"Abra" Cadabra: USB Solution Transforms PC Into Fully Secure Corporate Desktop

By PRESS RELEASE — March 12, 2010

Check Point Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced Check Point Abra, a new solution which turns any PC into a fully secure corporate desktop.

Abra provides users access to company emails, files and applications anywhere whether offline or online through integrated virtual private network (VPN) connectivity. Abra loads itself automatically on any PC, and contains local encrypted storage to protect any data stored on the device.

Remote workers and contractors accessing the corporate network through personal or third-party equipment can put businesses' sensitive data at risk and threaten the network. For example, mobile workers storing corporate data on a home PC could inadvertently expose company information when a child or another home user visits a peer-to-peer (P2P) file sharing site or send attachments via instant message (IM). Similarly, a contractor could accidentally send a business' proprietary data to another client. Regardless of the intent, the potential damage from data loss is the same.

To provide corporations with a secure and affordable alternative to allowing third-party PCs access the network, Check Point and SanDisk partnered to develop Abra. The device combines proven Check Point virtualization, VPN and security technologies with an encrypted SanDisk high performance USB drive to create a secure, virtual workspace. Users simply plug an Abra stick into a Windows-based PC and enter their credentials to immediately turn any PC into a corporate desktop.

"Abra can change the way people work remotely. It's a new simple way for secure mobility," said Gil Shwed, chairman and chief executive officer at Check Point. "Abra is like no other tool, not only combining virtualization, VPN and strong data security into a single ultra-portable device, but doing it in an easy to use cost effective manner. With Abra, people will be able to work remotely and securely without the need to carry expensive, heavy laptops."

To safeguard sensitive data stored on Abra, the device utilizes several advanced security measures. Hardware and software encryption protects data at rest and when in use. Program Control regulates the types of applications used by Abra to protect the corporate network from malware associated with unauthorized applications. Finally, virtualization technology isolates an Abra work session from the host PC, ensuring sensitive data remains on Abra and preventing data loss.

"In our business we need to demo solutions at our partners' corporate premises, and often they do not allow us to bring our own PC," said Loup-Fred Regent, marketing manager at Computerlinks. "With Abra, we just stick in the key and securely connect to the Intranet. Check Point is the only company to provide this level of ultra mobility. Abra is the best experience and the best overall solution to connect to the Intranet without a PC."

Features and benefits of Check Point Abra include:

- Standard Windows user environment enables easy navigation and rapid end-user adoption
- Prevents data loss by controlling outgoing traffic to networks and websites
- File transfer control allows exchange of files between personal and corporate workspace environments to be controlled by security policy
- Compliance scanning automatically scans the host PC to ensure an antivirus solution from a known vendor is active on the endpoint.
- User authentication enforces minimum password strength, as well as certificates and tokens for multi-factor authentication. A 'virtual keyboard' can be used at login to block password theft by key loggers
- Central management with Check Point SmartDashboard provides policy administration and updates through Check Point gateways, including authentication and compliance scanning rules and VPN settings

"Abra empowers workers with even greater network access, putting their office right in their pocket," concluded Shwed.

Availability
Check Point Abra is available March 31, 2010 and can be purchased through the Check Point worldwide network of value-added resellers.

 

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT (5 Being the Best)

12345
Current rating: 0 (0 ratings)

MOST READ STORIES

topics

Must See


FEATURED REPORT

Mobile Risk: Security Is Not a Game

IDC predicts 2 billion mobile devices will be shipped by 2017, while Gartner expects a 26 billion Internet of Things installed base (excluding smartphones and tablets) by 2020. With more devices, more machines, more connectivity comes more risk.