FW-1

(redirected from FireWall-1)
Also found in: Wikipedia.
AcronymDefinition
FW-1Firewall-1 (Checkpoint)
References in periodicals archive ?
The Digex high-speed firewall offering is built on Nokia's highest performing Internet security appliance, the Nokia IP740, tightly integrated with Check Point Software Technologies industry- leading FireWall-1 software.
The ASF System is based on FireWall-1 Next Generation software from Check Point Software Technologies, Ltd.
They chose to implement Check Point FireWall-1 GX because it combats both malicious and fraudulent attacks, and is able to intelligently detect when connections are opened and terminated.
Nasdaq:CHKP), the worldwide leader in securing the Internet, today announced that its world-class security solution for protecting the infrastructure of mobile operator's networks, Check Point FireWall-1 GX(TM), is experiencing rapid worldwide adoption rates in the cellular security marketplace.
FireWall-1 GX delivers the latest state-of-the-art security to prevent increasingly common security threats such as overbilling, denial of service (DoS) attacks and network flooding.
Check Point, the Check Point logo, Application Intelligence, Cluster XL, ConnectControl, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FireWall-1 SmallOffice, FireWall-1 VSX, FireWall-1 XL, FloodGate-1, INSPECT, INSPECT XL, IQ Engine, Meta IP, MultiGate, Open Security Extension, OPSEC, Provider-1, SecureKnowledge, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartView Tracker, SVN, UAM, User-to-Address Mapping, UserAuthority, VPN-1 Accelerator Card, VPN-1 Net, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 SmallOffice, and VPN-1 VSX are trademarks, service marks, or registered trademarks of Check Point Software Technologies Ltd.
Check Point, the Check Point logo, Cluster XL, ConnectControl, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FireWall-1 SmallOffice, FireWall-1 VSX, FireWall-1 XL, FloodGate-1, INSPECT, INSPECT XL, IQ Engine, Meta IP, MultiGate, Open Security Extension, OPSEC, Provider-1, SecureKnowledge, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartView Tracker, SVN, UAM, User-to-Address Mapping, UserAuthority, VPN-1 Accelerator Card, VPN-1 Net, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 SmallOffice, and VPN-1 VSX are trademarks, service marks, or registered trademarks of Check Point Software Technologies Ltd.
Note to Editors: Check Point, the Check Point logo, Cluster XL, ConnectControl, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FireWall-1 SmallOffice, FireWall-1 VSX, FireWall-1 XL, FloodGate-1, INSPECT, INSPECT XL, IQ Engine, Meta IP, MultiGate, Open Security Extension, OPSEC, Provider-1, SecureKnowledge, SecureXL, SiteManager-1, SmartCenter, SmartCenter Pro, SmartDashboard, SmartDefense, SmartLSM, SmartMap, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartView Tracker, SVN, UAM, User-to-Address Mapping, UserAuthority, VPN-1 Accelerator Card, VPN-1 Net, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 SmallOffice, and VPN-1 VSX are trademarks, service marks, or registered trademarks of Check Point Software Technologies Ltd.
We pioneered the commercial firewall market when we created FireWall-1 over ten years ago, so it is wonderful that we continue to be recognized as providing the industry's leading solutions.
by Check Point FireWall-1 NG with Application Intelligence,
2 Gbps VPN-1 throughput and up to 2 Gbps FireWall-1 throughput by routing network traffic through the RapidCore processor and completely bypassing the main CPU and system bus while still enforcing security policies.
The bv-Control for Check Point FireWall-1 and Internet Security solutions help our customers to protect their networks by giving them tools to help them avert the latest threats, stop breaches before they occur and avoid unnecessary down time, damage and expenses caused by successful attacks.