Talk:Check Point/Archive 1

Latest comment: 4 years ago by Rafi.kretchmer in topic Changes to Check Point page
Archive 1

Trivia section removed

I just removed the entire non-encyclopedic and ridiculous trivia section. Anyone who wants to add it back in a responsible manner, please do so. 68.8.108.62 07:43, 28 February 2007 (UTC)

Trivia

  • At about 2000, a Check Point anthem song was produced, most likely by Check Point. The performers have an outrageous Israeli accent, so it is very likely to have been produced in Israel. The song was used at several internal Check Point occasions, around those years (2000 summer party in Israel, 2001 South Africa company trip, etc.). In recent years the song is not used anymore, and everyone are thankful for that. It is not known to have been used in any public events, so this probably should not be considered an official anthem. It can be heard here: http://anthems.zdnet.co.uk/anthems/checkpoint.mp3
  • Not sure that it wasn't used in any public events, did go to the annual partner bash a.k.a. Check Point experience, this song was played endlessly during this event.
  • In 2006, Check Point and Microsoft conspired to eliminate support for the Windows 98 operating system, leaving 40% of the world's computer users vulnerable to a massive internet attack allowing Windows 98 users' computers to be comprised, resulting in large scale identity theft and denial of service attacks on all internet connected computers. It was felt at the time that Microsoft was attempting to force Windows 98 users to upgrade to the soon to be released Vista operating system.
You may need to take medication if you seriously think that TCP and UDP are the protocols of the learned elders of Zion! The wonderful conspiracy theory you formulated above will definitely please some arab whackos, however. On the other hand, all sane people realize that Windows 98 was merely a dressed-up edition of MS-DOS and thus impossible to make network-secure by design (or lack of).
  • In 2007, Senator Joe Lieberman, head of the Senate's Homeland Security Committee was contacted and told of the severe threat to the internet and internet users' computers that the Microsoft - Check Point failure to protect Windows 98 systems meant. Due to Check Point being an Israeli company, Senator Lieberman refused to take-up the matter.
Do you really need to spread anti-semitism here? 82.131.210.162 (talk) 20:45, 25 February 2008 (UTC)
How is that anti-semitism? Better that he not address the issue that be accused later of favortism or be forced to recant his involvement.Brinlong (talk) 17:35, 6 March 2008 (UTC)

A bit of a disaster here?

Wiki makes me laugh. You are so obviously biased as to be laughable. Why for example does cisco page allow mention of products, and yet Check point mention is immediately edited?? Hmmm. Wiki is flawed and insignificant. This comment will no doubt be edited as the censorship continues. Pathetic. —Preceding unsigned comment added by 76.184.226.122 (talk) 02:00, 28 May 2008 (UTC)

I don't know who deleted the {{advert}} tag I put on the "Major products" section, but this article still needs some serious cleanup. Here are some choice quotes:

  • Check Point offers a security solution to address the full spectrum of information security risk, from home users and small office to large distributed enterprise and ISP environments.
  • Check Point Software is the only information security vendor in the world with a focus on Pure Security.
  • VPN-1 Power security gateways provide an active defense that secures the most demanding sites ...
  • ... intrusion prevention technologies with advanced acceleration technologies to ensure that business information flows efficiently without compromising security.
  • ... provides a secure access solution for carriers deploying next generation infrastructures ...
  • ... the proven security of check point's firewall and intrusion prevention technologies ...
  • By combining SSL VPN connectivity and security in one solution, organizations can effectively deploy SSL VPN's safely and securely to a diverse set of users while ensuring the confidentiality and integrity of corporate information that is critical to business success.
  • Centrally managed endpoint security and network access control based on the defenses in Zone Alarm, the worlds most trusted PC security suite.
  • All solutions include a Check Point patented Stateful Inspection firewall, VPN, policy controlled gateway antivirus, user-friendly Web-based management, optional integrated ADSL2/2+ modem and much more.
  • By combining market-leading firewall, VPN, intrusion prevention, and antivirus technologies with advanced networking and connectivity features in a single solution, VPN-1 UTM Edge ensures remote sites stay as secure as the corporate site.
  • PN-1 UTM Edge Wireless (W) security appliances deliver the same security found in VPN-1 UTM Edge appliances with the highest levels of security for wireless networks.

