Nokia Siemens Networks tackles broadband challenge with savvier transport
| |
| |
| Press Release |
| Nokia Siemens Networks Media Relations PO Box 1 FI-02022 Nokia Siemens Networks |
| |
| |
| Press Release |
| Nokia Siemens Networks Media Relations PO Box 1 FI-02022 Nokia Siemens Networks |
A new security model driven by changing landscape
OTTAWA, ON and CUPERTINO, CA, Oct. 5, 2011 /CNW/ - Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, today unveiled the company's vision for a smarter security model. This new model, released at the company's annual Insight event for the analyst community, is inspired by a changing security landscape now marked by data breaches, and the challenges generated by mobile devices, cloud implementations and targeted attacks.
Trend Micro CEO, Eva Chen, outlined her vision of the new model the core of which centers on a data-centric, anti-hacker framework:
Trend Micro is delivering more adaptive and contextually-aware security that protects the data itself - whether on a device or server; at home or on the road; in physical, virtual or cloud environments -- and provides the intelligent integration and coordination required to manage, control and defend that data in real time.
Benefits for businesses and consumers
Supporting quotes:
Eva Chen, CEO, Trend Micro
"Stagnation is not an option in an industry where a multi-billion dollar cybercriminal enterprise works relentlessly to steal customers' data - and their trust. We need to continually innovate to stay ahead, and help our customers regain confidence as we deliver better security. Three years ago, Trend Micro led the industry with the Smart Protection Network, which delivered security from the cloud. Now, we are moving even further ahead in the face of advanced, multi-faceted, targeted attacks by leveraging our scalable cloud security advantage and customizing it for the data, infrastructure, devices and applications supporting the cloud journey."
Steve Quane, Chief Product Officer, Trend Micro
"This is a fundamental change in the approach to security for organizations who have relied on a perimeter-based network security model, and for consumers whose digital lives are increasingly mobile. Our new data-centric framework takes into account the changes required to secure data in an accelerating cloud-dominated world."
Jim Short, General Manager Trend Canada
"Trend Micro solutions protect across physical, virtual and cloud environments in real time. In Canada and beyond, both our consumer and our enterprise customers in government and business will benefit from this savvy, data centric model."
About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers. A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.
PALO ALTO, Calif., and NEWTOWN SQUARE, Pa. - October 05, 2011 - HP and SAP AG today announced an agreement for HP Enterprise Services to provide cloud-based delivery of SAP® applications that enable enterprises to deploy applications in a scalable and affordable manner.
The combination of these solutions will empower enterprise customers to dramatically increase the availability and speed of business information, leading to faster and more insightful decision making.
The first SAP application to be delivered by HP Enterprise Services via its cloud platform is the SAP® Customer Relationship Management (SAP CRM) rapid-deployment solution, which can enhance the productivity of enterprise sales, marketing and service professionals.
Delivered via HP Enterprise Services' commercial data centers around the globe, the SAP CRM rapid-deployment solution brings together software and services that provide essential CRM functionality, quickly and affordably, while helping clients reduce risk. Clients are provided secure processing capacity - with security and privacy policies that can rapidly adjust to meet each client's specific needs.
HP bundles the necessary infrastructure, platform and application services in an as-a-service model, enabling clients to pay on a per-seat basis for what they need to run the applications and processes.
"Cloud delivery models are becoming a top priority for clients due to their quick deployments, cost-effectiveness and overall flexibility," said Eric Clark, vice president, Enterprise Application Services, HP Enterprise Services. "In collaboration with SAP, HP is empowering clients to dramatically increase the availability and speed of business information via the cloud, paving a flexible path toward future growth."
By accessing SAP CRM and subsequent applications in the cloud, enterprises can benefit from easier and faster deployments. SAP Rapid Deployment solutions offer enterprises a ready-to-use combination of software, predefined services and preconfigured content at a fixed price. These solutions can be deployed much more quickly than traditional methods - often in as little as eight weeks.
