solution bundled with all the extra services, so they can plug it in and be protected,” said Gil Shwed, chairman and chief executive officer at Check Point. “We’re dedicated to delivering ‘total security’ in a powerful UTM platform.”
UTM-1 Total Security appliances include:
- Industry-leading application and network layer firewall
- VPN (site to site and remote access)
- Gateway antivirus and anti-spyware
- Intrusion prevention
- SSL VPN
- Web filtering
- Comprehensive messaging security for e-mail
- Software subscription & hardware warranty
- Dynamic security updates
- Central, easy-to-use management
The addition of messaging security to the Check Point UTM-1 Total Security appliances delivers six dimensions of protection against the three most common attack vectors: spam, e-mail viruses or malware and infrastructure attacks such as e-mail servers. Protections include content-based anti-spam, Internet Protocol reputation, block/allow lists, antivirus, zero-hour outbreak protection and e-mail intrusion prevention. By combining this broad messaging security coverage with a simplified management and the core UTM features, Check Point is able to offer the most powerful UTM solution available today.
“With tens of thousands of new phishing attacks discovered every month and zombie botnets sending an estimated 80% of unwanted mail, spam is no longer simply a nuisance. It is also a threat to users and a costly drain on network bandwidth,” said Bob Egner, vice president of product management at Check Point. “Check Point offers the only comprehensive UTM solution in the market including superior messaging security while continuing to deliver the benefits of a total security solution.”
Six dimensions of comprehensive messaging security
Check Point UTM-1 Total Security appliances and VPN-1 UTM software offer an efficient set of messaging security measures to achieve high performance without sacrificing security. Included are:
- Content-Based Anti-Spam – Unique pattern-based engine detects advanced forms of spam such as image-based and foreign language spam
- Internet Protocol Reputation – Increases performance by blocking most spam at the connection level without the need for further inspection by checking the reputation of the sender
- Block/Allow Lists – Provides administrators with the ability to customize a list to deny obvious email offenders and allow trusted senders
- Antivirus Signature Scan – Scans message content and attachments against existing antivirus signatures
- Email Intrusion Prevention – Protects against threats targeting the messaging infrastructure itself
- Zero-Hour Outbreak Protection – Complements signature-based antivirus to block attacks as they occur-before a signature is available.
“Today, the increasing sophistication and frequency of spam and phishing attacks pose a significant challenge to businesses,” said Charles Kolodgy, a security analyst at IDC. “It’s imperative to protect your infrastructure from being exploited by having a unified threat management solution in place that provides comprehensive messaging security by blocking even the most advanced spam and deflecting the latest viruses.”
Check Point Total Security appliances are the industry’s only truly complete package for businesses seeking advanced protection against a wide spectrum of threats. By bundling the services and support customers need in a cost-effective easy-to-manage platform, Check Point has further established its leadership position in the bourgeoning UTM market.
Pricing, specifications, availability
The new messaging security capabilities are also being added to Check Point’s VPN-1 UTM software solution. Check Point UTM-1 Total Security appliances and VPN-1 UTM software are available immediately.
Prices for UTM-1 Total Security appliances start at $10,500 USD including software subscription and security updates. For detailed specifications, please visit www.checkpoint.com
###
Press contect: Craig Coward
Context Public Relations
01625 511966
www.contextpr.co.uk
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. The company is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point’s PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Through its NGX platform, Check Point delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market leading data security solutions through the Pointsec product line, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm Internet Security Suite and additional consumer security solutions protect millions of consumer PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from hundreds of leading companies. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.
©2003–2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SMP, SMP On-Demand, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm ForceField, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.
This release was published on openPR.
Permanent link to this press release:
Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Check Point Introduces, New UTM-1 Total Security Solutions, Including Best-In-Class Messaging Security here
News-ID: 33333 • Views: …
More Releases from Check Point

CHECK POINT PROVIDES IMMEDIATE PROTECTION AGAINST "FLAME" WORM
Check Point Software Technology- the worldwide leader in securing the Internet, provides innovative security solutions that meet real-time customer needs and help reduce security complexity. The IPS Software Blade stands as a testimony to its speed of resolution and protection from the unforeseen attack of ‘FLAME’. It provides immediate protection by detecting the presence of Flame malware and prevents its propagation.