I could keep going, but I don't think it's necessary; if those don't qualify as advertising, I don't know what does. --Aaron Rotenberg 03:44, 3 December 2007 (UTC)

I agree that a lot of that has a heavy advertising focus. Also "Check Point Software is the only information security vendor in the world with a focus on Pure Security" doesn't even mean anything - "pure security" just the company's current tag line. The tag line may be of relevance but not in this sentence. Gavint0 (talk) 21:15, 30 December 2007 (UTC)

Fair use rationale for Image:Check point logo.gif

 

Image:Check point logo.gif is being used on this article. I notice the image page specifies that the image is being used under fair use but there is no explanation or rationale as to why its use in this Wikipedia article constitutes fair use. In addition to the boilerplate fair use template, you must also write out on the image description page a specific explanation or rationale for why using this image in each article is consistent with fair use.

Please go to the image description page and edit it to include a fair use rationale. Using one of the templates at Wikipedia:Fair use rationale guideline is an easy way to insure that your image is in compliance with Wikipedia policy, but remember that you must complete the template. Do not simply insert a blank template on an image page.

If there is other fair use media, consider checking that you have specified the fair use rationale on the other images used on this page. Note that any fair use images lacking such an explanation can be deleted one week after being tagged, as described on criteria for speedy deletion. If you have any questions please ask them at the Media copyright questions page. Thank you.

BetacommandBot (talk) 20:55, 13 February 2008 (UTC)

I added the requested rationale to the image. --pabouk (talk) 09:55, 14 February 2008 (UTC)

Removed text from Competitors section

Removed this statement from the Competitors section

Note: While the above vendors do offer various products that compete with Check Point Software Technologies in various niches, i.e. network firewall, none of the vendors provide the depth or breadth of pure data security solutions that would mark them as a true competitor.

The statement lacks a NPOV and lacks cited sources. Such a broad statement (opinion) should be able to be verified by at least one reliable source. Perhaps if the editor is correct and the companies listed are not true competitors, then the whole section titled "Competitors" should be removed?

With appropriate, reliable, third-party sources the deleted text would see a welcome return to the article.
Bleakcomb (talk) 00:16, 24 February 2008 (UTC)

What happened to this article?

I checked this a few months ago and it seemed well written and informative... now it's a stub. I think a high level list of their product lines, a history of their acquisitions and the interesting story of their abortive attempt to acquire SourceFire would all be good additions. NDLunchbox (talk) 03:59, 5 June 2008 (UTC)

I've started to build up the article again whilst trying to maintain a NPOV. Gavint0 (talk) 15:17, 12 October 2008 (UTC)

Hello fellow Wikipedians,

I have just added archive links to one external link on Check Point. Please take a moment to review my edit. If necessary, add {{cbignore}} after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}} to keep me off the page altogether. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}).

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—cyberbot IITalk to my owner:Online 09:12, 29 February 2016 (UTC)


2016 product line additions BuildingConsensus

Recent edits by user BuildingConsensus appear to be accurate and sourced correctly. Why have they been removed when they are not incorrect? — Preceding unsigned comment added by 89.46.102.14 (talk) 19:49, 19 November 2016 (UTC)

Hello fellow Wikipedians,

I have just modified 7 external links on Check Point. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—InternetArchiveBot (Report bug) 00:00, 4 August 2017 (UTC)

Bringing the article up to date

I work for Check Point Software, and I would like to help improve the article. I'm aware of Wikipedia's standards around conflict of interest, and do not wish to introduce bias in the article; at the same time, I may have some insights that can help improve the article. I will be making some suggestions here in the coming weeks. -Cindy (talk) 17:43, 6 April 2018 (UTC)

Almost entire article sounds like it's written by the PR/Sales staff at Check Point

The beginning of the article reads "Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.", that sounds exactly like what a PR specialist or salesman would write to push the products at Check Point. I really doubt Check Point "pioneered the [IT Security ]industry", how does one even pioneer an entire industry on one's own?

