Webopedia on Google+Webopedia on TwitterWebopedia on FacebookTech Bytes Blog
Main » TERM » C »

Content Vectoring Protocol

First developed by Check Point Software in 1996 as a protocol specification for integration with anti-virus servers. Check Point first utilized its Content Vectoring Protocol (CVP) in its FireWall-1 Version 3.0 and then developed CVP into an API specification.

The CVP API defines an asynchronous interface to server applications that perform file content validation. An important feature of this is scanning files for viruses or harmful applets as they pass through firewalls. The CVP defines a client/server relationship that enables different firewall systems to share a common content validation server. In essence, the one content validation server collects from multiple firewalls the incoming files that have been flagged for inspection.







TECH RESOURCES FROM OUR PARTNERS
DID YOU KNOW?
Hype Versus Action in the Developer's World

Often times technologies start as hype but with time become adopted. As a developer or technologist, it is worth reading the hype and knowing the... Read More »

Microsoft Hyper-V Network Virtualization Q&A

The top 5 Hyper-V questions with answers provided by Nirmal Sharma, a MCSEx3, MCITP and Microsoft MVP in Directory Services. Read More »

Storage Trends: Solid State and Software Defined

Solid state drives and software defined storage are two leading trends in the rapidly growing storage market.  Read More »

QUICK REFERENCE
How to Create a Desktop Shortcut to a Website

Creating desktop shortcuts to a websites is useful. When you double-click the icon from your desktop it automatically launches the browser and... Read More »

Flash Data Storage Vendor Trends

Although it is almost impossible to keep up with the pace of ongoing product releases, here are three recent highlights in the flash data storage... Read More »

15 Important Big Data Facts for IT Professionals

Keeping track of big data trends, research and statistics gives IT professionals  a solid foundation to plan big data projects. Here are 15... Read More »