"SAP is committed to providing customers flexibility in software deployment options and innovations in cloud computing," said Kevin Ichhpurani, senior vice president, Ecosystem and Channels, SAP. "Through expanded cloud delivery options via HP, we can provide global users with secure, reliable access to essential business applications while helping companies contain hardware and management costs."
HP is an SAP-certified global provider of cloud services, application management services and hosting services, providing high-quality standards for cloud-based delivery of SAP applications. Offering the SAP CRM rapid-deployment solution as a cloud-based offering broadens the 20-year relationship between SAP - a member of the HP Agility Alliance - and HP.
The Agility Alliance is HP Enterprise Services' premiere partner program, bringing together industry-leading technology providers to build and deliver comprehensive IT solutions.
HP services help businesses and governments in their pursuit of an Instant-On Enterprise. In a world of continuous connectivity, the Instant-On Enterprise embeds technology in everything it does to serve customers, employees, partners and citizens with whatever they need, instantly.
HP's premier client event, HP DISCOVER, takes place Nov. 29 - Dec. 1 in Vienna, Austria. The event showcases how organizations can get started on their Instant-On Enterprise journeys.
About SAP
As market leader in enterprise application software, SAP (NYSE: SAP) helps companies of all sizes and industries run better. From back office to boardroom, warehouse to storefront, desktop to mobile device - SAP empowers people and organizations to work together more efficiently and use business insight more effectively to stay ahead of the competition. SAP applications and services enable more than 172,000 customers (includes customers from the acquisition of Sybase) to operate profitably, adapt continuously, and grow sustainably. For more information, visit www.sap.com.
About HP
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world's largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure at the convergence of the cloud and connectivity, creating seamless, secure, context-aware experiences for a connected world. More information about HP (NYSE: HPQ) is available at http://www.hp.com.
Company’s Chief Security Architect Tim Brown Delivers Testimony Before U.S. House Subcommittees Concerning Cybersecurity, Infrastructure Protection, and Security Technologies
WASHINGTON, October 6, 2011 - While both the hype and promise surrounding cloud computing continue to accelerate at a rapid pace, confusion still remains about what exactly cloud computing is and the risks and benefits associated with transitioning to cloud-based environments. While corporate and governmental organizations across the globe want to reap the cost, performance and agility benefits of cloud computing, they are wary of potential risks.
Today, CA Technologies (NASDAQ: CA) Chief Security Architect Tim Brown joined academic, government and technology leaders to offer testimony before the U.S. House Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies House Committee on Homeland Security on the opportunities and security risks associated with cloud computing.
In his testimony, Brown addressed four key areas CA Technologies believes must be considered in evaluating the transition to cloud:
• The reality of new complexities introduced with cloud computing;
• Security considerations for the cloud;
• The critical role identity management and authentication plays in enabling cloud security; and
• The importance of global standards development and adoption to ensure interoperability and common implementation of cloud solutions
“CA Technologies believes that the responsibility for securing the cloud lies with both the providers and the consumers of cloud solutions. The cloud is neither inherently more nor less secure than other IT services and solutions," Brown testified. "Generalized concerns over cloud security on the one hand, and arguments that the security risks in the cloud are overblown on the other hand, have muddied the waters to the point that policymakers and practitioners are experiencing security schizophrenia. Should I overlook legitimate security concerns and plunge headfirst into the cloud, or should fear and uncertainty of these risks stop me from doing anything that even remotely resembles cloud computing? Like most responsible decisions, the answer lies somewhere in the middle of these two extremes.”
Brown also stated that “One of the greatest challenges facing the IT sector today is fostering online trust, including the important trust components of security and privacy. The fact is that most online threats and successful data breaches of late have been based on and exploit access control and identity management failures in systems. The Government Accountability Office has written to Congress about unauthorized access issues as recently as Monday of this week (October 3, 2011). Identity management and access management controls are central to the secure adoption of cloud services. Identity and access management practices within the cloud provide the foundation for effective security by ensuring that all users have only the appropriate level of access rights to protected resources, and that those rights are effectively enforced. IT organizations generally as well as cloud service providers, both public and private, struggle to keep up with the explosion in the number of users from multiple systems, applications and user communities that are consuming their services and the complexity of managing access rights for these users.”
