Check Point Secures Enterprise Web Applications

The new Application Control Software Blade enables organizations to secure and manage the use of thousands of Web 2.0 applications in the enterprise.

By Enterprise Networking Planet Staff | Posted Aug 3, 2010
Print ArticleEmail Article
  • Share on Facebook
  • Share on Twitter
  • Share on LinkedIn

Check Point Software Technologies has announced its new Application Control Software Blade that enables organizations to secure and manage the use of thousands of Web 2.0 applications in the enterprise. As stated in the company's recent news release, the new blade integrates Check Point's unique UserCheck technology to engage employees in the decision-making process and enables IT administrators to tailor application usage policies.


"According to a recent Check Point and Ponemon global survey of over 2,100 IT security administrators, the majority of respondents believe employees are essential to helping organizations mitigate security risks associated with emerging Internet applications in the enterprise. Check Point is bringing a differentiated, modern approach to application control that provides a unique combination of robust security technology and user awareness, both necessary for employees to utilize Web 2.0 tools without jeopardizing the security of the network. Check Point’s new Application Control software blade enables organizations to define granular policy controls for web applications tailored to meet the organization and employees’ specific needs. In addition, the new blade integrates Check Point’s innovative UserCheck technology to alert users of the potential risks applications may cause and asks employees whether the purpose is for business or personal use. The solution educates users on corporate use policies, while providing key usage trends to IT administrators.

"Based on Check Point’s Software Blade architecture, the Application Control blade can be activated with a single click on any Check Point security gateway, enabling organizations to leverage their existing infrastructure. The new blade is centrally managed from a single security management console, and IT administrators can monitor and control application usage based on identity, user or group, frequency and level of risk with unified event analysis. The new blade also provides seamless, agent-based and agent-less, Active Directory integration to allow individual or group access to specific applications, while restricting others."

Read the Full Story at Checkpoint.com

Comment and Contribute
(Maximum characters: 1200). You have
characters left.
Get the Latest Scoop with Enterprise Networking Planet Newsletter