Talk:Check Point

From Wikipedia, the free encyclopedia

"Bus" network topology This article is part of WikiProject Computer networking, an attempt to build a comprehensive and detailed guide to Computer networking on Wikipedia. If you would like to participate, you can edit the article attached to this page, or visit the project page, where you can join the project and/or contribute to the discussion.
B This article has been rated as B-Class on the assessment scale.
Mid This article is on a subject of mid priority within Computer networking for inclusion in Wikipedia 1.0.

Check Point is part of WikiProject Israel, an attempt to build a comprehensive guide to Israel on Wikipedia. If you would like to participate, visit the project page where you can join the project and/or contribute to the discussion. This template adds articles to Category:WikiProject Israel articles.

??? This article has not yet received a rating on the quality scale.
??? This article has not yet received a rating on the importance scale.

Contents

[edit] Trivia section removed

I just removed the entire non-encyclopedic and ridiculous trivia section. Anyone who wants to add it back in a responsible manner, please do so. 68.8.108.62 07:43, 28 February 2007 (UTC)

[edit] Trivia

  • At about 2000, a Check Point anthem song was produced, most likely by Check Point. The performers have an outrageous Israeli accent, so it is very likely to have been produced in Israel. The song was used at several internal Check Point occasions, around those years (2000 summer party in Israel, 2001 South Africa company trip, etc.). In recent years the song is not used anymore, and everyone are thankful for that. It is not known to have been used in any public events, so this probably should not be considered an official anthem. It can be heard here: http://anthems.zdnet.co.uk/anthems/checkpoint.mp3
  • Not sure that it wasn't used in any public events, did go to the annual partner bash a.k.a. Check Point experience, this song was played endlessly during this event.
  • In 2006, Check Point and Microsoft conspired to eliminate support for the Windows 98 operating system, leaving 40% of the world's computer users vulnerable to a massive internet attack allowing Windows 98 users' computers to be comprised, resulting in large scale identity theft and denial of service attacks on all internet connected computers. It was felt at the time that Microsoft was attempting to force Windows 98 users to upgrade to the soon to be released Vista operating system.
You may need to take medication if you seriously think that TCP and UDP are the protocols of the learned elders of Zion! The wonderful conspiracy theory you formulated above will definitely please some arab whackos, however. On the other hand, all sane people realize that Windows 98 was merely a dressed-up edition of MS-DOS and thus impossible to make network-secure by design (or lack of).
  • In 2007, Senator Joe Lieberman, head of the Senate's Homeland Security Committee was contacted and told of the severe threat to the internet and internet users' computers that the Microsoft - Check Point failure to protect Windows 98 systems meant. Due to Check Point being an Israeli company, Senator Lieberman refused to take-up the matter.
Do you really need to spread anti-semitism here? 82.131.210.162 (talk) 20:45, 25 February 2008 (UTC)
How is that anti-semitism? Better that he not address the issue that be accused later of favortism or be forced to recant his involvement.Brinlong (talk) 17:35, 6 March 2008 (UTC)

[edit] A bit of a disaster here?

Wiki makes me laugh. You are so obviously biased as to be laughable. Why for example does cisco page allow mention of products, and yet Check point mention is immediately edited?? Hmmm. Wiki is flawed and insignificant. This comment will no doubt be edited as the censorship continues. Pathetic. —Preceding unsigned comment added by 76.184.226.122 (talk) 02:00, 28 May 2008 (UTC)

I don't know who deleted the {{advert}} tag I put on the "Major products" section, but this article still needs some serious cleanup. Here are some choice quotes:

  • Check Point offers a security solution to address the full spectrum of information security risk, from home users and small office to large distributed enterprise and ISP environments.
  • Check Point Software is the only information security vendor in the world with a focus on Pure Security.
  • VPN-1 Power security gateways provide an active defense that secures the most demanding sites ...
  • ... intrusion prevention technologies with advanced acceleration technologies to ensure that business information flows efficiently without compromising security.
  • ... provides a secure access solution for carriers deploying next generation infrastructures ...
  • ... the proven security of check point's firewall and intrusion prevention technologies ...
  • By combining SSL VPN connectivity and security in one solution, organizations can effectively deploy SSL VPN's safely and securely to a diverse set of users while ensuring the confidentiality and integrity of corporate information that is critical to business success.
  • Centrally managed endpoint security and network access control based on the defenses in Zone Alarm, the worlds most trusted PC security suite.
  • All solutions include a Check Point patented Stateful Inspection firewall, VPN, policy controlled gateway antivirus, user-friendly Web-based management, optional integrated ADSL2/2+ modem and much more.
  • By combining market-leading firewall, VPN, intrusion prevention, and antivirus technologies with advanced networking and connectivity features in a single solution, VPN-1 UTM Edge ensures remote sites stay as secure as the corporate site.
  • PN-1 UTM Edge Wireless (W) security appliances deliver the same security found in VPN-1 UTM Edge appliances with the highest levels of security for wireless networks.

I could keep going, but I don't think it's necessary; if those don't qualify as advertising, I don't know what does. --Aaron Rotenberg 03:44, 3 December 2007 (UTC)

I agree that a lot of that has a heavy advertising focus. Also "Check Point Software is the only information security vendor in the world with a focus on Pure Security" doesn't even mean anything - "pure security" just the company's current tag line. The tag line may be of relevance but not in this sentence. Gavint0 (talk) 21:15, 30 December 2007 (UTC)

[edit] Fair use rationale for Image:Check point logo.gif

Image:Check point logo.gif is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.

Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Wikipedia:Fair use rationale guideline is an easy way to insure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.

If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images lacking such an explanation can be deleted one week after being tagged, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.

BetacommandBot (talk) 20:55, 13 February 2008 (UTC)

I added the requested rationale to the image. --pabouk (talk) 09:55, 14 February 2008 (UTC)

[edit] Removed text from Competitors section

Removed this statement from the Competitors section

Note: While the above vendors do offer various products that compete with Check Point Software Technologies in various niches, i.e. network firewall, none of the vendors provide the depth or breadth of pure data security solutions that would mark them as a true competitor.

The statement lacks a NPOV and lacks cited sources. Such a broad statement (opinion) should be able to be verified by at least one reliable source. Perhaps if the editor is correct and the companies listed are not true competitors, then the whole section titled "Competitors" should be removed?

With appropriate, reliable, third-party sources the deleted text would see a welcome return to the article.
Bleakcomb (talk) 00:16, 24 February 2008 (UTC)

[edit] What happened to this article?

I checked this a few months ago and it seemed well written and informative... now it's a stub. I think a high level list of their product lines, a history of their acquisitions and the interesting story of their abortive attempt to acquire SourceFire would all be good additions. NDLunchbox (talk) 03:59, 5 June 2008 (UTC)