CA Technologies provided the following recommendations to Congress to accelerate the deployment of secure cloud solutions:
• Adopt policies that can accommodate future development and flexibility in the cloud market, specifically, and in IT more generally. Too often, Federal policy has imposed static frameworks that must constantly be updated based on new technology developments. CA Technology recommends that Congress focus on outcomes and not on specific technologies;
• Avoid policies that create a fragmented, country specific market for cloud services in the United States. As the cloud market continues to evolve, there is great risk for market segmentation based on unique policies designed solely to address US market demands. Policies that acknowledge the global nature of cloud markets will enable the US to maintain its leadership position in cloud computing and encourage innovation to support jobs and exports of US developed technologies;
• Support standards developed by recognized national and international standards development organizations in the areas of cloud security, interoperability, and transparency. These standards are vital to the management of cloud security risks;
• Fund and support the continued development and rollout of FedRAMP and the NSTIC;
• Continue support for NIST and its unique role in addressing emerging security issues; and
• Encourage the federal government to leverage emerging efforts to develop service measurement indexes like the Cloud Service Measurement Initiative Consortium in government cloud procurements. These efforts can provide federal agencies facing budget, performance, and transparency demands with tools that take data-driven approaches to evaluating competing offers of cloud technologies.
About CA Technologies
CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments – from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at www.ca.com.
Analysts Examine Impact of PaaS on IT at Gartner Symposium/ITxpo 2011
STAMFORD, Conn., October 5, 2011—
Worldwide platform as a service (PaaS) revenue is on pace to reach $707.4 million in 2011, up from $512.4 million in 2010, according to Gartner, Inc. The market will experience consistent growth with worldwide PaaS revenue totaling $1.8 billion in 2015.
"Cloud has three technological aspects — infrastructure as a service (IaaS), platform as a service (PaaS) and finally software as a service (SaaS)," said Fabrizio Biscotti, research director at Gartner. "While SaaS is the most developed aspect, PaaS is the least developed, and it is where we believe the battle between vendors is set to intensify."
Initial PaaS products primarily supported application server capability, but the market has since expanded to encompass other middleware capabilities as a service, such as integration, process management, and portal and managed file transfers (MFTs). PaaS offerings are increasingly set to take market share from the low end of the portal, application server and business process management (BPM) markets, but as the technology matures, PaaS offerings will also challenge the upper layers of the market.
Gartner analysts said PaaS offerings are likely to expand the application integration and middleware (AIM) market by bringing in a new range of organizations that otherwise would have been packaged application and office software users.
"One of the likely consequences of the cloud for the application integration and middleware (AIM) market is further market concentration," said Yefim Natis, vice president and distinguished analyst at Gartner. "When application infrastructure is deployed on-premises, organizations can take a best-of-breed approach and integrate all acquired components in their data center. When middleware services are acquired in the cloud from different PaaS providers – the services remain in different data centers and resist optimized integration. Mainstream users of PaaS services will likely look for providers that deliver comprehensive and integrated PaaS functionality suites – forcing the specialist offerings to consolidate.” Few providers deliver a comprehensive and integrated PaaS offering, and Gartner believes that such fragmentation will be impossible to deal with when users and service providers start to implement large-scale, business-critical applications requiring the simultaneous and in-concert use of multiple PaaS capabilities such as user experience, application servers, database management systems (DBMSs), security and messaging.
Gartner analysts predict a rapid aggregation of PaaS offerings into suites of functionalities, providing users with well-integrated and optimized platform services (from the same or different suppliers), co-located in the same data center to provide appropriate levels of performance, security, manageability and availability. This process will take place in steps. Initially, around 2013, PaaS functionalities will consolidate around specific usage scenarios, paving the way for integrated comprehensive PaaS offerings to emerge from 2015 and beyond.
"Clearly, from the attention given to this segment by the industry's giants, it is likely that they are viewing PaaS as a strategic undertaking as much as an incremental market opportunity," said Mr. Biscotti. "As PaaS suites mature, they may emerge as critical enabling technologies for many cloud-based businesses; at the same time, as companies adopt these platforms, the providers of the platforms will likely leverage them to expand their ecosystem, leverage their natively developed application services (SaaS) or extend their on-premises solutions."
Additional information is available in the Gartner report "Forecast: Platform as a Service, Worldwide, 2010-2015, 3Q11 Update" at http://www.gartner.com/resId=1792219.
Gartner analysts will examine how PaaS will change the IT strategy of IT leaders at Gartner Symposium/ITxpo 2011.
About Gartner Symposium/ITxpo 2011
Gartner Symposium/ITxpo is the world's most important gathering of CIOs and senior IT executives. This event delivers independent and objective content with the authority and weight of the world's leading IT research and advisory organization, and provides access to the latest solutions from key technology providers. Gartner's annual Symposium/ITxpo events are key components of attendees' annual planning efforts. IT executives rely on Gartner Symposium/ITxpo to gain insight into how their organizations can use IT to address business challenges and improve operational efficiency.
Additional information for Gartner Symposium/ITxpo 2011 in Orlando, October 16-20, is available at www.gartner.com/symposium/us. Members of the media can register for the event by contacting Christy Pettey at christy.pettey@gartner.com.
Additional information from the event will be shared on Twitter at http://twitter.com/Gartner_inc and using #GartnerSym.
Upcoming dates and locations for Gartner Symposium/ITxpo 2011 include:
October 3-5, Tokyo, Japan: www.gartner.com/jp/symposium
October 16-20, Orlando, Florida: www.gartner.com/us/symposium
October 25-27, Sao Paulo, Brazil: www.gartner.com/br/symposium
November 7-10, Barcelona, Spain:www.gartner.com/eu/symposium
November 14-17, Gold Coast, Australia:www.gartner.com/au/symposium
November 21-23, Mumbai, India: www.gartner.com/in/symposium
Contacts:
![]() |
| Statement from Brad Smith, General Counsel and Executive Vice President, on the European Commission's decision to approve Microsoft's acquisition of Skype. |
![]() |
| |
REDMOND, Wash. – Oct. 7, 2011 – The following is a statement by Brad Smith, General Counsel and Executive Vice President, Microsoft Corporation, regarding the European Commission’s decision to approve Microsoft’s acquisition of Skype: We’re pleased that the European Commission has approved Microsoft’s acquisition of Skype. This is an important milestone, as we’ve now received clearance from both the United States and the European Union. We look forward to completing soon the final steps needed to close the acquisition, bringing together the employees of Microsoft and Skype, and creating new opportunities for people to communicate and collaborate around the world. |
New Anti-Bot Software Blade Stops Bot Attacks on Every Gateway Using Advanced Discovery Technology
CALGARY, AB - October 6, 2011 - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, recently announced a new Anti-Bot Software Blade that protects against bots and APTs (Advance Persistent Threats). A bot is malicious software that enables cybercriminals to take over computers and execute illegal activities -- such as stealing data, gaining access to unauthorized network resources, initiating Denial of Service (DoS) attacks or distributing spam. Bots are remotely controlled, typically disguised and operate without the users' knowledge. Check Point's new Anti-Bot Software Blade helps customers discover bots and prevent damages by blocking communication between infected hosts and remote operators. The new solution will be integrated into every gateway to provide businesses with multi-layered bot prevention against malware threats, with high traffic performance of over 40 Gbps -- ensuring all channels of business communication remain secure.
Bots can create a dramatic increase in malware attacks, resulting in significant brand damage, data loss and financial costs to businesses. Botnets, such as Zeus and Mariposa, are infamous forms of malware used to execute cybercriminal activities, such as stealing banking information or executing DoS attacks. While there have been several highly publicized botnets, most attacks are hard to identify and can proliferate silently without an organization's knowledge. Cybercriminals today are implementing a variety of stealthy techniques to avoid detection - often disabling PC antivirus software to hide their presence or leveraging encryption and alternative protocols to masquerade as legitimate traffic. Bots are also often used as tools in targeted attacks known as Advanced Persistent Threats (APT), such as Stuxnet and Operation Aurora.
