{"id":1470,"date":"2006-04-04T00:00:00","date_gmt":"2006-04-04T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/04\/check-point-completes-its-security-vision\/"},"modified":"2021-12-30T11:39:27","modified_gmt":"2021-12-30T11:39:27","slug":"check-point-completes-its-security-vision","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/04\/check-point-completes-its-security-vision\/","title":{"rendered":"Check Point Completes Its Security Vision"},"content":{"rendered":"<p>Check Point Software on Monday plans to add the final piece of the puzzle in its vision for unified security management by announcing the integration of end point security into its SmartCenter management solution.  The inclusion of Integrity, a product that secures internal network end point PCs, completes the plan Check Point announced last May for a unified security management platform.  SmartCenter includes an event analyzer feature that can be configured for managing event correlation across all layers of security in a network.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Having a centrally managed environment that will automatically dig down into the layers of the network and sift out the critical information and send alerts is crucial to protecting network infrastructure against current and future threats, said Bob Cohen, president and CEO of CG Atlantic, a New York-based security solution provider.<\/p>\n<p>http:\/\/www.securitypipeline.com\/news\/184419768;jsessionid=AWJ3C5O30AOSKQSNDBOCKHSCJUMEKJVN<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1470","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1470"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1470\/revisions"}],"predecessor-version":[{"id":3957,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1470\/revisions\/3957"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}