InvestorsHub Logo
Followers 145
Posts 27586
Boards Moderated 3
Alias Born 02/07/2004

Re: None

Tuesday, 05/03/2005 9:08:10 AM

Tuesday, May 03, 2005 9:08:10 AM

Post# of 165
Check Point Announces Support for Trusted Network Connect ''TNC'' Architecture to Protect Networks, Systems and Data from Viruses, Malware and Other Attacks
Tuesday May 3, 8:30 am ET


LAS VEGAS--(BUSINESS WIRE)--May 3, 2005--Check Point® Software Technologies Ltd. (Nasdaq: CHKP - News), the worldwide leader in securing the Internet, today announced support for the Trusted Network Connect (TNC) architecture. Check Point Software's Integrity(TM) product line will be demonstrating its support for the TNC architecture this week in Booth 1075 at Networld+Interop, Mandalay Bay Hotel, Las Vegas.
When implemented in products, TNC determines the health and security of clients connecting to networks and controls network access based on pre-determined policies. The architecture is intended to support multi-vendor environments.

TNC has been developed by Check Point Software and more than 60 other members of the Trusted Computing Group (TCG), whose open specifications help vendors build products that protect critical data and information. More information about the open, non-proprietary TNC architecture and the first two specifications are available free of charge on the TCG website.

"We want network administrators to have choices in products and services for endpoint integrity in heterogeneous operating environments," noted Paul Weinstein, vice president business development, Check Point Software Technologies. "We support the TNC architecture and TCG's open and non-proprietary approach to determining client health and access to the network."

The TNC architecture provides a common framework for endpoint configuration enforcement based on system integrity and identity, with the option of incorporating the added security provided by Trusted Platform modules based on TCG specifications. The first phase of the architecture will offer two standardized APIs to address the exchange of compliance data and results between systems requesting network access and policy decision points.

About TCG

TCG is an industry standards body formed to develop, define, and promote open standards for trusted computing and security technologies, including hardware building blocks and software interfaces, across multiple platforms, peripherals, and devices. TCG specifications are designed to enable more secure computing environments without compromising functional integrity with the primary goal of helping users to protect their information assets from compromise due to external software attack and physical theft. More information and the organization's specifications are available at the Trusted Computing Group's website, www.trustedcomputinggroup.org.

http://biz.yahoo.com/bw/050503/35257.html?.v=1

Midas
Volume:
Day Range:
Bid:
Ask:
Last Trade Time:
Total Trades:
  • 1D
  • 1M
  • 3M
  • 6M
  • 1Y
  • 5Y
Recent CHKP News