Tuesday, June 5, 2012

CHECK POINT PROVIDES IMMEDIATE PROTECTION AGAINST "FLAME" WORM

Check Point Software Technology- the worldwide leader in securing the Internet, provides innovative security solutions that meet real-time customer needs and help reduce security complexity. The IPS Software Blade stands as a testimony to its speed of resolution and protection from the unforeseen attack of ‘FLAME’. It provides immediate protection by detecting the presence of Flame malware and prevents its propagation.


The Flame malware, also known as SkyWiper and Flamer, is a modular suite of malicious software that is known to have been used for cyber-espionage in several Middle Eastern countries, whose impact is 20 times greater than the Stuxnet worm, discovered in 2010. Also all versions of Windows are susceptible to infection by Flame which makes the threat highly severe.

The breakthrough performance of Check Point Intrusion Prevention System (IPS) Software Blade provides a more effective and low-cost settlement than most stand-alone IPS solutions. Its proactive intrusion prevention capability is a perfect solution for infections caused by Flame.

“Check Point IPS Software Blade helps to tackle the irrecoverable data loss owing to the FLAME virus which has been a major cause of concern lately. We are generating the most immediate and effective solution in cyber security for our customers. Being an Industry-leading IPS and firewall, the IPS Software Blade is the most comprehensive, network-class next-generation firewall, suitable to combat FLAME at the network level. Our aim is to constantly work with an outlook of delivering innovative security solutions for our clients”, said Bhaskar Bakthavatsalu, Regional Director - India & SAARC at Check Point Software Technologies.

Today, Check Point Software Technologies continues to uniquely combine policy, people and enforcement to help in providing customers with flexible and simple solutions, that can be fully customized to meet the exact security needs of any organization and helps implement a blueprint for security that aligns with business needs.

Sourced From: Hanmer MSL