The Check Point Firewall Software Blade builds on the award-winning technology first offered in Check Point’s FireWall-1 solution to provide the industry’s strongest level of gateway security and identity awareness. Check Point’s firewalls are trusted by 100% of the Fortune 100 and deployed by over 170,000 customers, and have demonstrated industry leadership and continued innovation since the introduction of FireWall-1 in 1994.
Check Point invented the stateful packet inspection technology that is utilized by virtually all firewalls today. A long-time leader in Gartner’s Enterprise Network Firewalls Magic Quadrant, Check Point is recognized by the leading analyst firm for its strong technology leadership and vision, and has won multiple awards from other analyst firms over the years. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
Proven gateway security with industry-leading firewall performance
- Protects over 170,000 customers and 100% of Fortune 100
- Includes patented stateful packet inspection
- Up to 40 Gbps firewall throughput with real-world traffic mix (IMIX)
User and machine identity awareness balance security and business need
- Enables granular policy definitions per user and group
- Seamless integration with Active Directory
- Ideal for protecting environments with social media and Internet applications
Integrated into Check Point Software Blade Architecture
- Centralized management, logging and reporting via a single console
- Automatic activation of Firewall Software Blade on security gateway systems
- Supported gateways include: UTM-1, Power-1, IP Appliances and IAS Appliances
For additional details on Checkpoint solutions please visit: www.checkpoint.com
Check Point IPS Software Blade
The Check Point Intrusion Prevention System (IPS) Software Blade combines industry-leading IPS protection with breakthrough performance at a lower cost than traditional, stand-alone IPS solutions. The IPS Software Blade delivers complete and proactive intrusion prevention—all with the deployment and management advantages of a unified and extensible next-generation firewall solution.
Next-generation security prevention, protection and performance
- Industry-leading IPS and firewall—as tested NSS Labs—delivers 1,000s of signature, behavioral and preemptive protections
- Check Point is ranked #1 in Microsoft and Adobe threat coverage
- Combines with best-of-breed firewall, application control, URL filtering, DLP and more on the most comprehensive, network-class next gen firewall
Unrivaled, multi-Gigabit performance in an integrated IPS
- Up to 15 Gbps of IPS and 30 Gbps of firewall throughput
- Stateful Inspection and SecureXL technology deliver multi-tier IPS inspection and accelerated IPS throughput
- CoreXL technology provides the most efficient and high-performance use of multi-core technologies
Lowest TCO and fastest ROI of any enterprise-class firewall solution
- One-click activation of IPS and firewall protection on any Check Point gateway
- Delivers unmatched extensibility and flexibility—all without adding CapEx
- Integrated into Check Point Software Blade Architecture for on-demand security
For more details please visit: www.checkpoint.com
Check Point GO
Check Point GO instantly turns any PC into your corporate desktop, allowing users to access files and applications anywhere, anytime. Its plug-and-play USB form factor allows users to easily launch a secure virtual workspace that keeps mobile data secure by segregating the virtual workspace from the host PC. Users can work offline from the encrypted USB drive or online using the Check Point GO integrated VPN client.
Instantly turn any PC into your own corporate desktop
- Stay productive online and offline with a simple, encrypted USB stick
- Go mobile without the weight of laptops or work files
- Access files and applications anywhere, anytime with integrated VPN connectivity
Virtual workspace that keeps mobile data secure
- Provides software and hardware encryption
- Segregates your virtual workspace from the host PC
- Controls applications and data that can run on Check Point GO
Ideal for mobile workers, contractors and disaster recovery
- Ideal for mobile workers, contractors and disaster recovery
- Rapidly recover from disaster by making workers productive from home
- Contractors can securely access corporate files and applications from their own PCs
For more details please visit: www.checkpoint.com