Network Security: Protecting Your Business

Posted

NEWS AND NOTES Network Security: Protecting Your Business (NAPSA)—The Y2K “crisis” has come and gone—hbarely regis- tering on the corporate land- scape—leaving companies free to address a more serious, and realistic, problem: network security. Not long ago, many network managers believed that installing a basic firewall delivered ade- quate security. But today, the Internet extends deep into many corporations, blurring the line between private and public net- works. As the Internet touches more elements of the network, a corporation’s security deployment must keep pace to guarantee the protection of all network resources and business communications. In order to meet the dual, often conflicting demands of providing both security and openness, a corporate security infrastructure must encompass all elements of business: networks, systems, applications and users. Just as a1" Systems Applications New security systems can help keep networks safe without restricting employee access. The SVN architecture elimi- nates the need to deploy a patchwork security solution comprised of multiple, non-integrated products. It was designed to meet the security, reliability and manage- ability requirements of demand- ing e-business environments, incorporating firewall security, virtual private networks, Internet importantly, security must not address management and more. Even with “bulletproof” security, users and applications must that relies upon limiting access to network. For example, with SVN, restrict the openness andaccessibility of the network. Any strategy services, users and network re- sources is doomedtofail. Fortunately, there are now solutions available to provide a comprehensive, integrated framework for deploying and managing an Internet security implementation. For example, Check Point’s Secure Virtual Network (SVN) architec- ture enables security managers to define and enforce a single policy that incorporates all aspects of network security—servers, desktop PCs, remote clients, cell phones, personal digital assistants and more. receive the necessary performance to maximize the usefulness of the partners are able to access “extranets” from within the corporate network, while remote users can safely log in from their lap- tops or PDAs. Delivering the right quality of service is imperative to maintain- ing the performance andutility of the enterprise network, and a comprehensive security solution can help keep business running smoothly. To learn more about Check Point’s Secure Virtual Network architecture, visit the website at www.checkpoint.com.