table {
layout: fixed;
<table width="100%" cellspacing="15" cellpadding="10"><tr><td width="35%"><img src="" style="width:100%"></td><td width="65%"><p style="font-size:150%">"Since 1993, Check Point has been dedicated to providing customers with uncompromised protection against all types of threats, reducing security complexity and lowering total cost of ownership. We are committed to staying focused on customer needs and developing solutions that redefine the security landscape today and in the future."</p></td></tr></table>

Check Point understands that security needs to be agile, efficient, and anticipate the latest threats. Adding SecureAuth IdP to its extensible, scalable platform creates an extra layer of security between users and the VPN, and subsequently, the VPN's protected resources.

SecureAuth IdP integrates with third-party products to enable a VPN (Virtual Private Network) connection between a network and computer for end-users physically located outside of an organization. An SSL (Secure Socket Layer) VPN protocol used with SecureAuth IdP creates a secure HTTPS session from a PC web browser to the application server being accessed. Additional software is not required since the web browser is used as the client application.

The end-user submits credentials via a VPN client which contacts the VPN server to authenticate and connect the remote user to the internal network. The VPN connection employs strong encryption for the end-user's access to restricted, private data, thereby keeping this data secure from the other users of the underlying network, which might be a public network such as the Internet.

The Check Point provides an SSL VPN that establishes a secure remote access tunnel into the network and corporate resources, creating a protected access path to sensitive data.

SecureAuth IdP integrates with Check Point to enable 2-Factor Authentication for remote end-users to access network resources via RADIUS. With the Check Point RADIUS-enabled authentication, and SecureAuth IdP configured for OATH provisioning, end-users can securely log on the remote network using a one-time passcode.

When integrating via RADIUS Authentication, SecureAuth IdP acts as a RADIUS Server, authenticating users via the RADIUS protocol to securely enable access to a RADIUS Client (Check Point, for example).