Featured Story
Huawei 5G products not hurt by US sanctions – sources
Measures against China's biggest network equipment vendor have not had a noticeable impact on the quality of its products, Light Reading has learned.
Check Point Software expands endpoint security with VPN and firewall for Mac users
December 7, 2004
REDWOOD CITY, Calif. -- Check Point® Software Technologies Ltd. (NASDAQ:CHKP - News), the worldwide leader in securing the Internet, today announced the availability of Check Point VPN-1® SecureClient for the Mac OS X platform. This world-class, integrated, endpoint security solution is the industry's first, easy-to-deploy VPN client to incorporate a centrally-managed personal firewall for Mac OS X users.
With VPN-1 SecureClient, Mac OS X system administrators can now easily manage security for both their remote Mac OS X and remote Windows users. Featuring centralized management and personal firewall capabilities, VPN-1 SecureClient for Mac OS X ensures that mobile Mac users will not compromise network security or open up a back door into the corporate network. In addition, VPN-1 SecureClient is extremely easy to implement across a large, distributed workforce.
"The availability of VPN-1 SecureClient for Mac OS X users marks an important milestone in Check Point's Total Access Protection initiative to address the security needs of computer users everywhere," said Gonen Fink, vice president of solutions and strategy for Check Point Software Technologies. "With VPN-1 SecureClient, Mac OS X users can communicate and conduct business operations effectively from home or on the road without the worry that their computers are being corrupted or their networks compromised."
Check Point VPN-1 SecureClient for Mac OS X incorporates the benefits of Check Point's leading VPN and endpoint security in a single product. This single client solution allows security administrators to enforce desktop security policies on the network and push out a centrally-managed policy to remote users, enabling consistent endpoint security throughout an organization. This functionality is critical in protecting networks from an unauthorized user gaining access to the network through a mobile user's machine and network connection.
Check Point Software Technologies Ltd.
You May Also Like