Check Point's Industry-Leading Security Solutions Obtain U.S. Government and Internationally Recognized Certifications
SAN CARLOS, CA -- (Marketwired) -- 05/29/13 -- Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced the distinction of earning several notable U.S. Government and International certifications for its security appliances and software. As an established leader in security technology, Check Point's security products consistently meet and often exceed the stringent requirements set by the U.S. Government, the U.S. Department of Defense (DOD) and other internationally recognized organizations.
Check Point's solutions are essential tools that help customers protect critical infrastructure and sensitive data with the highest levels of security and confidentiality. Through continuous and rigorous testing, the strength of Check Point's products is recognized through the following certification efforts:
U.S. Department of Defense Approved Products List (APL): Through certification by the Defense Information Systems Agency (DISA) Unified Capabilities Connection Office (UCCO), Check Point appliances are now listed on the DISA Approved Products List. Check Point has fulfilled Interoperability (IO) and Information Assurance (IA) certification requirements and is approved for use on the U.S. DOD Networks.
Common Criteria (CC) Evaluation Assurance Level 4+ (EAL4+): Check Point provides the only security gateways certified at EAL4+ conformant with three U.S. Government protection profiles and the latest National Institute of Standards and Technology (XLK) (NIST) cryptographic strength recommendations. Additionally, Check Point provides the only security gateway certified to Medium Robustness on the National Information Assurance Partnership (NIAP) - Common Criteria Evaluation and Validation Scheme (CCEVS) Validated Product List, accredited through completion of U.S. Government penetration testing.
Federal Information Processing Standard (FIPS) 140-2: The cryptographic modules used throughout Check Point's security products are routinely validated against FIPS 140-2, the U.S. government computer security standard used to accredit cryptographic modules.
Internet Protocol version 6 (IPv6) Requirements: Check Point Security Solutions conform to capability requirements and interoperability standards of IPv6, the latest revision of the Internet Protocol (IP). These requirements and standards are defined by the US Government USGv6, the U.S. DOD IPv6 Profile and the International IPv6 Ready Logo Phase-2 program.
"At Check Point, we are proud of the certifications conferred to our industry-leading security solutions. These distinctions highlight Check Point's leadership and continued innovation in building unmatched security products," said Dorit Dor, vice president of products at Check Point. "These U.S. Government and International certifications underscore Check Point's proven technologies and emphasize the company's established record of security leadership."
For more information on Check Point's certification efforts, visit: http://www.checkpoint.com/products/certifications/
Follow Check Point via
About Check Point Software Technologies Ltd. (CHKP)
Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
Source: Check Point Software Technologies Ltd.