ÐÅÃÈÑÒÐÀÖÈß  |  ÍÎÂÎÑÒÈ  |  ÎÁÐÀÒÍÀß ÑÂßÇÜÊÀÊ ÏÈÑÀÒÜ ÏÐÅÑÑ ÐÅËÈÇ?  |  ÏÐÈÌÅÐ ÏÐÅÑÑ-ÐÅËÈÇÀ
“...Ñêðîìíîñòü - ñàìûé âåðíûé ïóòü ê çàáâåíèþ!”
     
Äîáàâèòü ïðåññ-ðåëèç
 

Check Point Software Technologies
Check Point Software Technologies

 

Ïîëíûé ñïèñîê ïðåññ-ðåëèçîâ êîìïàíèè:

 

Check Point ïîäâîäèò èòîãè 2009 è ïðåäñòàâëÿåò ðåøåíèÿ äëÿ îáåñïå÷åíèÿ íàöèîíàëüíîãî çàêîíîäàòåëüñòâà15-12-2009
Ìîäóëü øèôðîâàíèÿ ñîäåðæèìîãî äèñêà Ñheck Point Endpoint Security ïîääåðæèâàåò ïëàòôîðìó Mac OS X Snow Leopard êîìïàíèè…11-12-2009
Check Point ― ëèäåð «ìàãè÷åñêîãî êâàäðàíòà» Gartner Inc. íà ðûíêå çàùèòû ìîáèëüíûõ äàííûõ11-11-2009
Êîìïàíèÿ Check Point Software ñîîáùàåò î ðåêîðäíûõ ôèíàíñîâûõ ðåçóëüòàòàõ òðåòüåãî êâàðòàëà 2009 ãîäà05-11-2009
Ñheck Point Endpoint Security ïîääåðæèâàåò Windows 729-10-2009
Check Point ïîääåðæèò ñåññèþ ïî áåçîïàñíîñòè íà VMware VForum 200927-10-2009
ÊÎÌÏÀÍÈß check point ÑÎÎÁÙÀÅÒ Î ÐÅÊÎÐÄÍÛÕ ÔÈÍÀÍÑÎÂÛÕ ÐÅÇÓËÜÒÀÒÀÕ ÂÒÎÐÎÃÎ ÊÂÀÐÒÀËÀ 2009 ÃÎÄÀ03-08-2009
ÊÎÌÏÀÍÈß check point ÓÊÐÅÏËßÅÒ ËÈÄÅÐÑÒÂÎ Â ÎÁËÀÑÒÈ ÓÏÐÀÂËÅÍÈß ÁÅÇÎÏÀÑÍÎÑÒÜÞ ÁËÀÃÎÄÀÐß ÂÛÏÓÑÊÓ ÍÎÂÎÃÎ ÏÐÎÃÐÀÌÌÍÎÃÎ ÁËÅÉÄÀ24-07-2009
ÊÎÌÏÀÍÈß check point ÓÑÒÀÍÀÂËÈÂÀÅÒ ÍÎÂÛÉ ÑÒÀÍÄÀÐÒ Â ÇÀÙÈÒÅ ÊÎÍÅ×ÍÛÕ ÒÎ×ÅÊ ÑÅÒÈ17-07-2009
Check Point âûïóñêàåò íîâûå IP-óñòðîéñòâà, èíòåãðèðîâàííûå ñ ïðîãðàììíûìè áëåéäàìè10-06-2009
Êîìïàíèÿ Ñheck Point ïðåäñòàâëÿåò íîâûå óñòðîéñòâà ïî óïðàâëåíèþ áåçîïàñíîñòüþ, îñíîâàííûå íà àðõèòåêòóðå «ïðîãðàììíûå…02-06-2009
