
Check Point® Software Technologies Ltd. (Nasdaq:CHKP), the worldwide leader in securing the Internet, today announced that Pointsec Protector®, as well as a new, optimized cryptographic module utilized in Pointsec PC® and Pointsec Mobile®, have received the Federal Information Processing Standards (FIPS) 140-2 certification.
"Encryption of data on endpoint devices such as laptops, smartphones and thumb drives, where information is the most vulnerable, is essential to any organization's data security plan," said Robert Egner, vice president of product management at Check Point. "These new FIPS certifications further solidify Check Point as a leading provider of data security solutions. Pointsec Protector, Pointsec PC and Pointsec Mobile continue to lead the industry with the highest number and level of security certifications, including Common Criteria, FIPS 140-2 and BITS."
To ensure that sensitive information remains secure, the U.S. National Institute of Standards Technology (NIST) developed the FIPS 140-2 data encryption standards, requiring data cryptograph modules and products to meet specific criteria and undergo rigorous testing. Certification is required before any vendor can offer encryption products to government entities, and because the FIPS-140-2 standard ranks among the most difficult to achieve, it is also often required by financial institutions and global organizations who handle sensitive data. Pointsec Protector, as well as the newly enhanced cryptography module for Pointsec PC and Pointsec Mobile, recently earned FIPS 140-2 certification, ensuring that Check Point customers benefit from the strongest and most advanced full-disk, mobile device and removable media encryption.
Check Point offers the most-widely deployed data protection solutions available today. The Pointsec products are quick and simple to deploy, scale to any size organization, proven in every type of industry and government agency around the world, and support the broadest set of mobile platforms. The company's Pointsec solutions completely protect data on laptops, desktops, PDAs, smartphones, USB drives, and other removable media by combining strong encryption with access control. This ensures all data remains protected, regulatory requirements are addressed and company image stays intact.
About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. The company is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point's PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Through its NGX platform, Check Point delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market leading data security solutions through the Pointsec product line, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm Internet Security Suite and additional consumer security solutions protect millions of consumer PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry's framework and alliance for integration and interoperability with "best-of-breed" solutions from hundreds of leading companies. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.
©2003-2007 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Provider-1, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.