Check Point's new Anti-Bot Software Blade is designed to stop bots in their tracks by leveraging advanced technology that helps businesses discover, remediate and prevent future threats. The solution features Check Point's Multi-tier ThreatSpect™, a unique detection engine that analyzes traffic on every gateway, identifies millions of outbreak types and discovers bots by correlating multiple risk factors -- such as botnet patterns, remote operator hide-outs and attack behaviors. When a bot is identified, customers can quickly analyze their level of risk through intuitive dashboards that highlight bots and their business implications - such as data loss or an increase in fraudulent spam distribution. Check Point's Anti-Bot solution provides administrators with the information they need to investigate infections with extensive forensic capabilities - helping security teams enforce multi-layered protection and accelerate remediation time.
"With bot toolkits for hackers selling today for the mere price of $500 and attacks costing businesses millions of dollars, it gives people insight into how big the problem has become. As seen with Mariposa, TDL-4 and Zeus, botnets are stealthy in nature and have the potential to infect millions of computers," said Paul Comessotti, Check Point’s Canadian Regional Director. "While thousands of companies have already been targets of bots and APTs, businesses have the responsibility to stop it from spreading. Our new Anti-Bot solution is focused on bot prevention, empowering customers to quickly discover and block bots, before they can threaten security or the flow of business."
In addition to Check Point's advanced discovery technology, the Anti-Bot Software Blade revolutionizes bot prevention by providing customers with unique, multi-layered protection on every gateway by integrating with existing security protections, such as Intrusion Prevention, Antivirus & Anti-Malware and URL Filtering. For the first time in the industry, businesses benefit from a unified bot prevention solution, while delivering high traffic performance of up to 40 Gbps.
"Because bots are stealthy in nature and designed to manipulate the user, many companies aren't aware when a computer is infected and their security team often lacks proper visibility into the threats that botnets create," said Jon Oltsik, senior principal analyst at Enterprise Strategy Group. "Check Point's new Anti-Bot Software Blade is a promising offering for organizations looking for a solution that discovers bot infections across multiple layers of the network and can help them analyze their security risks in business terms."
Key Features and Benefits of the Anti-Bot Software Blade:
· Innovative and Multi-tier Bot Discovery -- Check Point's multi-tier ThreatSpect™ engine analyzes network traffic through the gateway for inline prevention, correlating multiple risk factors to uniquely discover bots. Customers benefit from instant bot intelligence with Check Point's ThreatCloud™, a repository that pushes automatic threat updates to the Anti-Bot Software Blade, making it easy for businesses to enforce protection against the latest generation of threats.
· Preemptive Protection -- Helps businesses prevent bot damages by blocking communication between the infected machine and the command and control (C&C) servers before a cybercriminal can take control of the network.
· Forensics and Reporting -- Enables customers to analyze risk through malware reports and dashboards providing infection summaries. Customers have the ability to drill-down into specific bot incidents, investigating infections with extensive forensic capabilities, and easily assess potential damages.
· Integrated Prevention -- The Anti-Bot Software Blade is designed to easily integrate with customers' existing security protections, including: Intrusion Prevention that protects against emerging vulnerabilities; Antivirus & Anti-Malware that prevents file transfers of malicious viruses; and URL Filtering that blocks access to malicious sites. With an integrated, multi-layer solution, Check Point helps customers consolidate security, while protecting their business against bots across all layers of the network.
· Central Management -- Central policy management through the Software Blade Architecture™ simplifies management complexity with a holistic view of the network.
To learn more about how Check Point revolutionizes the fight against bots, listen to the webcast with Gil Shwed, founder, chairman and CEO of Check Point, as he introduces the new solution to the market: www.checkpoint.com.
"Our new Anti-Bot Software Blade is a breakthrough in bot prevention. We're making it easy for customers to enforce Anti-Bot protection across all layers of the network and prevent their businesses from being exploited," said Comessotti.