Êîìïàíèÿ Check Point ïðåäñòàâëÿåò íîâóþ âåðñèþ ÏÎ íà áàçå àðõèòåêòóðû «ïðîãðàììíûå áëåéäû»17-03-2009
Íîâàÿ àðõèòåêòóðà Check Point «Ïðîãðàììíûå áëåéäû»: ðåâîëþöèÿ â èíäóñòðèè áåçîïàñíîñòè02-03-2009
ÍÎÂÛÅ ÓÑÒÐÎÉÑÒÂÀ check point ÄËß ÂÈÐÒÓÀËÈÇÀÖÈÈ ÇÀÙÈÒÛ26-02-2009
Check point ÐÀÑØÈÐßÅÒ ËÈÍÅÉÊÓ ÏÐÎÄÓÊÒΠutm ÄËß ÌÀËÎÃÎ ÁÈÇÍÅÑÀ È ÔÈËÈÀËÎÂ19-02-2009
Êîìïàíèÿ Ñheck Point ïîäïèñûâàåò ñîãëàøåíèå î ïðèîáðåòåíèè áèçíåñà Nokia ïî îáåñïå÷åíèþ áåçîïàñíîñòè24-12-2008
Îáíîâëåííîå ÏÎ Check Point UTM-1 Edge îáåñïå÷èâàåò êîìïëåêñíóþ çàùèòó ðåãèîíàëüíûõ îôèñîâ êîìïàíèé26-11-2008
Check point software ÀÍÎÍÑÈÐÓÅÒ ÔÈÍÀÍÑÎÂÛÅ ÐÅÇÓËÜÒÀÒÛ ÇÀ ÒÐÅÒÈÉ ÊÂÀÐÒÀË 2008 ÃÎÄÀ30-10-2008
Check point ÑÎÂÅÐØÅÍÑÒÂÓÅÒ ÈÍÄÅÍÒÈÔÈÊÀÖÈÞ ÏÎËÜÇÎÂÀÒÅËß ÏÐÈ ÓÄÀËÅÍÍÎÌ ÄÎÑÒÓÏÅ23-10-2008
Check point — ËÈÄÅÐ «ÌÀÃÈ×ÅÑÊÎÃÎ ÊÂÀÄÐÀÍÒÀ» gartner inc. ÍÀ ÐÛÍÊÅ ÇÀÙÈÒÛ ÌÎÁÈËÜÍÛÕ ÄÀÍÍÛÕ14-10-2008
Ïÿòíàäöàòèëåòèå êîìïàíèè Check Point26-09-2008
ÊÎÌÏÀÍÈß check point ÎÁÚßÂÈËÀ Î ÂÛÕÎÄÅ ÍÎÂÎÉ ÂÅÐÑÈÈ ÅÄÈÍÎÃÎ ÊËÈÅÍÒÀ ÄËß ÊÎÌÏËÅÊÑÍÎÉ ÇÀÙÈÒÛ ÊÎÍÅ×ÍÛÕ ÒÎ×ÅÊ ÑÅÒÈ01-09-2008
Check point ÂÛÏÓÑÊÀÅÒ ËÓ×ØÓÞ Â ÑÂÎÅÌ ÊËÀÑÑÅ ÇÀÙÈÒÓ ÄËß ÂÈÐÒÓÀËÜÍÛÕ ÏÐÈËÎÆÅÍÈÉ22-08-2008
Check Point Software ñîîáùàåò ôèíàíñîâûå ðåçóëüòàòû çà âòîðîé êâàðòàë 2008 ãîäà24-07-2008
Techworld íàãðàæäàåò êîìïàíèþ Check Point â íîìèíàöèè «Ïðîäóêò ãîäà» ñðåäè ïðîäóêòîâ äëÿ çàùèòû êîíå÷íûõ òî÷åê ñåòè18-07-2008
Check Point àíîíñèðóåò íîâûå âûñîêîïðîèçâîäèòåëüíûå óñòðîéñòâà UTM14-07-2008