The Flame malware, also known as SkyWiper and Flamer, is…
CHECK POINT ENCRYPTION SOLUTIONS SECURE BUSINESS LINK NORTHWEST AGAINST DATA LOS …
Basingstoke, U.K., June 16 2010 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced that Business Link Northwest, the UK Government-funded business support and advice service agency, has selected the Check Point Full Disk Encryption and Check Point Media Encryption solutions to secure confidential data on all of its desktop and laptop computers against loss and theft.
Business Link Northwest needed…
Michael Page International Deploys Check Point Data Security Products To Protect …
Leading recruitment consultancy uses Check Point media encryption with port protection, and full-disk encryption products to nullify risk of data loss and theft from endpoints
BASINGSTOKE, UK – 23 September, 2008 – Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, today announced that Michael Page International is using Check Point’s Full Disk Encryption and Media Encryption products to secure confidential data on its laptops, PCs and removable…
CHECK POINT SHIPS FIRST SINGLE AGENT FOR ENDPOINT SECURITY
Check Point Endpoint Security combines VPN, anti-malware, data security and firewall on a single agent and client interface
August 26, 2008 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced it has began shipping a new version of Check Point Endpoint Security™, the first single agent for endpoint security to combine the highest-rated firewall, network access control (NAC), program control, remote access, antivirus,…
More Releases for UTM
Unified threat management (UTM) Technology Research Report : Major Factors & App …
Unified threat management (UTM) technology emerged around 2004 to respond to the threats and sophisticated attacks that traditional firewalls were failing to handle. UTM solutions combine multiple security technologies into one solution that can perform many security functions simultaneously to provide layered protection to all sizes of organization whether small enterprise, home office, mid-level enterprise, or large enterprise.
For Sample Copy of Report @ https://goo.gl/UG04d6
UTM is available as cloud services…
Unified Threat Management (UTM) Market - Global Industry Analysis, Size 2019
Unified Threat Management is a security solution that comprises of features such as gateway antivirus, on-appliance reporting, data leak prevention, VPN (Virtual Private Network), network firewalling, gateway anti-spam and load balancing content filtering that offers values to the organizations. UTM solutions utilize optimum energy and are low cost solutions as compared to intensive point security solutions. UTM solutions are used by enterprises owing to its supple and scalable features which…
Entensys announces the release of its new UserGate UTM solution
The Entensys corporation announces the release of UserGate UTM, a product that answers the question of how to protect modern network infrastructures from different kinds of online threats—external attacks, malware, tracking, and other dangers—and that also permits granular policies towards internet users in terms of regulating both traffic flow and application use. The foundation of UserGate UTM is an innovative platform created by Entensys developers for communications operators, which can…
Comguard unveils Next-Generation UTM from WatchGuard in the Region
Comguard, a Dubai based leading value added distributor for IT security products and the authorised distributor for WatchGuard Technologies, today announced the launch of the New WatchGuard XTM 5 Series of Unified Threat Management (UTM). As next-generation UTMs, the new 5 Series sports the fastest throughput in its price class without sacrificing security efficacy, manageability and ease of use.
WatchGuard notes that the New XTM 5 Series gains substantive performance…
Nevales Networks | UTM Security for SMEs | Firewall | VPN | Antivirus | Antispam
The explosive growth of the Internet, media-rich resources available online, and the large number of users accessing the Web bring with them multiple threats. These threats are designed to exploit the smallest possible vulnerability in a company's network, be it for illegal profit or simply for malicious attacks.
SMEs have always been at a disadvantage when it comes to leveraging the latest technology innovations as most of these solutions come with…
ADAOX Exhibits Cyberoam’s UTM Devices At GITEX Saudi 2009
Showcases Cyberoam’s newest products such as CR15i - security appliance for small offices, and CR200i and CR300i - identity-based UTM appliances at the exhibition.
Riyadh, Kingdom of Saudi Arabia, April 21, 2009: ADAOX Middle East, the leading value added distributor (VAD) of IT security products, introduced its newest vendor-partner Cyberoam at GITEX Saudi Arabia 2009, the leading technology exhibition in the country. ADAOX is also showcasing Cyberoam’s latest identity-based UTM devices,…