I feel like the whole article could be salvaged just by removing the Products section, or at least by replacing it with a more general overview of the products, devoid of marketing descriptions. The History and other sections seem more or less OK --FeldBum (talk) 03:04, 23 October 2012 (UTC)
Both this page and the Palo Alto Networks page are a disaster. Their products are both widely used in industry - does no one have anything non-PR fluff to add to these two pages? 82.97.37.7 (talk) 22:30, 4 July 2015 (UTC)
I work for a Scandinavian reseller that sells Check Point products, so I am not going to edit this article, but I wonder about bias myself. One thing more: In the beginning of the article some competitors are mentioned in the AV-industry. I can tell you that Check Point could care less about those vendors. The competition that Check Point care about is in the hardware firewall industry and are named Palo Alto and Fortinet (and to a lesser degree Cisco). — Preceding unsigned comment added by 194.239.255.130 (talk) 09:14, 11 March 2016 (UTC)

As I noted below, I'm the head of corporate marketing for Check Point. I also don't want this article to appear to be PR or sales jargon. It appears that the product section in question has been significantly pared back in October 2016, and is now devoid of marketing descriptions. It appears the problem has been resolved, but please let me know if it needs additional attention. Cindy (talk) 19:27, 9 May 2018 (UTC)

Changes to Check Point page - Products section

Hi, following a conversation with john of Reading, I would like to suggest edits to the product section of the Check Point Wikipedia page. to begin with, I am declaring i am currently employed by Check Point as the Head of Product marketing. my main intention is to ensure the factual accuracy of the Check Point Portfolio of products. The product section was not updated for a long time and I want to make sure it accurately represents our offering to date (2020) for the update suggested below I am suggesting an objective and neutral language that has no marketing appeal to it, nor it discusses any superlatives or sales bias.

Under network Security add the following: Next Generation Firewall – running GAiA OS, R80.x software [12], Check Point next generation firewalls and software platforms support small businesses (SMB) to large enterprise data center and telco-grade environments. Each security gateway includes next generation firewall, IPS, VPN, WAF, SSL, and Data Security (DLP) as well as threat prevention technologies blocking known and unknown a cyber-attacks. The security gateways are available as a cloud service, software-only products that can run on standard hardware, or dedicated security gateway hardware appliances. [13]

Relevant Citations: [12] https://www.checkpoint.com/products/cyber-security-management/ [13] https://www.checkpoint.com/products/next-generation-firewall/

Many thanks for your consideration of this change Product marketing at Check Point (talk) 12:08, 13 February 2020 (UTC)

Reply 14-FEB-2020

   Clarification requested  

  • The proposal cannot be evaluated because many of the described terms are not Wikilinked.[a] To that end, kindly link acronyms and other technical terms with their respective Wikilinks in your proposal.
  • As the proposed text makes claims to these product's functionality and compatibility — and thus, are making claims about the product's inherent value — please provide references from reliable, independent, WP:SECONDARY sources.

Regards,  Spintendo  09:52, 14 February 2020 (UTC)

Notes

  1. ^ If the terms appeared earlier on the article's page, then Wikilinks would not normally be needed. However, that guidance is relative: Regardless of whether the terms already exist on the article's page, the terms do not appear previously on this talk page — thus they ought to be Wikilinked.

