Check Point rolls out unified security management

Check Point Software has unveiled the NGX platform, a unified security system to improve protection provided by the company's...

Check Point Software has unveiled the NGX platform, a unified security system to improve protection provided by the company's perimeter, internal and web security solutions.

NGX delivers new features and extended functionality to more than 20 Check Point products and provides additional core technologies such as application intelligence, SecureXL and Smart management architecture. 

Enhancements include unified and cheaper perimeter, internal and web security management, with administrators centrally defining and managing all lines of defence from a single console.

There are also expanded intelligent inspection technologies that secure more network and application types, including the confidentiality and availability of voice over IP communications. 

Advanced VPN capabilities, such as dynamic routing, allow enterprises to manage large and complex networks more efficiently with fewer resources, according to Check Point.

Chris Christiansen, an analyst at IDC, said, "The average enterprise customer is plagued with too many devices to manage, a corporate security policy that is difficult to enforce and monitor, and an inability to comprehend or respond to threats in real-time. 

"An intelligent approach would be to fully integrate management into the core architecture. With the NGX platform, Check Point is on the right track to deliver this capability to enterprise customers."

Check Point NGX will be available before the end of the month. Existing customers with a Check Point software subscription will be able to upgrade for free.

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT risk management

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close