Румынский
English
Azərbaycan
Shqiptare
Հայերեն
Български
ქართული
қазақ
Кыргызча
Македонски
Румынский
Монгол
Русский
Српски
Slovenščina
Тоҷикӣ
Türk
Türkmenler
o'zbek
Українська
Hrvatski
MUK
  • Țări
    al.pngAlbaniaam.svgArmeniaaz.svgAzerbaijanbg.pngBulgariahr.pngCroatiage.svgGeorgiakz.pngKazakhstankg.pngKyrgyzstanmk.pngNorth Macedoniamd.pngMoldovamn.pngMongoliahu.pngUngariaae.pngUnited Arab Emiratesrs.pngSerbiasi.pngSloveniatj.pngTajikistantr.svgTurkeytm.pngTurkmenistanua.pngUkraineuz.svgUzbekistan
  • Solutii
    Vendorii MUKSolutii MUKCatalogul produselor si a serviciilor
  • Noutăți
    Noutăți și oferteMUK journalVideo
  • ACTIVITIES
    Distributie ITTraining centerService CentruMUK Cloud services
  • Despre companie
    Informatie de baza despre MUKProfil corporativOferte de munca
  • Sectia Dealeri
    al.pngAlbaniaam.svgArmeniaaz.svgAzerbaijanbg.pngBulgariahr.pngCroatiage.svgGeorgiakz.pngKazakhstankg.pngKyrgyzstanmk.pngNorth Macedoniamd.pngMoldovamn.pngMongoliaae.pngUnited Arab Emiratesrs.pngSerbiasi.pngSloveniatj.pngTajikistantr.svgTurkeytm.pngTurkmenistanua.pngUkraineuz.svgUzbekistan

Check Point

DISTRIBUITOR AUTORIZAT

https://www.checkpoint.com/

  • AzerbaijanAzerbaijan
  • KazakhstanKazakhstan
  • MoldovaMoldova
  • TurkmenistanTurkmenistan
  • UkraineUkraine

Check Point Software Technologies offers a comprehensive solution system that protects the information, corporate network resources, remote users and business communications. Among the company's strategic products are a security gateway (which can be either a hardware firewall or a virtual device for private and public clouds), a single security client to protect network endpoints and remote workers and a single console for managing all security tools from one point.

MAIN ACTIVITIES:

  • Secure web gateways with extensible functionality (UTM devices)
  • Devices to protect against zero-day threats, unknown and targeted attacks by analyzing the behavior of files (sandbox)
  • Remote access gateway/blade
  • Server for centralized security policy management and log files analysis
  • Protection against account hijacking, malware, zero-day threats and confidential data leaks for corporate cloud applications Office 365, G Suite, etc. (Harmony Email&Collaboration)
  • Comprehensive protection of private virtual environments from VMware, Cisco, Open Stack, Microsoft, etc., as well as public cloud infrastructure AWS, Microsoft Azure, Oracle, Google, etc. (CloudGuard Network)
  • Ensuring secure work from mobile devices, protecting access to company documents
  • Unified Endpoint Security clients to protect workstations (antivirus, HDD and USB encryption, port control, traffic filtering, protection against zero-day threats and ransomware, incident analysis)
  • Specialized solutions to ensure the threats detection and prevention in SCADA and IoT (Internet of Things) systems

Solutii MUK

server_equipment.jpg

Server equipment

data_storage_and_availability.jpg

Data storage and availability

network_hardware.jpg

Network hardware

wireless_networks.jpeg

Wireless networks (Wi-Fi)

internet_of_things.jpg

Internet of Things (IoT)

information_security.jpg

Information Security

virtualization_and_sys_software.jpg

Virtualization and system software

hyper_converged_infrastructure.jpg

Hyper-Converged Infrastructure

working_with_data.jpg

Working with data

application_software.jpg

Application software

it_management_systems.jpg

IT management systems

enterprise_cloud_products.jpg

Enterprise cloud products

workplaces.jpg

Workplaces

office_solutions.jpg

Office Solutions

unified_communications.jpg

Unified communications

engineering_infrastructure.jpg

Engineering infrastructure of the data center

optical_networks.jpg

Optical networks

structured_cabling_systems.jpg

Structured cabling systems (SCS)

physical_security.jpg

Physical security

business_automation.jpg

Business automation

medical.jpg

Medical equipment

© 2008-2025 MUK. All rights reserved.