InvestorsHub Logo
Followers 145
Posts 27593
Boards Moderated 3
Alias Born 02/07/2004

Re: None

Tuesday, 04/19/2005 8:39:51 AM

Tuesday, April 19, 2005 8:39:51 AM

Post# of 165
Check Point Granted Two Endpoint Security Technology Patents
Tuesday April 19, 8:31 am ET
Technologies Ensure Total Access Protection from Security Threats


REDWOOD CITY, Calif.--(BUSINESS WIRE)--April 19, 2005--Check Point® Software Technologies Ltd. (Nasdaq:CHKP - News), the worldwide leader in securing the Internet, today continues the company's legacy of innovation with two technology patents granted by the U.S. Patent and Trademark Office. Both patents are critical for protecting user access to corporate networks of all sizes by ensuring endpoint security and shielding computing resources against evolving Internet threats.

"With the introduction of these two unique technologies, we further illustrate our commitment to providing our customers with total end-to-end security solutions for today's dynamic networks. Mobile and remote computing platforms are rapidly gaining in popularity, and Check Point is working diligently to ensure we continue to develop the most trustworthy solutions available," said Gregor Freund, chief technology officer, Check Point Software.

Both patents are for technologies critical to protecting endpoint security devices such as personal computers, PDAs and remote servers as they interact with public or private networks.

Patent 6873988 entitled "System and Methods Providing Anti-Virus Cooperative Enforcement" was issued on March 29, 2005. This powerful Cooperative Enforcement technology protects networks from viruses, malware and other Internet-borne threats by requiring personal computers have up-to-date anti-virus software before allowing them to connect to valuable company resources and information.

Patent 6850943 titled "Security System and Methodology for Providing Indirect Access Control," issued on Feb. 1, 2005, describes mechanisms that ensure only trusted programs communicate over the Internet. This process prevents malware such as worms, viruses and Trojans from conducting malicious outbound communications, which can wreak havoc against other Internet-connected devices. The technology described in the patent will apply to products from both Check Point and the company's Zone Labs consumer business unit.

Check Point Total Access Protection

Check Point Total Access Protection (TAP) is an initiative that overlays endpoint security on each of the primary components of Check Point's enterprise security model -- Perimeter, Internal, and Web security. It provides a comprehensive framework for cooperation between endpoint security solutions and other security technologies in order to deliver optimal network protection. Additionally, the TAP initiative addresses the security posture of all types of network endpoints -- remote and internal, employee and guest, wired and wireless -- used to access network resources. By securing all the service endpoints used for network communications, from Web browsing and email to instant messaging and file sharing, Check Point protects against both network-level attacks and attacks on the endpoint's operating system.

History of Innovation

With the introduction of these two new technologies, Check Point reinforces its reputation for developing advanced technologies and expands its patent portfolio. Check Point is credited with holding the patent for Stateful Inspection, now the de facto standard for Internet security technology. Other Check Point patents of note include SecureXL(TM) and the patent-pending Malicious Code Protector(TM). SecureXL technology is a software interface that enables Check Point to leverage technologies from multiple silicon, appliance and computer system partners to accelerate the performance of firewall and VPN gateways by offloading simple, though computationally intensive, functions to third-party packet processors. Malicious Code Protector, a patent-pending technology from Check Point designed to detect buffer overflow attacks, enables customers to gain protection for their applications before a vulnerability can be exploited and before an attack can infect the target.

http://biz.yahoo.com/bw/050419/195377.html?.v=1

Midas


Volume:
Day Range:
Bid:
Ask:
Last Trade Time:
Total Trades:
  • 1D
  • 1M
  • 3M
  • 6M
  • 1Y
  • 5Y
Recent CHKP News