{"id":1294,"date":"2004-02-23T00:00:00","date_gmt":"2004-02-23T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/23\/zone-labs-updates-integrity-security-policy-enforcer\/"},"modified":"2021-12-30T11:39:07","modified_gmt":"2021-12-30T11:39:07","slug":"zone-labs-updates-integrity-security-policy-enforcer","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/02\/23\/zone-labs-updates-integrity-security-policy-enforcer\/","title":{"rendered":"Zone Labs Updates Integrity Security Policy Enforcer"},"content":{"rendered":"<p>Zone Labs unveiled a new version of its Integrity endpoint policy enforcement software &#8212; Integrity 5.0 &#8212; that adds additional integration with products from Check Point, which is in the process of acquiring the San Francisco-based security firm.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Integrity 5.0 ensures that endpoint systems &#8212; laptops, desktops, and even mobile devices &#8212; are meeting security policies established by the IT department before access to the network, either from within the firewall or remotely from outside the perimeter, is allowed.  Boasting increased integration with Check Point&#8217;s popular line of virtual private networking (VPN) access and firewall products, Integrity 5.0 guarantees that only systems meeting security policies can connect remotely via VPN, said Fred Felman, vice president of marketing for Zone Labs.<\/p>\n<p>&#8220;Integrity allows administrators to deploy and manage a very flexible set of alternative rules if a client is out of compliance with policies,&#8221; Felman said.<\/p>\n<p>The new centrally-managed policy maker and enforcer also now sports support for security patches and service packs &#8212; such as the blizzard of those released by Microsoft &#8212; so that endpoint machines are forced to deploy those that administrators think are necessary before the systems connect to the enterprise environment.  The new Integrity server software supports Windows 2000 and Windows 2000 Advanced Server, while the Integrity clients run on Windows 95, Windows 98 Second Edition, Windows 2000, Windows NT 4.0 Workstation, and Windows XP Professional.<\/p>\n<p>More info: http:\/\/www.techweb.com\/wire\/story\/TWB20040223S0008<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1294","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1294"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1294\/revisions"}],"predecessor-version":[{"id":3781,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1294\/revisions\/3781"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}