Additional Resources:
· Infographic: Botnets - The Stealthy Online Threat -- http://bit.ly/oHvrjl
· Video: The Threat of Bots and Botnets -
· Video: The Anti-Bot Software Blade -
· Visit Check Point's Botnet Threat resource page for the latest anti-bot news and information: http://www.checkpoint.com/products/anti-bot-software-blade/anti-bot-software-blade-landing-page.html
Availability
The Anti-Bot Software Blade will be available for purchase through the Check Point worldwide network of value-added resellers in the first quarter of 2012. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/.
-30-
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
©2011 Check Point Software Technologies Ltd. All rights reserved.
IBM to Provide Human Resource Services to Air Canada
ARMONK, N.Y. – 06 October 2011 – IBM (NYSE: IBM) today announced that it has signed an agreement to provide human resource (HR) business process services to Air Canada (TSE: AC.A, AC.B)
----------------------------
Check Point Introduces New Family of Software Blade Gateways, Delivering Unmatched Security, Power and Leading Performance to Businesses of All Sizes
CALGARY, AB - October 6, 2011 - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, recently unveiled a new family of security appliances to customer and partners during a live webcast with Gil Shwed, founder, chairman and CEO. The seven new appliances are optimized for Check Point's Software Blade Architecture™ and offer approximately three times higher performance than their predecessors. Check Point's new line of appliances, from the desktop 2200 model up to the 21400 model, offers a range of price and performance that starts at $3,600 and scales up to 100 Gbps of firewall throughput and up to 2,900 SecurityPower™ units (SPUs), a new metric for security performance recently announced. In addition, the new security appliances are designed to support the new 64 bit operating system and enable customers to benefit from consolidated security, simplified management and unique mobile access features. From small businesses to large enterprises and data centers, Check Point provides customers with a powerful platform to build their 3D Security blueprint.
"In a world where all industries and organizations face an ever-increasing number of sophisticated threats, there is a need for a stronger security solution to control network access, prevent data loss and protect against web-based threats," said Paul Comessotti, Check Point’s Canadian Regional Director. "With our latest line of appliances, customers can achieve new levels of integrated protection with the higher connection capacity and triple performance needed to power their business."
With the new family of appliances, Check Point is introducing the broadest range of security solutions to help businesses of all sizes overcome the myriad of threats in modern day IT environments -- integrating more security functions, while improving bandwidth and accelerating network speeds. The new security appliances -- which include seven new models, the 2200, 4200, 4600, 4800, 12200, 12400 and 12600 appliances, as well as the powerful 21400 Appliance recently announced on August 2 -- are all designed to optimize Check Point's award-winning Software Blade Architecture™ and support the company's vision for 3D security, combining policies, people and enforcement for unbeatable protection. With advanced multi-core technology, customers benefit from outstanding performance of 3 to 100 Gbps in firewall throughput, 2 to 21 Gbps in IPS throughput and 114 to 2,900 SecurityPower Units (SPUs) -- providing businesses with the trusted security they need and the performance levels they want.
Check Point's high-performing appliances are designed to support any combination of software blade protections, including: Firewall, VPN, Intrusion Prevention, Application Control, Mobile Access, Data Loss Prevention, Identity Awareness, URL Filtering, Anti-spam, Antivirus, Advanced Networking and Acceleration, as well as Check Point's new Anti-Bot Software Blade. By consolidating security into a single, integrated solution, organizations of all sizes have the flexibility to customize their security infrastructure based on the precise level of protection and performance needed in any environment -- today and as their businesses grow.
"Many customers are looking for an integrated approach to security that can evolve with their business without breaking the budget," said Chris Christensen, vice president, Security Products and Services at IDC Research. "The combination of Check Point's high-performing appliances and extensible software blade protection is a flexible solution that helps businesses plan for future security needs."
Key Features and Benefits of Check Point's New Appliances:
· 2200 Appliance -- A branch and small office solution in an enterprise-grade desktop package reaching 3 Gbps firewall performance, 2 Gbps IPS throughput and 114 SPUs - providing leading price/performance starting at $3,600.
· 4200 Appliance -- An entry-level enterprise security appliance ideal for small and mid-size businesses, with 3 Gbps firewall throughput, 2 Gbps IPS throughput and 114 SPUs, in addition to a variety of copper and fiber connectivity options.
