Last month we announced that Check
Point Software Technologies had purchased our application database for use in
their products. According to Check Point, this technology will “… provide
businesses unparalleled granular control over application usage and enable
security administrators to prevent threats associated with the use of certain
Internet applications. Check Point will offer this new level of security
controls as a Software Blade that will be available for all gateways.” (read their
release here: )
This deal reaffirms our leadership
in the Web 2.0 security space. More importantly, it highlights the growing need
for network solutions that provide visibility and control at the application
level not just at the port & protocol level. Check Point sees this need and
will use our database to provide application level control. Application level
control will become the price of entry in the Firewall
But beyond visibility and control,
what enterprises are asking for is “enablement”.
- How do I allow access to Facebook or
LinkedIn and stay in compliance with FINRA or FERC or HIPAA or PCI or [insert
your favorite regulation here]?
- How do I allow access to YouTube
videos but not the inappropriate stuff?
- How do I allow access to blogs and
wikis and webmail but ensure that confidential information if not getting
Our customers realize they can’t
block access to the New Internet
- they must enable it.
Which is why our mission statement
reads “Secure & ENABLE the New Internet”
How are you and your organization enabling the new Internet? What tools and applications do you need to secure to effectively enable your team?