{"id":1483,"date":"2006-05-15T00:00:00","date_gmt":"2006-05-15T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/15\/check-point-bundles-up-security\/"},"modified":"2021-12-30T11:39:28","modified_gmt":"2021-12-30T11:39:28","slug":"check-point-bundles-up-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/05\/15\/check-point-bundles-up-security\/","title":{"rendered":"Check Point Bundles Up Security"},"content":{"rendered":"<p>Most small businesses don&#8217;t know from security. They don&#8217;t know from DSL, either. So Check Point is putting all the stuff they don&#8217;t know in one box.  Check Point&#8217;s SofaWare Technologies unit today unveiled Safe@Office 500 ADSL and 500W ADSL, two new appliances that bundle unified threat management (UTM) capabilities with a full-scale ADSL modem to give small businesses a single safe, fast interface to the outside world.  The Safe@Office 500 ADSL series includes a firewall, intrusion prevention system, antivirus tools, content filtering, wireless security, anti-spam tools, and other security capabilities in a single box. Unlike other entry-level UTM appliances, however, the Safe@Office 500 ADSL also includes the device that connects many small businesses to the Internet: a built-in ADSL modem.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;When you&#8217;re dealing with small businesses, the fewer pieces of hardware you require, the better,&#8221; says Peter Cresswell, national practice manager for security at Bell Business Solutions, which offers secure, managed services to small businesses in Canada. &#8220;There is a limited number of demands you can put on a small retailer &#8212; for example, some of them don&#8217;t even have enough plugs to support a lot of different devices.  Most small businesses don&#8217;t have a great deal of security understanding yet, Cresswell observes. &#8220;But they have awareness that there are issues, and they&#8217;re willing to pay to keep their businesses secure. They want to to be up to date with the technology.&#8221;<\/p>\n<p>The Safe@Office targets small businesses with fewer than 100 users, says Liran Eshel, CEO of SofaWare Technologies. In most cases, it will be distributed by value-added resellers or managed service providers that deliver the hardware along with a DSL service. &#8220;In some cases, it may carry the VAR or service provider&#8217;s logo, not ours,&#8221; he notes.  There is a growing need for UTM capabilities in small shops and remote offices, Eshel said. Check Point already is working on another project that will integrate its UTM products with its end-point security products, he said.<\/p>\n<p>The Safe@Office 500 ADSL series is available now starting at $399. Users can add optional features and capabilities such as VLAN support and vulnerability scanning, which would raise the price to around $1,000 at the top end, Eshel said.<\/p>\n<p>http:\/\/www.darkreading.com\/document.asp?doc_id=94895&#038;WT.svl=news1_4<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1483","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1483"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1483\/revisions"}],"predecessor-version":[{"id":3970,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1483\/revisions\/3970"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}