Posted by: Tony Bradley
Check Point, compromise, data leak, facetime, Security, Social networking, Web 2.0
Web 2.0 tools and social networking services offer an increasing challenge for IT and security administrators tasked with balancing the productive flow of communications in real-time with the security risks of leaked and compromised data.
Check Point, a leader in network security appliances, has reached an agreeement with FaceTime Communications to acquire the use of its application classification and signature database. The deal enabes Check Point to expand the capabilities of its security appliances to monitor and restrict Web 2.0 and social networking activity.
Check Point vice president of corporate and business development, Bill Bailey, explained “In adding this capability to our product line, we researched the market – and identified FaceTime’s application database as the market leader. Incorporation of the purchased database will provide businesses unparalleled granular control over application usage.”
Kailash Ambwani, president and chief exeutive officer of FaceTime Communications noted “Check Point’s purchase of our database reaffirms FaceTime’s leadership in the Web 2.0 and application security market. With people and businesses interacting more than ever online the need for Internet application security is essential to protecting corporate networks.”