SOURCE: Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd.

November 25, 2009 14:00 ET

Media Alert: Check Point's ZoneAlarm Extreme Security Protects Against Unpatched Microsoft Internet Explorer Vulnerability "Summoner"

Check Point Browser Virtualization Technology Once Again Defends Consumers Against New Zero-Day Exploit Identified in Internet Explorer 6 and 7

REDWOOD CITY, CA--(Marketwire - November 25, 2009) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today announced that ZoneAlarm® Extreme Security protects consumers against the zero-day vulnerability in Microsoft Internet Explorer (IE). Check Point customers are preemptively protected from the unpatched threat that if exploited causes the browser to crash and leave systems vulnerable.

Also known as "Summoner," the still unpatched vulnerability can occur when Internet Explorer tries to access an object that has been deleted (or "summoned from the dead"). Successful exploitation of this vulnerability will crash the browser, and may allow execution of arbitrary code on the vulnerable system. Such arbitrary code execution can lead to a variety of possible consequences such as the transmission of spyware and viruses that can lead to identity theft and silent takeover of the victim's computer. To trigger the issue, an attacker may create a malicious web page that will cause IE to exit unexpectedly, leaving a given system vulnerable. The flaw affects widely used IE6 and IE7 running on Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008 and on Microsoft Windows 2000 SPT4 systems.

"Once again, Check Point's unique technology offers preemptive protection against new attacks that bypass traditional security suites," said Bari Abdul, vice president of consumer sales. "By placing a two-way 'bubble of security' around the browser, ZoneAlarm Extreme Security with virtualization technology, stops the download of malicious programs onto the victim's PC, delivering the highest level of protection needed to defend against constantly evolving Web-based threats."

ZoneAlarm Extreme Security successfully prevents against these types of attacks from damaging users' PCs or stealing their information through its unique virtualization technology. This technology, first introduced in ZoneAlarm ForceField, is able to identify any downloads that the user doesn't know about or invite. It redirects unwanted malware to a "sandbox" where it remains trapped and cannot harm the operating system. Although products with anti-virus can stop currently known attack vectors that exploit this latest Microsoft IE vulnerability, it still leaves the user exposed to new strains. Check Point delivers anti-virus protection and then goes further with browser security technology that completely stops this threat at the source, blocking not yet known strains and attack vectors. For more information or to download ZoneAlarm Extreme Security please visit: http://www.zonealarm.com/security/en-us/zonealarm-extreme-security.htm.

About Check Point Software Technologies Ltd.
Check Point Software Technologies Ltd. (www.checkpoint.com), worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

©2009 Check Point Software Technologies Ltd. All rights reserved.

Contact Information