TITLE

Check Point lays out VPN roadmap

AUTHOR(S)
Messmer, Ellen
PUB. DATE
April 1999
SOURCE
Network World;04/05/99, Vol. 16 Issue 14, p51
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Reports on Check Point Software Technologies' virtual private network (VPN) product-direction roadmap. Support for the company's VPN-1 gateway; Plans for open public key infrastructure; Method considered for selective encryption of the VPN-1 gateway.
ACCESSION #
2601101

 

Related Articles

  • Check Point To Open VPN Software. Spangler, Todd // Inter@ctive Week;08/02/99, Vol. 6 Issue 31, p10 

    Reports the plans of Check Point Software Technologies to enrich its virtual private network (VPN). Purpose of the improvement; Role of the Open Security Alliance partner-certification program for the VPN expansion; Features of the VPN; Details of the trend among VPN vendors.

  • Link your private network to the Net. Sheshunoff, Alex // ABA Banking Journal;Jan2000, Vol. 92 Issue 1, p54 

    No abstract available.

  • Check Mate. Hotch, Ripley // Communications News;Apr99, Vol. 36 Issue 4, p10 

    Profiles Deborah Triant Rieman, founder, president and chief executive officer of Check Point Software Technologies Ltd. Educational background of Rieman; Management and technology experiences; Information on the company's adoption of virtual private network (VPN) as part of their security...

  • Checkpoint sets boundaries. Harrison, Ann // Software Magazine;Jul97, Vol. 17 Issue 7, p114 

    Features how Checkpoint Software Technologies proved that the future lay in enterprise network security management. Launching of the Open Platform for Secure Enterprise Connectivity (OPSEC); Need for standardization, openness and interoperability in the security industry as pointed out by Ted...

  • Module taps stored data. Gonsalves, Chris // eWeek;07/17/2000, Vol. 17 Issue 29, p45 

    Focuses on the release of the UserAuthority network gateway module by Check Point Software Technologies Inc. to emphasize its focus on firewall software products for computer security. Features of the UserAuthority module.

  • Checkpoint Targets Mid-Sized Enterprises. Krapf, Eric // Business Communications Review;Oct2003, Vol. 33 Issue 10, p62 

    Features the Checkpoint Express, an enterprise network security system from Checkpoint. Product design; Price of the product; Evaluation of the system.

  • Taking over the low end.  // InfoWorld;12/14/98, Vol. 20 Issue 50, p72 

    Features low-end computer network firewall appliances from Check Point Software. Check Point's partnership with two hardware vendors to integrate FireWall-1 into their devices; Development of the VPN-1 RemoteLink tool; Integration of FireWall-1 into Nortel's Contivity Extranet Switch.

  • Management System Enhanced. Spangler, Todd // Inter@ctive Week;10/19/98, Vol. 5 Issue 40, p16 

    Focuses on the enhanced versions of Meta IP, an Internet Protocol (IP) address management system from Check Point Software Ltd. Details on the enhanced features of Meta IP; Information on companies that migrated to IP-based networks.

  • Check Point controls VPNs. Fonseca, Brian // InfoWorld;03/05/2001, Vol. 23 Issue 10, p12 

    Unveils Check Point Software Technologies' enhanced virtual private network solutions. Benefits of Visual Policy Editor, a policy management tool; Features of Check Point's SecureUpdate product; Trend the Check Point's VPN solution signals.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics