Check Point GO

Last updated

Check Point GO is a USB drive that combines an encrypted USB flash drive with virtualization, VPN and computer security technologies to turn a PC into a secure corporate desktop. By plugging Check Point GO into the USB port of a Microsoft Windows OS-based PC or laptop, users can launch a secure virtual workspace that is segregated from the host PC. [1] This allows users to securely access company files and applications from any remote location, including insecure host environments such as a hotel business center or Internet café. [2]

Contents

Check Point GO uses hardware and software encryption to protect user credentials, documents, and other sensitive data, so that data cannot be compromised in transit or in the event the device is lost. The system uses an authentication process that enforces minimum levels of password strength, as well as certificates and security tokens for multifactor authentication for remote connectivity. The device interfaces with software on a corporate server to support company policies and security updates through security gateways. [3]

History

[4] Check Point GO (formerly Abra) was first introduced by Check Point Software Technologies Ltd. [5] and SanDisk Corporation in March 2010 to address security and compliance issues for companies with remote employees. [6] Workers have been increasingly demanding remote access to company applications and data. [7] Personal equipment accessing the network can pose a risk to corporate networks, creating a potential avenue for corporate data loss or allowing unsecure connections. [8]

The companies cite that the Check Point GO system provides a solution for companies that want to let their employees purchase and manage their own PCs and laptops, for those needing high security (including encryption) for computing devices outside the workplace, as well as contractors/vendors who require access to the company network while working on site.

Since its release, the product has won industry awards including "IT Product of 2010" by Computerworld [9] and was named one of the “25 Hot Products to Watch” at the 2010 RSA Conference by CRN Magazine. [10]

Checkpoint GO went end-of-sale 31-DEC-2013, with support ending 31-DEC-2018 [11]

Technology Architecture

When Check Point GO is inserted into the USB port of any PC, the user is presented with a login screen. Upon successful login, a new explorer.exe instance is started in the Check Point GO Secure Workspace. All subsequent processes are started as child processes of this new explorer.

Check Point GO uses the software installed on the host PC to run applications such as Microsoft Word and Microsoft Excel, but the user’s documents remain secure in the Check Point GO environment – a virtual workspace that runs parallel to the host environment. All file and registry input/output calls for the secure application inside Check Point GO are redirected to the flash drive.

All applications running on the Check Point GO desktop (including the new explorer) operate in a virtual file system and registry. The virtual files and registry data are instantly written to the flash drive and immediately encrypted.

Currently, Check Point GO does not work on all Windows workstations, due to incompatibility with enterprise client settings.

Specifications

[12]

Check Point GO Host Platform Support
Operating systems
SmartCenter Management Server
Operating systems
  • Check Point SecurePlatform
  • Windows Server 2000/2003
  • Solaris 8/9/10
  • Red Hat Linux Enterprise 3.0
SmartCenter GUI
Operating systems
  • Windows 2000/2003, ME, XP, Vista
  • Solaris 8/9/10
Encrypted USB Drive
SanDisk USB Drive
  • Available capacities: 4, 8 GB
  • High-speed USB 2.0 interface
  • AES 256-bit hardware encryption
  • FIPS 140-2 Level 2 certified drives available

Awards

See also

Related Research Articles

Virtual private network (VPN) is a network architecture for virtually extending a private network across one or multiple other networks which are either untrusted or need to be isolated.

SonicWall is an American cybersecurity company that sells a range of Internet appliances primarily directed at content control and network security. These include devices providing services for network firewalls, unified threat management (UTM), virtual private networks (VPNs), virtual firewalls, SD-WAN, cloud security and anti-spam for email. The company also markets information subscription services related to its products. The company also assists in solving problems surrounding compliance with the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI-DSS).

Internet security is a branch of computer security. It encompasses the Internet, browser security, web site security, and network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet is an inherently insecure channel for information exchange, with high risk of intrusion or fraud, such as phishing, online viruses, trojans, ransomware and worms.

<span class="mw-page-title-main">LogMeIn Hamachi</span> Virtual private network application

LogMeIn Hamachi is a virtual private network (VPN) application developed and released in 2004 by Alex Pankratov. It is capable of establishing direct links between computers that are behind network address translation (NAT) firewalls without requiring reconfiguration. Like other VPNs, it establishes a connection over the Internet that emulates the connection that would exist if the computers were connected over a local area network (LAN).

<span class="mw-page-title-main">Check Point</span> Israeli security company

Check Point Software Technologies Ltd. is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security management.

VPN-1 is a firewall and VPN product developed by Check Point Software Technologies Ltd.

In computing, the term remote desktop refers to a software- or operating system feature that allows a personal computer's desktop environment to be run remotely from one system, while being displayed on a separate client device. Remote desktop applications have varying features. Some allow attaching to an existing user's session and "remote controlling", either displaying the remote control session or blanking the screen. Taking over a desktop remotely is a form of remote administration.

A mobile virtual private network is a VPN which is capable of persisting during sessions across changes in physical connectivity, point of network attachment, and IP address. The "mobile" in the name refers to the fact that the VPN can change points of network attachment, not necessarily that the mVPN client is a mobile phone or that it is running on a wireless network.

