banner

Thales Partners

Check Point Software

Check Point Software

Check Point Software Technologies is a worldwide leader in offering Internet security solutions. Check Point specializes in providing customers with protection against all types of threats, featuring its pioneer FireWall-1 product and its patented stateful inspection technology. Check Point Software NGX R75 network security suite, based on software blade architecture, integrates with Thales Trusted Access and Thales Authentication Client, to secure users gaining access to networks remotely. Check Point Software  integrates with Thales's  Authentication products to provide users with secure network access and encryption solutions.

959 Skyway Road Suite 300 San Carlos California United States North Americas 94070

1-800-429-4391

NGX R75

NGX R75Remote AccessembeddedCheck Point Software NGX R75: Remote Access with Thales Authentication Solutions

Check Point Software NGX R75 provides four new software blades for Application Control, Identity Awareness, Data Loss Prevention, and Mobile Access. These enable businesses to gain greater visibility and control over data, Web 2.0 applications, and mobile access.

Trusted Access and Authentication Client bring additional security to NGX R75 for identifying users who are accessing networks, applications, and data remotely. Trusted Access and Authentication Client ensure only authorized users can gain access to protected applications and data by raising the level of minimal security provided by static passwords to the strong security of dynamic passwords provided with two-factor user identification.

Checkpoint Endpoint Security – FDE

Checkpoint Endpoint Security – FDE Database and File EncryptionembeddedCheckpoint Endpoint Security –FDE : Enpoints Encryption with Thales Authentication Client

Check Point Endpoint Security – FDE encryption provides superior encryption across a variety of endpoints, such as desktops and laptops. The Check Point Endpoint Security – FDE solution uses strong access control with pre-boot authentication (PBA). Encryption and decryption are completely transparent to the end user and are performed without hindering system performance.

Thales Authentication Client (SAC) is a PKI middleware application that provides a secure method for exchanging information based on public-key cryptography, enabling trusted third-party verification of user identities. 

Resources and Additional Information:

SAC Using CBA for Check Point Endpoint Security – FDE

 

Checkpoint Security Gateway

Checkpoint Security GatewayWeb Firewall and GatewayembeddedCheckpoint Security Gateway: Dynamic Virtualised Environments Protection with Thales Authentication Solutions

Check Point Security Gateway (Virtual Edition) protects dynamic virtualized environments and external networks, such as private and public clouds, from internal and external threats by securing virtual machines and applications with the full range of Check Point Software Blades.

Building on Thales’s award winning authentication service, Thales Trusted Access combines authentication and access management in a fully integrated cloud service. Our service lets you transform your business and operate securely in the cloud by preventing data breaches, simplifying access for users, and enabling compliance.

Our customers include over 25,000 organizations and 30 million users worldwide across all industries. Partnering with Thales for the long term, they trust our innovative access management and authentication services to help them securely adopt new ways of doing business on mobile, and in the cloud.

Thales Authentication Client (SAC) is a public key infrastructure (PKI) middleware that provides a secure method for exchanging information based on public key cryptography, enabling trusted third-party verification of user identities.

 

Resources and Additional Information: 

Thales Authentication Service (SAS) is now Thales Trusted Access (STA), for STA RADIUS integrations, please refer to STA RADIUS Integration guides page on Thales Customer Portal

SAC Using CBA for Check Point Security Gateway R77