Check Point Secures Wolverhampton College Network with Next Generation Threat Prevention

Check Point Secures Wolverhampton College Network with Next Generation Threat Prevention

Check Point Secures Wolverhampton College Network with Next Generation Threat Prevention

Check Point solution gives college greater control and visibility over network and simplifies security management

November 12 2015 – Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the largest pure-play security vendor globally, has announced that City of Wolverhampton College has deployed Check Point’s Next Generation Threat Prevention to secure and manage its network. The solution includes firewalling, anti-virus, anti-bot, IPS and application control to defend against both known and unknown threats.

“The Check Point solution gives us confidence that our network is fully protected, and that the security rules and policies we have set are working effectively. The interface is simple and user-friendly, and it’s easy for us to make changes to rules, which was a key requirement. All in all, it has made our network more secure and reduced the demand on the College’s IT team,” said Darren Webley, IT Manager at City of Wolverhampton College.

With over 3,000 students and around 500 staff using the college’s network, as well as graduates that still have access to online resources, the college needed a security solution with advanced threat prevention features, and easy management to protect its network and data from both internal and external attacks. One of the College’s main security challenges is controlling peer-to-peer file sharing via BitTorrent, due to the high bandwidth usage and exposure to malicious content: as such, it required a solution capable of identifying and managing the use of file sharing services.

The deployment of the Check Point solution was managed by Check Point partner Atomos Networks, replacing a security appliance from Cyberoam. The new solution has improved and simplified City of Wolverhampton College’s network security management, making the organisation less reliant on third-party support.

Atomos also conducted a free security discovery process from Check Point called Security CheckUp, providing a detailed report on the security status of the College’s network ahead of the deployment, giving it a better understanding of potential vulnerabilities and issues in its network infrastructure.

“It’s now much easier for us to identify and prevent the use of peer-to-peer applications, and we are now much less reliant on third-party support. As we expand our BYOD provision for students and provide more online services, the Check Point solution enables us to manage it efficiently and securely in-house. We were not able to do this with our previous security gateway: its management interface was not intuitive, and rules often did not work as expected so we often needed external help. This caused delays in launching new services, and gave us less visibility over what was going on across our network,” said Webley.

Check Point’s security appliances with Next Generation Threat Prevention support a range of solutions to help businesses overcome the countless number of threats encountered in today’s IT environments — integrating more security functions, while improving bandwidth and accelerating network speeds.

“Check Point’s Next Generation Threat Prevention ensures that an organisation’s networks and data are fully protected against disruption and theft by advanced persistent threats and other types of malware and malicious code,” commented Simon Moor, Check Point Regional Director for UK and Ireland. “Our appliances make it easy for administrators to manage and provision security according to their evolving needs while maintaining complete end-to-end protection, and without compromising performance.”

If you would like to learn more about Check Point solutions and products, please contact a member of the Atomos Networks’ technical sales team on 0113 323 7722 or email sales@atomosnetworks.com

To learn more about Check Point Next Generation Threat Prevention

Follow Check Point via:

Check Point Blog: http://blog.checkpoint.com/
Twitter: http://www.twitter.com/checkpointsw
Facebook: http://www.facebook.com/checkpointsoftware
LinkedIn: https://www.linkedin.com/company/check-point-software-technologies

YouTube: http://www.youtube.com/user/CPGlobal

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the largest pure-play security vendor globally, provides industry-leading solutions, and protects customers from cyberattacks with an unmatched catch rate of malware and other types of attacks. Check Point offers a complete security architecture defending enterprises’ networks to mobile devices, in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes. At Check Point, we secure the future.

Infrastructure & Hosting

We deliver reliable and robust infrastructure and hosting. Our technical team can help design your network, or alternatively we have our own resilient Data Centre, where we can fully manage your hosted solution. Whatever your needs, we will accommodate them.

Structured Cabling

Our structured cabling services are designed to help untangle the process around relocating your business, or extending your existing computer cabling. We can assist you with designing and installing your structured Cat5e, Cat6 and Cat7 ethernet cabling, fibre optic cabling, or wireless network solutions for your voice and data network.

Borderless Networks

Workspace, as we know it, has changed dramatically in recent years. We can assist in the design and delivery of your borderless network, working with our partner Cisco. Our aim is to enable various services such as mobility, security and applications with our key vendor technologies, whilst simplifying operations, increasing productivity, and aiding the operational efficiency of your organisation.

Network Audits

We can perform a network checkup on your current network infrastructure. This includes throughput analysis, an assessment of any potential hardware limitations and floor port fluke tests future growth. We then consider the best options for future-proofing the new network as best as possible.