This document looks at how to meet requirements for data security in a way that is fully manageable and transparent to users alongside the compliance requirements of the GSi Code of Connection (CoCo) for data security on removable devices.
Check Point Software Technologies Ltd. (www.checkpoint.com), worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. This unique approach gives Check Point customers uncompromised protection against all types of threats, reduces complexity and lowers total cost of ownership. With its dynamic Software Blade architecture, Check Point delivers secure, flexible and simple solutions that can be fully customised to meet the exact security needs of any organisation or environment. Check Point customers include all Fortune 100 companies and tens of thousands of businesses and organisations of all sizes. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.