Check Point readies Secure Virtual Network

    Date28 Jun 2000
    4059
    Posted ByAnthony Pell
    Check Point Software Technologies is set for Phase II of its Secure Virtual Network (SVN) architecture for e-business application security, claiming it has advanced its SVN architecture to provide a common security backbone for e-business applications, such as SAP, Oracle, Citrix, . . . Check Point Software Technologies is set for Phase II of its Secure Virtual Network (SVN) architecture for e-business application security, claiming it has advanced its SVN architecture to provide a common security backbone for e-business applications, such as SAP, Oracle, Citrix, and Broadvision.

    The first products in this version of the SVN architecture are UserAuthority API and UserAuthority, which should be available in early July, according to Check Point.

    You are not authorised to post comments.

    LinuxSecurity Poll

    What is your favorite LinuxSecurity.com feature?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /component/communitypolls/?task=poll.vote&format=json
    17
    radio
    [{"id":"65","title":"Feature articles","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"66","title":"News","votes":"1","type":"x","order":"2","pct":33.33,"resources":[]},{"id":"67","title":"HOWTOs","votes":"2","type":"x","order":"3","pct":66.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.