{"id":1285,"date":"2004-01-20T00:00:00","date_gmt":"2004-01-20T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/20\/check-point-launches-dewormer-for-internal-networks\/"},"modified":"2021-12-30T11:39:06","modified_gmt":"2021-12-30T11:39:06","slug":"check-point-launches-dewormer-for-internal-networks","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/01\/20\/check-point-launches-dewormer-for-internal-networks\/","title":{"rendered":"Check Point launches dewormer for internal networks"},"content":{"rendered":"<p>Check Point Software launched Interspect, a family of security appliances designed to block the spread of computer worms across internal networks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nick Lowe, Check Point director for Northern Europe, says his firm&#8217;s approach scores over Cisco&#8217;s Network Admission Control program by avoiding the need to install client software.<\/p>\n<p>InterSpect appliances are based on Check Point&#8217;s Stateful Inspection and Application Intelligence technologies and designed specifically to inspect the protocols and applications used on internal networks.<\/p>\n<p>According to Check Point, InterSpect is better than products designed for perimeter security within Intranet environments because of its greater awareness of internal applications and protocols (such as database protocol SQL).<\/p>\n<p>More info: [url=http:\/\/www.theregister.co.uk\/content\/55\/35003.html]http:\/\/www.theregister.co.uk\/content\/55\/35003.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1285","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1285","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1285"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1285\/revisions"}],"predecessor-version":[{"id":3772,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1285\/revisions\/3772"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1285"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1285"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}