Check Point blend ensures nodes meet security policies

Check Point Software Technologies Ltd. has integrated its VPN software with tools that check remote computers to ensure that they meet security policies, making it simpler to install endpoint security on computers accessing VPNs.

The software, called Check Point Integrity SecureClient, is the blending of its existing SecureClient VPN software with Integrity 5.0, a tool that scans remote PCs to see whether they have firewalls, updated antivirus software and the like. Integrity was written by Zone Labs, which Check Point bought earlier this year.

Because IPSec VPNs, such as those created by Check Point's VPN-1/Firewall-1 software, turn remote computers into nodes on corporate networks, computers carrying viruses, Trojan horses or other malicious software could infect the entire network.

Integrity enforces security policies set by network executives for the remote machines. Policies could specify that antivirus software be installed, that it is running and updated, that a personal firewall is installed, that it is running and properly configured and that operating systems are patched. If remote computers have to pass this screening before accessing VPNs, they are less likely to introduce harmful code.

Check Point Integrity Secure Client also bundles the separate personal firewalls that come with Integrity and SecureClient. Each had features the other lacked, but they are bundled to work in tandem within the new client, Check Point says.

The software also integrates the firewall with the VPN client so that when VPN policies are set, the firewall is automatically configured to allow the VPN connections, saving on administrative time.

Check Point says it still has some work to do on the integration. Accessing the client integrity portion of the software requires a different user interface than accessing the VPN portion. These interfaces will be merged in future releases of the software, Check Point says.

This story, "Check Point blend ensures nodes meet security policies" was originally published by Network World.

Copyright © 2004 IDG Communications, Inc.

Shop Tech Products at Amazon