<span class="mw-page-title-main">Intel Active Management Technology</span> Out-of-band management platform

Intel Active Management Technology (AMT) is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a microprocessor subsystem not exposed to the user, intended for monitoring, maintenance, updating, and repairing systems. Out-of-band (OOB) or hardware-based management is different from software-based management and software management agents.

Ericom Software, Inc. is a Closter, New Jersey-based company that provides web isolation and remote application access software to businesses.

<span class="mw-page-title-main">Pano Logic</span> American information technology company

Pano Logic was a manufacturer of devices which present virtual desktops to the end user with no local processing power. They describe this concept as "zero client". This is perceived as offering benefits in end-user support and in power provision to desks. OEM versions have been included in displays from some vendors, allowing a single unit to be deployed. The company failed in October 2012. In March 2013, Propalms announced they had acquired the rights to support Panologic customers, and will "help transition the customer base to a new platform".

<span class="mw-page-title-main">TriGeo Network Security</span>

TriGeo Network Security is a United States–based provider of security information and event management (SIEM) technology. The company helps mid market organizations proactively, protects networks and data from internal and external threats, with a SIEM appliance that provides real-time log management and automated network defense - from the perimeter to the endpoint.

Secure USB flash drives protect the data stored on them from access by unauthorized users. USB flash drive products have been on the market since 2000, and their use is increasing exponentially. As businesses have increased demand for these drives, manufacturers are producing faster devices with greater data storage capacities.

Microsoft Forefront Unified Access Gateway (UAG) is a discontinued software suite that provides secure remote access to corporate networks for remote employees and business partners. Its services include reverse proxy, virtual private network (VPN), DirectAccess and Remote Desktop Services. UAG was released in 2010, and is the successor for Microsoft Intelligent Application Gateway (IAG) which was released in 2007. UAG is part of the Microsoft Forefront offering. Microsoft discontinued the product in 2014, although the Web Application Proxy feature of Windows Server 2012 R2 and later offers some of its functionalities.

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as the Internet.

Avira Operations GmbH & Co. KG is a German multinational computer security software company mainly known for its Avira Free Security antivirus software. Although founded in 2006, the Avira antivirus application has been under active development since 1986 through its predecessor company H+BEDV Datentechnik GmbH. Since 2021, Avira has been owned by American software company NortonLifeLock, which also operates Norton, Avast and AVG. It was previously owned by investment firm Investcorp.

<span class="mw-page-title-main">Teradici</span> Canadian software company

Teradici Corporation was a privately held software company founded in 2004, which was acquired by HP Inc. in October 2021. Teradici initially developed a protocol (PCoIP) for compressing and decompressing images and sound when remotely accessing blade servers, and implemented it in hardware. This technology was later expanded to thin clients/zero clients for general Virtual Desktop Infrastructure. Teradici's protocol or hardware is used by HP, Dell-Wyse, Amulet Hotkey, Samsung, Amazon Web Services, Fujitsu, and VMware.

<span class="mw-page-title-main">SoftEther VPN</span> Open-source VPN client and server software

SoftEther VPN is free open-source, cross-platform, multi-protocol VPN client and VPN server software, developed as part of Daiyuu Nobori's master's thesis research at the University of Tsukuba. VPN protocols such as SSL VPN, L2TP/IPsec, OpenVPN, and Microsoft Secure Socket Tunneling Protocol are provided in a single VPN server. It was released using the GPLv2 license on January 4, 2014. The license was switched to Apache License 2.0 on January 21, 2019.

A mobile workspace is a user's portable working environment that gives them access to the applications, files and services they need to do their job no matter where they are.

<span class="mw-page-title-main">NCP Engineering</span>

NCP engineering is a Nuremberg-based company producing software for remote access, industrial internet of things security and information security. NCP's products use virtual private network (VPN) and other technologies like encryption, personal firewalls and electronic certificates in a public key infrastructure (PKI) to secure data communication.

References

  1. "Check Point unveils Abra mobile". Deccan Herald. April 7, 2010.
  2. "A virtual Secure workspace" (PDF). swordshield.com.
  3. "Check Point launches ABRA". ciol.com. Archived from the original on 2012-04-06. Retrieved 2010-10-11.
  4. "Check Point puts VPN in USB stick". techworld.com.
  5. "Secure Virtual Workspace".
  6. "Check Point and SanDisk Deliver Secure Virtual Workspace" (Press release). Checkpoint.com. March 2, 2010. Archived from the original on March 6, 2010.
  7. Telework Trendlines 2009, WorldatWork.
  8. "Company white paper: Check Point GO – A Virtual Secure Workspace". checkpoint.com. Archived from the original on 2010-10-13.
  9. "Check Point Abra Named 'IT Product of 2010' by Computerworld Magazine" (Press release). Newswiretoday.com. July 15, 2010.
  10. "25 Hot Products To Watch At RSA". CRN Magazine. February 26, 2010.
  11. "Check Point Enterprise Support Lifecycle". Checkpoint.com.
  12. "Abra Specifications" (PDF). info-safe.com. Archived from the original (PDF) on 2011-07-13.
  13. "Check Point Abra Recognized Best International Innovation At Hungarian IT Security Day" (Press release). checkpoint.com. 11 October 2010. Archived from the original on 13 December 2010. Retrieved 17 November 2010.
  14. "Check Point Abra Recognized Best International Innovation At Hungarian IT Security Day". newswiretoday.com. Budapest, Hungary. 2010-10-11.