SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Check Point Software (CHKP) -- Ignore unavailable to you. Want to Upgrade?


To: blankmind who wrote (2188)4/29/1998 4:58:00 PM
From: Rene Madsen  Read Replies (1) | Respond to of 7150
 
Not a chance. This is toy-strength software designed to run on and in an NT environment. You will find all heavy sites avoiding that particular platform for its demonstrated lack of stability, performance and security. As long as Unix is the dominant platform for industrial-strength corporate network the firewall will remain on that.

I think the decline these last days of CHKPF is 100% market play. Give it a month or two and you will see it back up where it belongs.



To: blankmind who wrote (2188)4/29/1998 8:04:00 PM
From: Maverick  Read Replies (1) | Respond to of 7150
 
Check Point's VPN Product Roadmap: Security

1) Security
Three key technologies comprise the security component of VPNs: access control to guarantee the security of network
connections; authentication to verify the identity of network users and data; and encryption to protect the privacy of
data. While most VPNs only address authentication and encryption, a VPN without access control is only protecting
the privacy of the data as it travels across the transport mechanism. Access control protects not only the data in
transmission, but also the corporation's entire wealth of intellectual property and information, ensuring that users
have full access to the applications and information they require, but nothing more. Access control is typically provided
by a firewall.

Today, Check Point's VPN solution, based on its market-leading Check PointT FireWall-1T enterprise security product
suite, includes:

Access control with FireWall-1;
User and data authentication through RADIUS and numerous strong, two-factor authentication schemes;
Support for multiple encryption schemes including manual IPSec, FWZ-1, SKIP and ISAKMP/Oakley;
SecuRemoteT client encryption software for secure remote access, extending the VPN to PCs and laptops
anywhere in the world;
Support for multiple platforms including UNIX and NT servers and internetworking devices from leading
hardware vendors.

Check Point will offer:

Entrust-ReadyT versions of its FireWall-1 VPN server software and SecuRemote client remote access
software providing integrated CA/PKI capabilities in Q2 1998;
Interoperability with leading CA and authentication vendors such as VeriSign and Security Dynamics through
the OPSECT enterprise security framework standard in Q2 1998, enabling customers freedom of choice in
deploying CA and authentication solutions;
Easy-to-use, easy-to-install PKI software bundled with Check Point's VPN solution, delivering a
standalone, shrinkwrapped product in Q3 1998;
Management of the PKI solution from Check Point's management GUI, delivering complete enterprise security
management including CA/PKI in Q3 1998.