You searched for Check Point Software | SC Media

Your search for Check Point Software returned 10 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Older than 2 years remove
Group Test remove

Your search for Check Point Software returned 10 results

Sort Results:

Relevant Recent
Group Test

Wireless security (2006)

The benefits of using wireless networking are matched by an expanding range of threats. But for each one there is now a product that will protect your corporate systems. Christopher Moody reports
Group Test

NAC tools

Despite the many security advantages of using 802.1x, very few organizations have yet to adopt and leverage the user authentication components.
Group Test

Policy Management 2007

Policy management is no simple task, and as laws and industry regulations change, the task of ensuring policy compliance is often a quickly evolving one, reports Justin Peltier.

Group Test

Email security

There’s been a lot of convergence in email security and content management tools. Look for the granular differences, says Nathan Ouellette.
Group Test

Event management 2006

You have to be aware of security breaches to be able to act on them. Peter Stephenson looks at a range of appliances and software options that monitor data and raise the alarm if something's amiss.
Group Test

Emerging products: Online fraud

Internet fraud is the crime of the 21st century, but these new tools, most originating from outside the United States, can bolster your enterprise’s defenses, says Peter Stephenson.
Group Test

SSL VPNs (2005)

Not long ago, these products were geared to extending specific applications to an enterprise's remote users. But Jon Tullett is pleasantly surprised at how vendors have rounded out their offerings
Group Test

Endpoint Security

The tools that caught our attention most strongly fit the mold of big data, cloud computing and machine learning.
Group Test

Web filtering (2005)

Every company needs to know what's coming in and going out on the web, which is why we have web policies. But enforcing those policies requires flexibility and capability, discovers Christopher Moody
Group Test

Endpoint security

A range of tools – both old school and next-generation –enable administrators to fortify enterprise environments to prevent data loss, says Peter Stephenson.