Check Point VPN îáåñïå÷èâàåò çàùèùåííûé óäàëåííûé äîñòóï äëÿ ïîëüçîâàòåëåé Apple iPhone04-06-2008
Ñheck Point software àíîíñèðóåò ôèíàíñîâûå ðåçóëüòàòû çà ïåðâûé êâàðòàë 2008 ãîäà30-04-2008
ÍÎÂÀß ÌÎÄÅËÜ utm-1 ÎÁÅÑÏÅ×ÈÂÀÅÒ ÏÎÂÛØÅÍÍÓÞ ÇÀÙÈÒÓ È ÐÀÑØÈÐßÅÒ ËÈÍÅÉÊÓ ÏÐÎÄÓÊÒΠÊÎÌÏÀÍÈÈ check point Ëèíåéêà óñòðîéñòâ…24-04-2008
Check point ÀÍÎÍÑÈÐÓÅÒ ÍÎÂÛÅ ÂÛÑÎÊÎÏÐÎÈÇÂÎÄÈÒÅËÜÍÛÅ ÓÑÒÐÎÉÑÒÂÀ power-1 ÄËß ÇÀÙÈÒÛ ÊÐÓÏÍÛÕ ÏÐÅÄÏÐÈßÒÈÉ24-04-2008
Hîâàÿ âåðñèÿ IPS-1 êîìïàíèè Check Point ïîâûøàåò ýôôåêòèâíîñòü çàùèòû îò âòîðæåíèé17-04-2008
Êîìïàíèÿ Check Point àíîíñèðóåò ïåðâîãî åäèíîãî êëèåíòà äëÿ êîìïëåêñíîé çàùèòû êîíå÷íûõ òî÷åê ñåòè Check Point Endpoint…08-02-2008
Êîìïàíèÿ CHECK POINT SOFTWARE àíîíñèðóåò ðåêîðäíûå ôèíàíñîâûå ðåçóëüòàòû çà ÷åòâåðòûé êâàðòàë 2007 ãîäà è ïîäâîäèò…25-01-2008
Check point software technologies ÏÐÈÑÂÎÈËÀ ÑÒÀÒÓÑ ÇÎËÎÒÎÃÎ ÏÀÐÒÍÅÐÀ ÊÎÌÏÀÍÈÈ energy consulting14-01-2008
Êîìïàíèÿ Ñheck Point ïðåäñòàâëÿåò íîâàòîðñêèå ðåøåíèÿ utm-1, òåïåðü âêëþ÷àþøèå ëó÷øåé â ñâîåì êëàññå çàùèòó ñîîáùåíèé11-12-2007
Êîìïàíèÿ Check Point àíîíñèðóåò íîâóþ ïàðòíåðñêóþ ïðîãðàììó22-11-2007
Check point ÑÐÅÄÈ ËÈÄÅÐΠ«ÌÀÃÈ×ÅÑÊÎÃÎ ÊÂÀÄÐÀÍÒÀ» gartner inc. ÍÀ ÐÛÍÊÅ ÇÀÙÈÒÛ ÌÎÁÈËÜÍÛÕ ÄÀÍÍÛÕ25-09-2007
Check Point ïðîäåìîíñòðèðîâàë êëþ÷åâûå ðåøåíèÿ íà CPX EMEA 200712-09-2007
Check point software technologies ÐÀÇÂÈÂÀÅÒ ÎÒÍÎØÅÍÈß Ñ ÀÌÒ-ÃÐÓÏ29-08-2007
