Check Point Software Technologies responded to the mobility trend by offering three secure communications products.
For starters, Check Point has its IPSec VPN Software Blade for remote access. Scott Emo, Check Point's head of endpoint product marketing, says with the VPN software blade, IP security (IPsec) encrypts all communications from a mobile notebook at home or on the road across the Internet to an organization's enterprise network.
Emo says the Check Point VPN is always on, which means the user doesn't have to bring up a software client to access data. "All this requires is a single sign-on that takes the user right into the VPN," Emo explains.
The second product is Check Point's Mobile Access Software Blade. This product encrypts communications on most popular cell phones, as well as on any web portal. The software sits on a Check Point gateway; users download the client application from the various app stores. Access rights are granted based on the person's status. In a higher education setting, professors would have permission to access the grades database, while students would be granted access to library databases.
The final product is Check Point GO, which is a fully encrypted USB drive. A user can plug the GO drive into a notebook or desktop that is not the user's machine and bring up a virtual workspace. Users can access apps that the administrator sets up on the remote machine, or they can use productivity apps that they previously loaded onto the USB drive. Once the user finishes a session, the data is saved and encrypted on the USB drive for use at another location or back on the user's office computer.
— Joshua Mauk, Information Security Officer, University of Nebraska, Lincoln, Neb.
— David Sherry, Chief Information Security Officer, Brown University, Providence, R.I.
— Judith House, Associate University Information Security Officer, Georgetown University, Washington, D.C.