Ever since the company began, Check Point’s pure focus has been on I.T. security. Adapting to customers’ changing needs, the company has developed numerous technologies to secure the use of the Internet by corporations and consumers when transacting and communicating. In 2006, Check Point created a unified security architecture, using a single management console, unified security gateways and the first and only single agent for endpoint security. In early 2009, Check Point introduced another breakthrough security innovation with its Software Blade architecture: a dynamic, revolutionary architecture that delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment.
By April 2009, the Company completed the acquisition of the security appliance business from Nokia, after more than a decade of collaboration in delivering industry-leading enterprise security solutions.
In November 2009, Check Point acquired FaceTime Communications’ application database, adding security controls for over 50,000 Web 2.0 widgets and more than 4,500 Internet applications to our security gateways.
Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs.
Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.