Check Point Software stories - Page 18

Check Point releases new software, hardware
Wed, 3rd Aug 2011
#
firewalls
#
hyperscale
#
dc
Check Point unveils the RF75.20 software blade for improved URL filtering, alongside new 21400 and 61000 hardware offerings for data centres and carriers.

Check Point's top ten
Thu, 21st Jul 2011
#
endpoint protection
#
edr
#
cybersecurity
Check Point reveals its 'top 10 trends for 2011' at exclusive lunch seminars in Auckland and Wellington, complete with demos.

Duo signs Check Point for New Zealand
Wed, 23rd Mar 2011
#
duo
#
distributors
#
analyst report
Duo New Zealand named distributor for Check Point’s security solutions, enhancing endpoint security with customizable, comprehensive options.

End to end protection
Thu, 1st Oct 2009
#
mdm
#
cybersecurity
#
personal computing devices
Amid escalating cyber threats, Scott McKinnel highlights the need for robust endpoint security to protect data across mobile devices.

Threats can be opportunities
Sun, 1st Oct 2006
#
risk & compliance
#
check point software
#
risk management
UTM redefines cyber security, merging tech to counter sophisticated threats, opening lucrative markets for savvy resellers.