ÏÐÎÄÓÊÖÈß check point ÏÎ ÇÀÙÈÒÅ ÄÀÍÍÛÕ ÒÅÏÅÐÜ ÏÎÄÄÅÐÆÈÂÀÅÒ windows vista20-07-2007
ÏÐÅÄËÎÆÅÍÈÅ check point ÒÅÏÅÐÜ ÂÊËÞ×ÀÅÒ ÂÅÄÓÙÈÅ ÐÅØÅÍÈß ÏÎ ÇÀÙÈÒÅ ÄÀÍÍÛÕ – Ñ ÈÑÏÎËÜÇÎÂÀÍÈÅÌ ÏÐÎÄÓÊÖÈÈ pointsec13-07-2007
Ñheck point software ÑÎÎÙÀÅÒ ÔÈÍÀÍÑÎÂÛÅ ÐÅÇÓËÜÒÀÒÛ ÏÅÐÂÎÃÎ ÊÂÀÐÒÀËÀ 2007 ÃÎÄÀ07-05-2007
Check point ÏÐÅÄÑÒÀÂËßÅÒ ngx r65, ÐÀÑØÈÐÅÍÍÓÞ ÏËÀÒÔÎÐÌÓ ÓÍÈÔÈÖÈÐÎÂÀÍÍÎÉ ÀÐÕÈÒÅÊÒÓÐÛ ÁÅÇÎÏÀÑÍÎÑÒÈ Ñ ÍÎÂÛÌÈ…21-03-2007
Check point vpn-1 power ÓÑÒÀÍÀÂËÈÂÀÅÒ ÍÎÂÛÉ ÎÒÐÀÑËÅÂÎÉ ÑÒÀÍÄÀÐÒ ÏÐÎÈÇÂÎÄÈÒÅËÜÍÎÑÒÈ ÑÈÑÒÅÌÛ ÁÅÇÎÏÀÑÍÎÑÒÈ20-03-2007
Check point integrity ÄÎÑÒÈÃ ÂÛÄÀÞÙÅÃÎÑß ÓÐÎÂÍß ÑÅÐÒÈÔÈÊÀÖÈÈ ÄËß ÃÎÑÓÄÀÐÑÒÂÅÍÍÛÕ ÎÐÃÀÍÈÇÀÖÈÉ: common criteria eal 416-02-2007
ÍÎÂÛÅ ÓÑÒÐÎÉÑÒÂÀ ÇÀÙÈÒÛ check point utm ÐÅØÀÞÒ ÏÐÎÁËÅÌÛ ÏÐÅÄÏÐÈßÒÈÉ ÑÐÅÄÍÅÃÎ ÐÀÇÌÅÐÀ13-02-2007
Check point ÂÛÏÓÑÊÀÅÒ ÍÎÂÎÅ ÀÄÀÏÒÈÂÍÎÅ ÐÅØÅÍÈÅ ÄËß ÇÀÙÈÒÛ ÊÎÍÂÅÐÃÅÍÒÍÛÕ ÑÅÒÅÉ ÊËÀÑÑÀ ÎÏÅÐÀÒÎÐΠÑÂßÇÈ26-01-2007
ÏÐÅÄËÎÆÅÍÈÅ check point Î ÏÎÊÓÏÊÅ ÀÊÖÈÉ protect data ÏÐÈÍßÒÎ Ñ ÂÍÓØÈÒÅËÜÍÛÌ ÏÅÐÅÂÅÑÎÌ ÃÎËÎÑÎÂ Â 87,1%25-01-2007
Check point ÇÀÂÅÐØÀÅÒ ÏÐÈÎÁÐÅÒÅÍÈÅ nfr security16-01-2007
ÓÑÎÂÅÐØÅÍÑÒÂÎÂÀÍÈß Â check point eventia ÓÏÐÎÙÀÞÒ ÀÍÀËÈÇ ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÃÎ ÏÐÎÍÈÊÍÎÂÅÍÈß Â ÐÅÆÈÌÅ ÐÅÀËÜÍÎÃÎ ÂÐÅÌÅÍÈ22-12-2006
ÓÑÒÐÎÉÑÒÂÎ check point vpn-1 utm edge ÓÏÐÎÙÀÅÒ ÇÀÙÈÒÓ ÓÄÀËÅÍÍÛÕ ÎÔÈÑÎÂ, ÏÎÄÄÅÐÆÈÂÀß ÌÎÄÅÌ usb È ÁÅÑÏÐÎÂÎÄÍÎÉ ÐÎÓÌÈÍÃ23-11-2006
Check Point Connectra — íàèáîëåå ïîëíîå ðåøåíèå äëÿ îðãàíèçàöèè SSL VPN äëÿ ðîññèéñêîãî ðûíêà, âêëþ÷àþùåå øèôðîâàíèå ïî…22-11-2006
