While the Redwood City, Calif., company didn't detail any specific product plans, it said Wednesday that it intends to add features such as identity management and application security to its Web security products and internal firewalls. It will also add the ability to audit systems for regulatory compliance to its internal security products.
Get Up to Speed on...
Get the latest headlines and
company-specific news in our
expanded GUTS section.
The strategy, outlined at Check Point's annual industry analyst conference, is the latest move by a security company toand easily managed approach to securing corporate information systems.
In mid-October, network-protection company Internet Security Systems announced that it would deliver features, such as a firewall, an intrusion-detection system and antivirus technology,. A few days later, security software maker Network Associates announced that it would to help companies more easily manage devices and software.
Companies such as Cisco Systems, NetScreen, Nokia and Symantec have added to their security features such as secure networking technology based on the browser-level encryption technology Secure Sockets Layer (SSL).
Check Point's announcement confirms that integrating security is a trend that companies will be forced to follow, said Jeff Wilson, an industry analyst with technology watcher Infonetics Research.
"They have to be doing this," he said. "They have been taking a lot of flack recently because Check Point is known as the perimeter firewall company, and that's not very interesting."
The shift in strategy has been coming for a long time, Wilson said. However, he pointed out, the announcement lacks a lot of tangible details.
"I'm not knocking them," he said. "It's good to make these statements to change people's perceptions, but there is not a lot of meat here."
Check Point has already made some changes in the way that it's doing business.
In early October, the company took the wraps off its first. The network appliance, called the VPN-1 Edge, is aimed at branch offices, franchise locations and telecommuters and is designed to let companies centrally manage secure connections to off-site employees. The virtual private network (VPN) device plugs into the remote office's network or a telecommuter's computer, separating it from the Internet, and uses Check Point's firewall to secure against attack.
Check Point's Kraynak said that the company hasn't decided on whether to release Check Point-branded hardware devices as it ventures into Web security and internal security.
"When it makes business sense for us to do it, we will," he said.