Talk:Check Point Integrity

where should checkpoint be ideally placed in the network??? Should it be after the router or after the firewall and VPN concentrator??

The subject of the article "Check Point Integrity™ runs on a client (XP) and can work with VPN software on the same client. What depth of defense upstream of the client, firewalls, routers, etc. is up to you. ji

Article Reads Like an Advertisement
The first sentence in the article is "Check Point Integrity™ is an endpoint security software product developed by Check Point Software Technologies". This seems like a contradiction to the first sentence of the second paragraph "Check Point acquired the Integrity software as part of its acquisition of endpoint security start-up Zone Labs in 2004". Maybe Check Point has put some additional development work into the product however; I see the purchase as an effort to thwart competition since they already had a competing product “SecureClient”. The name, “SecureClient” seems to have since been tied to the acquired Check Point Integrity™ product. Or did they only use the “Integrity” name? I have to ask whether Check Point will follow their usual pricing policies to a smaller portion of this market too. ji

External links modified
Hello fellow Wikipedians,

I have just modified 1 one external link on Check Point Integrity. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
 * Added archive https://web.archive.org/web/20061028011219/http://www.infoworld.com:80/article/05/12/05/49TCendpoint_1.html?source=NLC-SEC2005-12-05 to http://www.infoworld.com/article/05/12/05/49TCendpoint_1.html?source=NLC-SEC2005-12-05

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at ).

Cheers.— InternetArchiveBot  (Report bug) 23:52, 20 November 2016 (UTC)