Media releases are provided as is by companies and have not been edited or checked for accuracy. Any queries should be directed to the company itself.

Check Point VPN Secures Remote Access for Apple iPhone

  • 04 June, 2008 15:53

<p>When deploying any device for corporate use, IT faces the challenge of safeguarding the traffic in and out of the private network. Check Point VPN-1 supports the L2TP client embedded in all current and future iPhone versions, giving customers immediate IPsec virtual private network (VPN) access to corporate servers. Customers can send and receive email and utilise company resources, including internal Web portals, file servers and IP-based corporate applications, without the need for additional software on the iPhone.</p>
<p>“With the success of the iPhone, IT departments received multiple requests to connect the new devices to the corporate network,” said Scott McKinnel, Regional Director, ANZ at Check Point. “The diversity of personal equipment in the work place makes the enforcement of security policies difficult. We offer security solutions and single management across the many endpoint devices available to corporate professionals. For the iPhone, Check Point created a simple configuration that provides instant, secure connectivity through VPN-1 gateways.”</p>
<p>With VPN-1 administrators can take advantage of a shared secret password and certificates for all iPhones on the network with specific login credentials for each end user. The feature eliminates the need for IT to create separate gateway authentication keys for each device, easing the deployment of iPhones on the network. Check Point VPN-1 support for the iPhone provides customers with the ability to utilise IP-based encryption for transmitting sensitive and private corporate data.</p>
<p>To give iPhone users secure corporate network access, VPN-1 customers can download and install the latest VPN-1 update at iPhone users can then configure access to the corporate network using three easy steps – entering basic VPN settings, activating the iPhone VPN, and then entering their password. More detailed documentation is available with the update.</p>
<p>Check Point VPN-1 is the industry’s leading integrated firewall, VPN and intrusion prevention software designed to protect corporate networks of all sizes. VPN-1 enables customers to choose from accelerated security, unified threat management (UTM) security or virtualised security – all with a unified architecture that is managed and maintained from a single console. Used by the Fortune 500, VPN-1 software delivers continuous protection against new attacks through its SmartDefense® services. To learn more about VPN-1 go to</p>
<p>“As more iPhones make their way into the network, Check Point VPN-1 ensures the communication between the devices and servers remains secure,” concluded McKinnel.</p>
<p>About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. ( is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customised to fit customers’ dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.</p>
<p>Check Point’s pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organisations of all sizes.
Across Australia and New Zealand Check Point has offices in Sydney, Melbourne, Brisbane, Canberra and Wellington to support its network of distributors and resellers. Check Point solutions are distributed through Westcon in Australia and New Zealand and Firewall Systems in Australia.
Additional information can be obtained by visiting or by contacting Check Point on +61 2 9493 6000.</p>
<p>©2003–2008 Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point Endpoint Security on Demand, Check Point Express, Check Point Express CI, the Check Point logo, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, CoSa, DefenseNet, Dynamic Shielding Architecture, Eventia, Eventia Analyser, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IPS-1, IQ Engine, MailSafe, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management, Power-1, Provider-1, PureAdvantage, Safe@Home, Safe@Office, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Sentivist, SiteManager-1, SmartCenter, SmartCenter Express, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Express, VPN-1 Express CI, VPN-1 Power, VPN-1 Power, VPN-1 Power Multi-core, VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, and 7,165,076 and may be protected by other U.S. Patents, foreign patents, or pending applications.</p>

Most Popular