Reply 19-FEB-2020

Hi Spintendo thanks much for your response. this is highly appreciated as I make my first strides with Wiki editing below is a revised text edits based on your guidelines:

Extended content

Next Generation Firewall – running R80.x software [12], Check Point next generation firewalls and software platforms support small businesses (SMB) to large enterprise data center and telco-grade environments. [1]

Each security gateway includes next generation firewall, IPS, VPN, WAF, SSL, and Data Security (DLP) as well as threat prevention technologies blocking known and unknown a cyber-attacks. The security gateways are available as a cloud service, software-only products that can run on standard hardware, or dedicated security gateway hardware appliances. [2]


The Gartner Magic Quadrant should cover the claims on support for SMB, data center and Telco grade environments. it also supports the last claim on availability on cloud and software only

References

  1. ^ Hils, Adam. "Magic Quadrant for Network Firewalls", Gartner, Published: 17 September 2019. ID:G00375686
  2. ^ Hils, Adam. "Magic Quadrant for Network Firewalls", Gartner, Published: 17 September 2019. ID:G00375686

many thanks for your support with this change

User:Rafi.kretchmer (talk) 13:03, 16 February 2020 (UTC)

Thank you for providing the needed Wikilinks, it is much appreciated. What is also missing is the page number for this reference. Please advise. Regards,  Spintendo  19:57, 20 February 2020 (UTC)
Thank you Spintendo. the relevant pages in the Gartner magic Quadrant are 5-7

[1] Please let me know if additional information is required Product marketing at Check Point (talk) 07:26, 23 February 2020 (UTC)

Changes to Check Point page

I was requested by user:spintendo to add the page number for the Gartner Magic Quadrant reference The relevant pages in the Gartner magic Quadrant are 5-7 below is the full edit request including all citations and links to internal pages

Next Generation Firewall – Running R80.x software [12], Check Point next generation firewalls and software platforms support small businesses (SMB) to large enterprise data center and telco-grade environments. [2] Each security gateway includes next generation firewall, IPS, VPN, WAF, SSL, and Data Security (DLP) as well as threat prevention technologies blocking known and unknown a cyber-attacks. The security gateways are available as a cloud service, software-only products that can run on standard hardware, or dedicated security gateway hardware appliances. [3]

Product marketing at Check Point (talk) 13:59, 24 February 2020 (UTC)

References

  1. ^ Hils, Adam. "Magic Quadrant for Network Firewalls", Gartner, Pages 5-7, Published: 17 September 2019. ID:G00375686
  2. ^ Hils, Adam. "Magic Quadrant for Network Firewalls", Gartner, Pages 5-7, Published: 17 September 2019. ID:G00375686
  3. ^ Hils, Adam. "Magic Quadrant for Network Firewalls", Gartner, Pages 5-7, Published: 17 September 2019. ID:G00375686

Reply 25-FEB-2020

   Clarification requested  

  • The requested prose contains a number within brackets ([12]). This number is not linked to anything on the talk page. Text which is proposed to be added to an article should not contain extraneous numbers, or if it does, these should link to references which are provided on the talk page.
  • The references are duplicates. When one reference is repeated, it should use the |ref name= parameter for its ref tag.
  • There are other items which are not Wikilinked, specifically, the terms large enterprise data center, telco-grade environments and dedicated security gateway hardware appliances. Please advise.

Regards,  Spintendo  11:16, 25 February 2020 (UTC)

Reply 25-FEB-2020

   Addressing your request   Here is the revised text

Next Generation Firewall – Running R80.x software, Check Point next generation firewalls and software platforms support small and medium businesses (SMB) to large enterprise data center and carrier-grade environments. [1] Each security gateway includes next generation firewall, IPS, VPN, WAF, SSL, and Data Security (DLP) as well as threat prevention technologies blocking known and unknown cyber-attacks. The security gateways are available as a cloud service, software-only products that can run on standard hardware, or dedicated security gateway hardware appliances.[1] Product marketing at Check Point (talk) 11:54, 25 February 2020 (UTC)

  1. ^ a b Hils, Adam. "Magic Quadrant for Network Firewalls", Gartner, Pages 5-7, Published: 17 September 2019. ID:G00375686