Check point ÐÀÑÏÐÎÑÒÐÀÍßÅÒ ÁÅÇÎÏÀÑÍÛÉ ÓÄÀËÅÍÍÛÉ ÄÎÑÒÓÏ ÍÀ ÓÑÒÐÎÉÑÒÂÀ windows mobile, ÏÎÂÛØÀß ÏÐÎÈÇÂÎÄÈÒÅËÜÍÎÑÒÜ ÒÐÓÄÀ…14-11-2006
Checkpoint software technologies È «ÊÎÐÏÎÐÀÖÈß ÞÍÈ» ÎÒÌÅÒÈËÈ ÄÅÑßÒÈËÅÒÈÅ ÑÂÎÅÃÎ ÑÎÒÐÓÄÍÈ×ÅÑÒÂÀ27-09-2006
Check Point Software ñîîáùàåò ðåçóëüòàòû âòîðîãî êâàðòàëà 2006 ãîäà11-08-2006
Check point ÏÐÅÄÑÒÀÂËßÅÒ ÍÎÂÎÃÎ ÐÅÃÈÎÍÀËÜÍÎÃÎ ÄÈÐÅÊÒÎÐÀ07-07-2006
Check point ÄÀÅÒ ÐÅÊÎÌÅÍÄÀÖÈÈ ÏÎ ÐÅØÅÍÈÞ ÈÒ-ÏÐÎÁËÅÌ, ÂÛÇÂÀÍÍÛÕ ÐÎÑÒÎÌ ÏÐÅÄÏÐÈßÒÈß14-06-2006
Check point ÄÀÅÒ ÐÅÊÎÌÅÍÄÀÖÈÈ ÏÎ ÐÅØÅÍÈÞ ÈÒ-ÏÐÎÁËÅÌ, ÂÛÇÂÀÍÍÛÕ ÐÎÑÒÎÌ ÏÐÅÄÏÐÈßÒÈß07-06-2006
Check point ÂÛÏÓÑÊÀÅÒ ÍÎÂÛÅ ÓÍÈÔÈÖÈÐÎÂÀÍÍÛÅ ÓÑÒÐÎÉÑÒÂÀ ÇÀÙÈÒÛ ÎÒ ÓÃÐÎÇ safe@office ÑÎ ÂÑÒÐÎÅÍÍÛÌÈ ÌÎÄÅÌÀÌÈ adsl19-05-2006
ÍÎÂÛÅ ÏÐÎÄÓÊÒÛ check point, ÎÐÈÅÍÒÈÐÎÂÀÍÍÛÅ ÍÀ ÅÄÈÍÓÞ ÑÈÑÒÅÌÓ ÓÏÐÀÂËÅÍÈß ÑÅÒÅÂÎÉ ÇÀÙÈÒÎÉ È ÂÛÑÎÊÎÝÔÔÅÊÒÈÂÍÛÅ ÑÐÅÄÑÒÂÀ…17-05-2006
Check point ÓÑÒÀÍÀÂËÈÂÀÅÒ ÍÎÂÛÉ ÑÒÀÍÄÀÐÒ ÅÄÈÍÎÃÎ ÓÏÐÀÂËÅÍÈß ÑÅÒÅÂÎÉ ÁÅÇÎÏÀÑÍÎÑÒÜÞ15-05-2006
Check Point Eventia Analyzer 2.0 óïðîùàåò óïðàâëåíèå ñîáûòèÿìè áåçîïàñíîñòè áëàãîäàðÿ ðàñøèðåííîé ïîääåðæêå óäàëåííûõ…18-04-2006
ÆÓÐÍÀË varbusiness ÏÎÑÒÀÂÈË check point ÎÖÅÍÊÓ «ÏßÒÜ ÇÂÅÇÄ»21-03-2006
Check point connectra ÃÀÐÀÍÒÈÐÓÅÒ ÑÀÌÎÅ ÍÀÄÅÆÍÎÅ ÑÎÅÄÈÍÅÍÈÅ ssl vpn ÁËÀÃÎÄÀÐß ÍÎÂÛÌ ÔÓÍÊÖÈßÌ ÎÁÅÑÏÅ×ÅÍÈß ÁÅÇÎÏÀÑÍÎÑÒÈ,…14-03-2006
Check point ÓÄÎÑÒÎÅÍÀ ÇÂÀÍÈß crn channel champion 200613-03-2006
Check point ÏÎËÓ×ÈËÀ ÄÂÀ ÇÀÂÅÒÍÛÕ ÏÐÈÇÀ sc magazine 2006 ÃÎÄÀ02-03-2006
