博威---云架构决胜云计算

 找回密码
 注册

QQ登录

只需一步,快速开始

搜索
查看: 1815|回复: 0

Check Point Software Blade Architecture

[复制链接]
发表于 2009-2-27 19:20:42 | 显示全部楼层 |阅读模式
Check Point Software Blade ArchitectureThe industry's first flexible, extensible security architecture
Revolutionizing IT securityCheck Point is no stranger to IT security revolutions.  In the last 15 years, we created the stateful inspection technology that is still to date the foundation for the most robust firewall in the industry.  We transformed security management with our single console SmartCenter, we unified security gateways and introduced the first and only single agent for Endpoint security.  More recently, we delivered Total Security that offers uncompromised security, reduces complexity and improves overall efficiency.
In 2009, Check Point innovation continues with the introduction of the Software Blade Architecture.

Check Point Software Blade ArchitectureThe Check Point Software Blade architecture is the first and only security architecture that delivers total, flexible and manageable security solutions to companies of all sizes.
The Software Blade architecture provides customers with the ability to custom configure security solutions to meet their specific needs.
Security environments of large, medium and small companies are becoming more complex as companies try to keep up with new threat protections.  With each protection comes a new security solution, a new hardware platform, a new management console, and a new set of daily events to monitor.  Check Point's Software Blade architecture brings flexibility and further simplicity to customers by allowing them to select security applications that meet their needs and tailor them into a modular security solution that is managed centrally.  It enables lower cost of ownership with the ability to extend an existing security infrastructure with additional software blades without the need to procure new hardware.  
In brief it delivers the right level of protection at the right level of investment.

What is a software blade?A software blade is a security building block that is independent, modular and centrally managed. Software Blades are not physical but logical blades that you can select and custom configure into a solution based on your specific needs today. As these needs evolve you can extend your security solution by adding and activating new blades on the same infrastructure.

Check Point Security gateway R70
Key Benefits of the Check Point Software Blade Architecture
  • Flexibility – Provides the right level of protection at the right level of investment
  • Manageability – Enables fast deployment of security functions and increased productivity through central management of software blades
  • Total Security – Provides the right level of security, at all enforcement points, and at all layers of the network
  • Lower TCO - Protects investment by enabling consolidation and leveraging existing infrastructure
  • Guaranteed performance – Enables performance setting per blade to ensure guaranteed performance
How are Check Point Software Blades deployed?Software blades can be deployed on any Check Point UTM-1 or Power-1 appliances.  The new architecture can also run on any open servers of your choice and can be deployed in a virtualized environment.
New blades can be added to your gateway of choice by just enabling their functionality, without requiring upgrading hardware, firmware or drivers. The Check Point Software Blade architecture enables organizations to deploy security dynamically, as needed, with lower total cost of ownership.
您需要登录后才可以回帖 登录 | 注册

本版积分规则

小黑屋|手机版|Archiver|boway Inc. ( 冀ICP备10011147号 )

GMT+8, 2024-5-8 20:58 , Processed in 0.181270 second(s), 16 queries .

Powered by Discuz! X3.4

Copyright © 2001-2021, Tencent Cloud.

快速回复 返回顶部 返回列表