CCS has several partners in the Network security space. CSS's partners in network security range from industry leaders to niche solution providers with differentiated technology.
Learn MoreNetwork security is a broad subject. By definition, network security consists of the provisions and policies adopted by the network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of the computer network and network-accessible resources. However to secure a network customer can implement Firewalls and Virtual Private Network (VPN) appliances, Intrusion Prevention Systems (IPS), Network Admission Control (NAC), Web Content Filtering, SPAM Filtering, Antivirus and much more. The degree to which an organization secures its network varies depending on the sensitivity of the information stored on that organizations network.
Check Point Software Technologies Ltd., the worldwide leader in securing the Internet, provides customers with uncompromized protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented Stateful Inspection Technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization.
Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point’s award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
Fortinet is a global leader and innovator in Network Security. Fortinet provide network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of Fortinet’s custom ASICs, hardware systems, network software, management capabilities and security research, they have a large, rapidly growing customer base, including the majority of the Fortune Global 100, and Fortinet continues to set the pace in the Network Security market. Fortinet’s market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide.
Fortinet’s flagship Network Security platform, FortiGate, consists of physical and virtual appliances that provide a broad array of security and networking functions, including firewall, VPN, anti-malware, intrusion prevention, application control, Web filtering, anti-spam, DLP, WAN acceleration, and WLAN control. FortiGate appliances, from the FortiGate 30D and 90D for small businesses all the way up to the FortiGate 3000 and 5000 series for large enterprises, data centers, and service providers, are based on a common proprietary technology platform.
By combining the security expertise of McAfee with the innovation, performance, and trust of Intel, McAfee Next Generation Firewall (NGFW) protects enterprise networks with high-performance, intelligence-aware security controls supported by real-time updates from McAfee’s Security Connected ecosystem. This enables McAfee to deliver the industry’s best evasion prevention along with complete next-generation firewall protections when and where you need it—remote sites, branch offices, data centers, and the network edge.
The McAfee Next Generation Firewall solution starts with a solid foundation of protections, including granular application control, intrusion prevention system (IPS), built-in Virtual Private Network (VPN), and deep packet inspection—all in an efficient, extensible, and highly scalable unified design. Then McAfee adds powerful anti-evasion technologies that decode and normalize network traffic—before inspection and across all protocol layers—to expose and block the most advanced attack methods.