CC Otwarte Systemy Komputerowe Sp. z o.o. - CC Open Computer Systems Ltd. is a privately owned limited company based in Warsaw, Poland.
CC is a software house and IT services company - providing secure IT solutions to Enterprises. We are an independent software vendor and system integrator.
We specialize in software development and system security, our main target markets are: banking and finance, government & non-profit, Telco & SP.
Check Point Software Technologies Ltd. (www.checkpoint.com) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.
|CC Open Computer Systems Ltd. has a status of "Check Point Silver Partner". Currently we employ 4 certifed Check Point engineers. We support the whole range of Check Point products on the territory of Poland.|
Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.
Today's organizations face an increasing number of threats across their network - at the perimeter, across the LAN and WAN, and at endpoints. Protecting them all can result in security sprawl, an ever-increasing set of product that are hard to manage and result in inconsistent security.
Check Point Network Security Solutions are the market-leading choice for securing the network infrastructure. Check Point's firewall security products offer advanced security features such as integrated intrusion prevention, virtualization, gateway antivirus, anti-spam, web content filtering, as well as IPsec and SSL VPN remote access for computers and mobile devices. Check Point also offers standalone intrusion prevention and SSL VPN solutions as part of the unified security architecture. With a unified architecture, our network security solutions provides core technologies that enable you to deploy a consistent, high level of security throughout your entire organization.
Enterprise businesses and government agencies around the world face the certainty of losing sensitive data from a lost laptop, removable media or other plug-and-play storage device. This drives the need for a complete data protection solution that secures data on all common platforms, deploys easily, scales to any size organization and meets strict compliance requirements related to privacy laws and regulations.
Check Point Endpoint Security solutions provide data protection for laptops, PCs, removable media and mobile devices. Our independently certified data security products ensure that our enterprise, government and law enforcement customers remain in compliance with regulatory standards. By leveraging a strong and efficient blend of full disk encryption, access control, removable media encryption and port management, Check Point Endpoint Security solutions deliver comprehensive data security.
Check Point Endpoint Security is the first and only single agent that combines all essential components for total security on the endpoint: highest-rated firewall, antivirus, anti-spyware, full disk encryption, media encryption with port protection, network access control (NAC), program control and VPN. Check Point Endpoint Security protects PCs and eliminates the need to deploy and manage multiple agents, reducing total cost of ownership.
Today's organizations have a complex security management challenge on their hands. They need to orchestrate a broad range of security processes and technologies to secure their organizations in the face of increasing pressure to demonstrate compliance with a host of new regulations. More important, organizations must mitigate risk and maximize security in a way that ensures business continuity, maintains budgets, and achieves operational efficiencies across the board. Check Point security management solutions are designed as an interoperable system based on a core unified security architecture which enables the central control of security policy across multiple layers of the infrastructure. This enables organizations to achieve maximum security effectiveness through the efficient day-to-day monitoring and updating of security policy and defenses. A central console provides administrators with total visibility across their security infrastructure, providing evidence of proper security controls and highlighting potential weaknesses in their defense system.