{"id":1353,"date":"2004-11-05T00:00:00","date_gmt":"2004-11-05T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/05\/check-point-adds-intrusion-prevention-services\/"},"modified":"2021-12-30T11:39:13","modified_gmt":"2021-12-30T11:39:13","slug":"check-point-adds-intrusion-prevention-services","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/11\/05\/check-point-adds-intrusion-prevention-services\/","title":{"rendered":"Check Point Adds Intrusion-Prevention Services"},"content":{"rendered":"<p>To help solution pro-viders automate some end-point security offerings, Check Point Software Technologies expandsits Total Access Protection initiative and incorporate managed intrusion-prevention services.  Check Point Application Intelligence and Malicious Code Protector deliver in-line intrusion-prevention capabilities at each desktop.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Fred Felman, vice president of marketing at Check Point, said the new intrusion-prevention services will empower solution providers to guarantee customers up-to-the-minute protection against viruses and other network threats.<\/p>\n<p>Calling upon the SmartDefense service and Zone Labs Security Advisories, Check Point will upgrade the service automatically, so its list of vulnerabilities is always up-to-date, he said.  The new capabilities are part of the Redwood City, Calif.-based vendor&#8217;s Total Access Protection initiative to extend cooperation between its Integrity end-point security solution and other offerings in the Check Point product portfolio, such as the integrated firewall, VPN-1 Pro; the internal security gateway, InterSpect; and Connectra, the company&#8217;s Web security gateway.<\/p>\n<p>The strategy is intended to help enterprises defend their network-connected PCs with unified remote access, end-point security, policy enforcement and hosted intrusion prevention.  Eric Eder, president of Intelligent Connections, a security solution provider in Detroit, said his customers have needed more automation for handling incidents.  &#8220;The ability to have centralized management control and have it be consistent across a variety of areas is really something [customers] like.&#8221;<\/p>\n<p>http:\/\/www.securitypipeline.com\/news\/52200275;jsessionid=53OLQAFAE5TAQQSNDBCCKH0CJUMEKJVN<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1353","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1353","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1353"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1353\/revisions"}],"predecessor-version":[{"id":3840,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1353\/revisions\/3840"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1353"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1353"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1353"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}