Integrity was integrated with network gateways (the Cisco VPN 3000 series) to ensure that a PC met security requirements before it was granted access to the network.ĭemand for endpoint security grew in 2003 after the SQL Slammer and Blaster computer worms reportedly caused extensive damage, despite widespread use of antivirus software on personal computers. The Integrity software, released in early 2002, was derived from the ZoneAlarm security technology and added central policy management and network access control functions. an intrusion prevention system (IPS) Check Point Intrusion Prevention System – IPS Īn administrator manages the security policies that apply to groups of users from a central console and server.Ĭheck Point acquired the Integrity software as part of its acquisition of endpoint security start-up Zone Labs in 2004.application controls that block or terminate malicious software programs before they can transmit information to an unauthorized party.network access controls that detect and remedy security policy violations before a PC is allowed to connect to a network.The software aims to stop new PC threats and attacks before signature updates have been installed on the PC.
It is designed to protect personal computers and the networks they connect to from computer worms, Trojan horses, spyware, and intrusion attempts by hackers. Check Point Integrity is an endpoint security software product developed by Check Point Software Technologies.