We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Check Point's centralized endpoint security.
- Abstract
The article presents information on the centralized endpoint security strategy of Check Point. According to one Check Point executive, end-points can cause a huge headache for information technology (IT) staff whose job is to manage deployment of policies and controls for multiple security agents on each physical device. The article highlights six key functions that a single agent to be deployed should have such as detection and obstruction of malware and data security.
- Subjects
COMPUTER security; CHECK Point Software Technologies Ltd.; INFORMATION technology; COMPUTER science; HIGH technology industries personnel
- Publication
ComputerWorld Hong Kong, 2009, Vol 26, Issue 5, p60
- ISSN
1023-4934
- Publication type
Article