<s>
Check	B-Protocol
Point	I-Protocol
Integrity	I-Protocol
is	O
an	O
endpoint	O
security	O
software	O
product	O
developed	O
by	O
Check	O
Point	O
Software	O
Technologies	O
.	O
</s>
<s>
It	O
is	O
designed	O
to	O
protect	O
personal	B-Device
computers	I-Device
and	O
the	O
networks	O
they	O
connect	O
to	O
from	O
computer	O
worms	O
,	O
Trojan	O
horses	O
,	O
spyware	O
,	O
and	O
intrusion	O
attempts	O
by	O
hackers	O
.	O
</s>
<s>
network	B-Architecture
access	O
controls	O
that	O
detect	O
and	O
remedy	O
security	O
policy	O
violations	O
before	O
a	O
PC	O
is	O
allowed	O
to	O
connect	O
to	O
a	O
network	B-Architecture
;	O
</s>
<s>
application	B-Application
controls	O
that	O
block	O
or	O
terminate	O
malicious	O
software	O
programs	O
before	O
they	O
can	O
transmit	O
information	O
to	O
an	O
unauthorized	O
party	O
;	O
</s>
<s>
a	O
personal	O
firewall	B-Application
;	O
</s>
<s>
and	O
instant	B-Application
messaging	I-Application
security	O
tools	O
.	O
</s>
<s>
An	O
administrator	O
manages	O
the	O
security	O
policies	O
that	O
apply	O
to	O
groups	O
of	O
users	O
from	O
a	O
central	O
console	O
and	O
server	B-Application
.	O
</s>
<s>
The	O
Integrity	O
software	O
,	O
released	O
in	O
early	O
2002	O
,	O
was	O
derived	O
from	O
the	O
ZoneAlarm	B-Protocol
security	O
technology	O
and	O
added	O
central	O
policy	O
management	O
and	O
network	B-Architecture
access	O
control	O
functions	O
.	O
</s>
<s>
Integrity	O
was	O
integrated	O
with	O
network	B-Application
gateways	I-Application
(	O
the	O
Cisco	O
VPN	O
3000	O
series	O
)	O
to	O
ensure	O
that	O
a	O
PC	O
met	O
security	O
requirements	O
before	O
it	O
was	O
granted	O
access	O
to	O
the	O
network	B-Architecture
.	O
</s>
<s>
Demand	O
for	O
endpoint	O
security	O
grew	O
in	O
2003	O
after	O
the	O
SQL	O
Slammer	O
and	O
Blaster	O
computer	O
worms	O
reportedly	O
caused	O
extensive	O
damage	O
,	O
despite	O
widespread	O
use	O
of	O
antivirus	B-Application
software	I-Application
on	O
personal	B-Device
computers	I-Device
.	O
</s>
<s>
Competitors	O
include	O
Symantec/Sygate	O
,	O
Cisco	O
Security	O
Agent	O
,	O
McAfee	O
Entercept	O
,	O
and	O
even	O
point	O
products	O
like	O
Determina	O
's	O
Memory	O
Firewall	B-Application
.	O
</s>