ÊÎÌÏÀÍÈß Ñheck point ÑÒÀËÀ ÑÏÎÍÑÎÐÎÌ ÊÎÍÔÅÐÅÍÖÈÈ ÏÎ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ01-03-2006
Check point software È rsa security ÑÎÇÄÀÞÒ ÑÎÂÌÅÑÒÍÛÉ ÏÐÎÃÐÀÌÌÍÎ-ÀÏÏÀÐÀÒÍÛÉ ÊÎÌÏËÅÊÑ22-02-2006
Check point software ÑÎÎÁÙÀÅÒ ÐÅÇÓËÜÒÀÒÛ ×ÅÒÂÅÐÒÎÃÎ ÊÂÀÐÒÀËÀ È 2005 ÔÈÍÀÍÑÎÂÎÃÎ ÃÎÄÀ02-02-2006
ÑÈÑÒÅÌÀ ÎÁÅÑÏÅ×ÅÍÈß ÁÅÇÎÏÀÑÍÎÑÒÈ check point vpn-1 edge ngx ÓÑÈËÅÍÀ ÑÐÅÄÑÒÂÀÌÈ ÏÐÅÄÎÒÂÐÀÙÅÍÈß ÂÒÎÐÆÅÍÈÉ È ÀÍÒÈÂÈÐÓÑÎÌ24-01-2006
Check point È sofaware ÏÐÅÄÑÒÀÂÈËÈ ÎÁÍÎÂËÅÍÍÓÞ ÏËÀÒÔÎÐÌÓ ÓÏÐÀÂËÅÍÈß ÑËÓÆÁÀÌÈ ÁÅÇÎÏÀÑÍÎÑÒÈ ÄËß ÑÅÐÂÈÑ-ÏÐÎÂÀÉÄÅÐÎÂ05-12-2005
CHECK POINT ââîäèò àíòèøïèîíñêîå ÏÎ â ëèäèðóþùåå ðåøåíèå äëÿ îáåñïå÷åíèÿ áåçîïàñíîñòè ðàáî÷èõ ìåñò09-11-2005
Check point software ÑÎÎÁÙÀÅÒ ÔÈÍÀÍÑÎÂÛÅ ÐÅÇÓËÜÒÀÒÛ ÒÐÅÒÜÅÃÎ ÊÂÀÐÒÀËÀ 2005 ã03-11-2005
ÐÅÇÓËÜÒÀÒÛ ÈÑÏÛÒÀÍÈÉ ÄÎÊÀÇÛÂÀÞÒ, ×ÒÎ ÐÅØÅÍÈÅ ssl vpn ÎÒ check point ÏÐÅÂÎÑÕÎÄÈÒ ÀÍÀËÎÃÈ×ÍÛÅ, ÃÀÐÀÍÒÈÐÓß ÍÀÈËÓ×ØÓÞ ÇÀÙÈÒÓ17-10-2005
Check point software technologies ÏÐÈÎÁÐÅÒ¨Ò sourcefire11-10-2005
Check point ÑÎÂÅÐØÅÍÑÒÂÓÅÒ ÂÈÐÒÓÀËÈÇÈÐÎÂÀÍÍÎÅ ÐÅØÅÍÈÅ ÇÀÙÈÒÛ ÍÀ ÓÍÈÔÈÖÈÐÎÂÀÍÍÎÉ ÏËÀÒÔÎÐÌÅ ÁÅÇÎÏÀÑÍÎÑÒÈ ngx26-09-2005
Check point ÑÒÀËÀ ÏÎÁÅÄÈÒÅËÅÌ ÊÎÍÊÓÐÑÀ annual report card 2005 ÈÇÄÀÂÀÅÌÎÃÎ cmp ÆÓÐÍÀËÀ varbusiness01-09-2005
Zone labs ÑÎÂÅÐØÈËÀ ÏÅÐÅÂÎÐÎÒ Â ÎÁËÀÑÒÈ ÇÀÙÈÒÛ ÎÒ ØÏÈÎÍÑÊÎÃÎ ÏÎ — ÍÎÂÀß ÑÈÑÒÅÌÀ ÇÀÙÈÒÛ ÏÊ ÍÀ ÁÀÇÅ ÈÇÓ×ÅÍÈß ÏÎÂÅÄÅÍÈß…02-08-2005
Check Point Software ñîîáùàåò ôèíàíñîâûå ðåçóëüòàòû âòîðîãî êâàðòàëà 2005 ôèíàíñîâîãî ãîäà26-07-2005