· 4600 Appliance -- An enterprise security appliance with superior networking performance, achieving 374 SPUs, 9 Gbps of firewall performance and 4 Gbps IPS throughput - providing four times higher performance than other solutions in the same price range.
· 4800 Appliance -- An enterprise security appliance, achieving up to 623 SPU, 11 Gbps of firewall performance and 6 Gbps IPS throughput for outstanding multi-blade performance with 10 Gb fiber connectivity options.
· 12200 Appliance -- A 1U data center-grade security appliance reaching 738 SPU, 15 Gbps firewall performance and 8 Gbps IPS throughput with optional system redundancy of power supply and hard drives. In addition, the 12200 supports
Check Point VSX with up to 10 virtual systems.
· 12400 Appliance -- A data center-grade security appliance that achieves 1,046 SPUs, 25 Gbps of firewall performance and 12 Gbps IPS throughput, providing three times the performance and double the port density than other solutions in the same price range. Check Point's 12400 Appliance supports Check Point VSX with up to 50 virtual systems.
· 12600 Appliance -- The larger data center-grade security appliance model raises the bar with higher connection capacity and achieves up to 1,861 SPUs, 30 Gbps firewall performance and 17 Gbps for IPS throughput - delivering superior SecurityPower for optimal software blade performance. The 12600 also allows customers to support up to 150 virtual systems with Check Point VSX.
· 21400 Appliance (announced August 2011) -- A 2U data center solution that combines high-speed networking technologies with lightning fast firewall throughput of up to 100 Gbps, IPS throughput of up to 21 Gbps and 2,900 SPUs. The 21400 also includes high port density of up to 37 ports or 12 10GbE ports, enabling customers to easily secure highly-segmented network environments. The 21400 also allows customers to support up to 250 virtual systems with Check Point VSX.
Each new appliance includes Check Point's market leading security management software and the company's Mobile Access Software Blade that enables secure connectivity of smartphones, tablets and other mobile devices.
To learn more, listen to the webcast with Gil Shwed, founder, chairman and CEO of Check Point, as he introduces the new family of appliances to the market: www.checkpoint.com.
"Our focus remains on providing our customers with the highest level of security, while integrating and simplifying their security. With systems that are three times faster, customers can continue to elevate their security, without sacrificing performance." said Comessotti.
Additional Resources:
· Video: Check Point Unveils New 2012 Appliance Models --
· Learn more about SecurityPower™ and leverage Check Point's Appliance Selection Tool to help customers determine which appliances best meet their network security needs:http://www.checkpoint.com/products/securitypower/
Pricing and Availability
The new Check Point appliances are available immediately. Pricing begins at $3,600. For more information on product features and specifications, please visit: http://www.checkpoint.com/products/appliances/index.html.
- 30 -
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
©2011 Check Point Software Technologies Ltd. All rights reserved.
OTTAWA-GATINEAU, Oct. 5, 2011 /CNW/ - Today, the Canadian Radio-television and Telecommunications Commission (CRTC) announced that its fact-finding exercise on the nature and implications of online and mobile broadcasting activity produced inconclusive results. The CRTC will continue to monitor the evolving communications environment, and this growing activity will be the main focus of its annual consultation with the broadcasting industry in November 2011.
On May 25, 2011, the CRTC launched a fact-finding exercise on online and mobile programming services and their impact on the Canadian communications system. While not containing any clear evidence, the responses filed indicate that:
As part of its ongoing efforts to track trends in technology and consumer behaviour, the CRTC will hold another fact-finding exercise in May 2012.
Results of the fact-finding exercise on the over-the-top programming services
http://www.crtc.gc.ca/eng/publications/reports/rp1110.htm
The CRTC
The CRTC is an independent public authority that regulates and supervises broadcasting and telecommunications in Canada.
Reference documents:
News release, "CRTC seeks information on online broadcasting services," May 25, 2011
http://www.crtc.gc.ca/eng/com100/2011/r110525.htm
Broadcasting and Telecom Notice of Consultation CRTC 2011-344
http://www.crtc.gc.ca/eng/archive/2011/2011-344.htm