Türkmenler
English
Azərbaycan
Shqiptare
Հայերեն
Български
ქართული
қазақ
Кыргызча
Македонски
Румынский
Монгол
Русский
Српски
Slovenščina
Тоҷикӣ
Türk
Türkmenler
o'zbek
Українська
Hrvatski
MUK
  • Ýurtlar
    al.pngAlbaniýaam.svgErmenistanaz.svgAzerbaýjanbg.pngBulgariahr.pngHorwatiýage.svgGruziýakz.pngGazagystankg.pngGyrgyzystanmk.pngNorth Macedoniamd.pngMoldowamn.pngMongoliýaae.pngUnited Arab Emiratesrs.pngSerbiýasi.pngSloweniýatj.pngTäjigistantr.svgTürkiýetm.pngTürkmenistanhu.pngWengriýaua.pngUkrainauz.svgÖzbegistan
  • Çözgütler
    MUK satyjylaryMUK çözgütleriÖnümleriň we hyzmatlaryň katalogy
  • Habarlar
    Habarlar we paýnamalarMUK žurnalyWideo
  • Ugurlar
    IT paýlanyşyOkuw merkeziHyzmat merkeziMUK bulut hyzmatlary
  • Kompaniýa hakda
    MUK hakda esasy pikirlerKorporatiw profilIşler
  • Dealer section
    al.pngAlbaniýaam.svgErmenistanaz.svgAzerbaýjanbg.pngBulgariahr.pngHorwatiýage.svgGruziýakz.pngGazagystankg.pngGyrgyzystanmk.pngNorth Macedoniamd.pngMoldowamn.pngMongoliýaae.pngUnited Arab Emiratesrs.pngSerbiýasi.pngSloweniýatj.pngTäjigistantr.svgTürkiýetm.pngTürkmenistanua.pngUkrainauz.svgÖzbegistan

Check Point

YGTYÝARLY PAÝLAÝJY

https://www.checkpoint.com/

  • AzerbaýjanAzerbaýjan
  • GazagystanGazagystan
  • MoldowaMoldowa
  • TürkmenistanTürkmenistan
  • UkrainaUkraina

Check Point Software Technologies offers a comprehensive solution system that protects the information, corporate network resources, remote users and business communications. Among the company's strategic products are a security gateway (which can be either a hardware firewall or a virtual device for private and public clouds), a single security client to protect network endpoints and remote workers and a single console for managing all security tools from one point.

MAIN ACTIVITIES:

  • Secure web gateways with extensible functionality (UTM devices)
  • Devices to protect against zero-day threats, unknown and targeted attacks by analyzing the behavior of files (sandbox)
  • Remote access gateway/blade
  • Server for centralized security policy management and log files analysis
  • Protection against account hijacking, malware, zero-day threats and confidential data leaks for corporate cloud applications Office 365, G Suite, etc. (Harmony Email&Collaboration)
  • Comprehensive protection of private virtual environments from VMware, Cisco, Open Stack, Microsoft, etc., as well as public cloud infrastructure AWS, Microsoft Azure, Oracle, Google, etc. (CloudGuard Network)
  • Ensuring secure work from mobile devices, protecting access to company documents
  • Unified Endpoint Security clients to protect workstations (antivirus, HDD and USB encryption, port control, traffic filtering, protection against zero-day threats and ransomware, incident analysis)
  • Specialized solutions to ensure the threats detection and prevention in SCADA and IoT (Internet of Things) systems

MUK çözgütleri

server_equipment.jpg

Serwer enjamlary

data_storage_and_availability.jpg

Maglumatlary saklamak we elýeterlilik

network_hardware.jpg

Tor enjamlary

wireless_networks.jpeg

Simsiz torlar (Wi-Fi)

internet_of_things.jpg

Zatlar interneti (IoT)

information_security.jpg

Maglumat howpsuzlygy

virtualization_and_sys_software.jpg

Wirtuallaşdyrma we ulgam programma üpjünçiligi

hyper_converged_infrastructure.jpg

Гиперконвергентная инфраструктура

working_with_data.jpg

Maglumat bilen işlemek

application_software.jpg

Programma üpjünçiligi

it_management_systems.jpg

IT dolandyryş ulgamlary

enterprise_cloud_products.jpg

Kärhananyň bulut önümleri

workplaces.jpg

Iş ýerleri

office_solutions.jpg

Ofis çözgütleri

unified_communications.jpg

Bitewi aragatnaşyk

engineering_infrastructure.jpg

Maglumat merkeziniň in Inženerçilik infrastrukturasy

optical_networks.jpg

Optiki torlar

structured_cabling_systems.jpg

Düzülen kabel ulgamlary (SCS)

physical_security.jpg

Fiziki howpsuzlyk

business_automation.jpg

Işewürligi awtomatlaşdyrmak

medical.jpg

Medical equipment

© 2008-2025 MUK. Ähli hukuklar goralandyr.