Check Point GO is a USB drive that combines an encrypted
USB flash drive
A USB flash drive (also called a thumb drive) is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc. Most weigh less than . Since fir ...
with
virtualization
In computing, virtualization or virtualisation (sometimes abbreviated v12n, a numeronym) is the act of creating a virtual (rather than actual) version of something at the same abstraction level, including virtual computer hardware platforms, st ...
,
VPN
A virtual private network (VPN) extends a private network across a public network and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. The be ...
and
computer security
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, t ...
technologies to turn a
PC into a secure corporate desktop. By plugging Check Point GO into the USB port of a
Microsoft Windows OS-based PC or
laptop, users can launch a secure virtual workspace that is segregated from the host PC. This allows users to securely access company files and applications from any remote location, including insecure host environments such as a hotel business center or
Internet café
An Internet café, also known as a cybercafé, is a café (or a convenience store or a fully dedicated Internet access business) that provides the use of computers with high bandwidth Internet access on the payment of a fee. Usage is general ...
.
Check Point GO uses hardware and software
encryption
In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext, into an alternative form known as ciphertext. Ideally, only authorized parties can dec ...
to protect user credentials, documents, and other sensitive data, so that data cannot be compromised in transit or in the event the device is lost. The system uses an
authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
process that enforces minimum levels of
password
A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of ...
strength, as well as certificates and security tokens for multifactor authentication for remote connectivity. The device interfaces with
software
Software is a set of computer programs and associated software documentation, documentation and data (computing), data. This is in contrast to Computer hardware, hardware, from which the system is built and which actually performs the work.
...
on a corporate server to support company policies and security updates through security gateways.
History
Check Point GO (formerly Abra) was first introduced by
Check Point
Check Point is an American-Israeli multinational provider of software and combined hardware and software products for IT security, including network security, endpoint security, cloud security, mobile security, data security and security ma ...
Software Technologies Ltd. and
SanDisk Corporation
SanDisk is a brand for flash memory products, including memory cards and readers, USB flash drives, solid-state drives, and digital audio players, manufactured and marketed by Western Digital. The original company, SanDisk Corporation was acquire ...
in March 2010 to address security and compliance issues for companies with remote employees. Workers have been increasingly demanding remote access to company applications and data. Personal equipment accessing the network can pose a risk to corporate networks, creating a potential avenue for corporate data loss or allowing unsecure connections.
The companies cite that the Check Point GO system provides a solution for companies that want to let their employees purchase and manage their own PCs and laptops, for those needing high security (including encryption) for computing devices outside the workplace, as well as contractors/vendors who require access to the company network while working on site.
Since its release, the product has won industry awards including "IT Product of 2010" by Computerworld and was named one of the “25 Hot Products to Watch” at the 2010 RSA Conference by CRN Magazine.
Checkpoint GO went end-of-sale 31-DEC-2013, with support ending 31-DEC-2018
Technology Architecture
When Check Point GO is inserted into the
USB
Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply ( interfacing) between computers, peripherals and other computers. A broa ...
port of any PC, the user is presented with a
login
In computer security, logging in (or logging on, signing in, or signing on) is the process by which an individual gains access to a computer system by identifying and authenticating themselves. The user credentials are typically some form ...
screen. Upon successful login, a new explorer.exe instance is started in the Check Point GO Secure Workspace. All subsequent processes are started as child processes of this new explorer.
Check Point GO uses the software installed on the host PC to run applications such as
Microsoft Word
Microsoft Word is a word processing software developed by Microsoft. It was first released on October 25, 1983, under the name ''Multi-Tool Word'' for Xenix systems. Subsequent versions were later written for several other platforms includi ...
and
Microsoft Excel
Microsoft Excel is a spreadsheet developed by Microsoft for Windows, macOS, Android and iOS. It features calculation or computation capabilities, graphing tools, pivot tables, and a macro programming language called Visual Basic for ...
, but the user’s documents remain secure in the Check Point GO environment – a virtual workspace that runs parallel to the host environment. All file and registry input/output calls for the secure application inside Check Point GO are redirected to the
flash drive.
All applications running on the Check Point GO desktop (including the new explorer) operate in a virtual file system and registry. The virtual files and registry data are instantly written to the flash drive and immediately encrypted.
Currently, Check Point GO does not work on all Windows workstations, due to incompatibility with enterprise client settings.
Specifications
Awards
* It was distinguished with "The best international innovation" award at the 2010 Information Security Day (ITBN) conference in Hungary.
* It Received the Computerworld Czech Republic's annual "IT Product of the Year" in 2010.
See also
*
Check Point VPN-1
*
Circuit-level gateway
*
Comparison of firewalls
Comparison or comparing is the act of evaluating two or more things by determining the relevant, comparable characteristics of each thing, and then determining which characteristics of each are similar to the other, which are different, and t ...
*
Firewall
Firewall may refer to:
* Firewall (computing), a technological barrier designed to prevent unauthorized or unwanted communications between computer networks or hosts
* Firewall (construction), a barrier inside a building, designed to limit the spre ...
*
List of Linux router or firewall distributions
*
Packet
*
Sandbox (computer security)
In computer security, a sandbox is a security mechanism for separating running programs, usually in an effort to mitigate system failures and/or software vulnerabilities from spreading. The isolation metaphor is taken from the idea of children ...
*
Screened-subnet firewall
* Unified threat management
*
Virtual firewall
A virtual firewall (VF) is a network firewall service or appliance running entirely within a virtualized environment and which provides the usual packet filtering and monitoring provided via a physical network firewall. The VF can be realized as ...
References
{{Reflist, 2
Computer network security