Tops bi ÎÒÊÐÛÂÀÅÒ ÖÅÍÒÐ ÊÎÌÏÅÒÅÍÖÈÈ ÏÎ ÐÅØÅÍÈßÌ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ check point04-07-2005
Check point ÐÀÇÂÈÂÀÅÒ ÐÅØÅÍÈÅ connectra ssl ÏÐÅÄÑÒÀÂËßß ÍÎÂÓÞ ÂÅÐÑÈÞ ÏËÀÒÔÎÐÌÛ ngx15-06-2005
Áîëåå 1500 ïàðòíåðîâ è çàêàç÷èêîâ çàêàçàëè ïàêåò îáíîâëåíèé ïëàòôîðìû NGX çà äåñÿòü äíåé31-05-2005
ÊÎÌÏÀÍÈß check point ÏÎÄÏÈÑÀËÀ ÑÎÃËÀØÅÍÈÅ Î ÄÈÑÒÐÈÁÓÖÈÈ Ñ rrc enterprise networking14-05-2005
CHECK POINT âíåäðÿåò àíòèâèðóñíóþ çàùèòó â ñâîè èíòåãðèðîâàííûå ðåøåíèÿ äëÿ îáåñïå÷åíèÿ áåçîïàñíîñòè êîìïàíèé ñðåäíåãî…14-04-2005
Check point ÐÀÑØÈÐßÅÒ ÈÇÂÅÑÒÍÓÞ ÏÀÐÒÍÅÐÑÊÓÞ ÏÐÎÃÐÀÌÌÓ opsec Ñ ÖÅËÜÞ ÐÅØÅÍÈß ÏÐÎÁËÅÌ ÁÅÇÎÏÀÑÍÎÑÒÈ06-04-2005
ÊÎÌÏÀÍÈß check point software ÏÎËÓ×ÀÅÒ ÒÐÈ ÏÐÅÑÒÈÆÍÛÕ ÍÀÃÐÀÄÛ Â ÐÀÌÊÀÕ ÏÐÎÃÐÀÌÌÛ sc magazine global awards01-03-2005
ÍÎÂÎÅ ÐÅØÅÍÈÅ check point integrity ÃÀÐÀÍÒÈÐÓÅÒ ËÓ×ØÈÅ Â ÎÒÐÀÑËÈ ÓÏÐÀÂËßÅÌÎÑÒÜ, ÈÍÒÅÃÐÀÖÈÞ È ÇÀÙÈÒÓ ÓÄÀËÅÍÍÛÕ ÐÀÁÎ×ÈÕ…21-02-2005
Check point ÓÏÐÎÙÀÅÒ ÓÏÐÀÂËÅÍÈÅ ÑÎÁÛÒÈßÌÈ ÁÅÇÎÏÀÑÍÎÑÒÈ16-02-2005
Check point software technologies ÏÎÄÂÎÄÈÒ ÈÒÎÃÈ ×ÅÒÂÅÐÒÎÃÎ ÊÂÀÐÒÀËÀ È ÈÒÎÃÈ 2004 ÔÈÍÀÍÑÎÂÎÃÎ ÃÎÄÀ02-02-2005
Check Point ïðåäñòàâëÿåò Connectra 2.0, ïðåäëàãàÿ ïåðâîå â îòðàñëè ïðîãðàììíîå ðåøåíèå ssl vpn è áåçîïàñíîãî äîñòóïà ê…20-01-2005
Check Point Software Technologies îáúÿâèëà î âûïóñêå Integrity SecureClient30-08-2004
Check Point Software Technologies îòêðûâàåò îôèñ â Ðîññèè30-08-2004