Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/27/2009
02:29 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point Introduces New Line Of Security Management Appliances

Smart-1 appliances unify network, IPS, and endpoint security policy management and provide up to 12 TB of integrated storage

Check Point' Software Technologies Ltd. (Nasdaq:CHKP), the worldwide leader in securing the Internet, today announced the Check Point Smart-1 security management appliance line. The new line of four appliances are the first to offer enterprises an extensible solution that unifies network, IPS and endpoint security policy management and provide up to 12 terabytes (TB) of integrated log storage. Through Smart-1 appliances, businesses can greatly improve administration efficiency and overall security.

Security administrators invest great effort into managing the security policies responsible for safeguarding networks and endpoints. The Smart-1 appliances are designed to ease the process. From one console, administrators can manage IPS, network and endpoint security policies, and through Check Point's unique Software Blade architecture, customers can extend the standard capabilities of Smart-1 appliances by adding additional management blades as needed. Smart-1 appliances also streamline security management by offering integrated storage of log data from across multiple enterprise-wide devices. This significantly aids administrators meet compliance requirements and perform forensic analysis. "Check Point Smart-1 solutions represent the next step in our effort to simplify security management for the enterprise while providing the highest levels of security," said Dr. Dorit Dor, vice president of products at Check Point. "Smart-1 takes the benefits of Check Point's Software Blade architecture and brings that flexibility and extensibility to the network administrator, helping to enforce security policy across the organization." Check Point Smart-1 security management appliances offer enterprises easy log access with unsurpassed log storage and performance capabilities. Up to 12 TB of integrated RAID log storage provides approximately three years of enterprise-wide logs. System performance supports up to approximately 30,000 logs per second for high-throughput data capture. Combined with built-in Storage Area Networks (SAN) support including high performance fiber optic connectivity, Smart-1 appliances reduce the costs of acquiring, deploying and maintaining server attached distributed storage for customers.

The Smart-1 appliance line includes:

  • Smart-1 150: Security management for large enterprises and service providers with 150 gateways or more that provides up to 12 TB of integrated log storage
  • Smart-1 50: Security management for enterprises and service providers with 50 to 150 gateways that provides up to 4 TB of integrated log storage
  • Smart-1 25: Security management for enterprises with 25 to 50 gateways that provides 2 TB of integrated log storage
  • Smart-1 5: Security management for businesses with 5 to 25 gateways including up to 500 GB of integrated log storage Features and benefits of the new Smart-1 security management appliances also include:
  • Software Blade architecture provides unparalleled security flexibility and extensibility, allowing customers to select the exact security management solutions they need and expand further with additional software blades
  • Library of 10 management software blades to choose from including: Network Policy Management, Endpoint Policy Management, Logging & Status, Monitoring, Management Portal, User Directory, IPS Event Analysis, Provisioning, Reporting, and Event Correlation
  • Check Point Provider-1' functionality is also included in Smart-1 50 and Smart-1 150 appliances, enabling multi-domain management by unifying data from multiple management servers.
  • Integrated Lights Out Management (LOM) provides out-of-band remote monitoring and management
  • Redundant and hot swappable components ensure a high degree of reliability, availability and serviceability
  • Hardware health check monitoring identifies problems before they arise
  • Smart-1 all-in-one devices preserve valuable data center rack and floor space and reduce power and cooling requirements

    Additional information on Check Point Smart-1 appliances can be found at: www.checkpoint.com/products/smart-1/index.html. "The new Smart-1 appliance line provides customers with a simplified and unified security management solution that ensures operational continuity even in the most demanding environments," concluded Dor.

    Pricing and Availability Check Point Smart-1 appliances are available immediately and can be purchased through Check Point's worldwide network of value-added resellers. For more information, please visit us at: www.checkpoint.com/products/smart-1/index.html.

    About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology.

    Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    DevSecOps: The Answer to the Cloud Security Skills Gap
    Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
    Attackers' Costs Increasing as Businesses Focus on Security
    Robert Lemos, Contributing Writer,  11/15/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    Navigating the Deluge of Security Data
    In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-6852
    PUBLISHED: 2019-11-20
    A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
    CVE-2019-6853
    PUBLISHED: 2019-11-20
    A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.
    CVE-2013-2092
    PUBLISHED: 2019-11-20
    Cross-site Scripting (XSS) in Dolibarr ERP/CRM 3.3.1 allows remote attackers to inject arbitrary web script or HTML in functions.lib.php.
    CVE-2013-2093
    PUBLISHED: 2019-11-20
    Dolibarr ERP/CRM 3.3.1 does not properly validate user input in viewimage.php and barcode.lib.php which allows remote attackers to execute arbitrary commands.
    CVE-2015-3166
    PUBLISHED: 2019-11-20
    The snprintf implementation in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 does not properly handle system-call errors, which allows attackers to obtain sensitive information or have other unspecified impact via unknown vectors, as d...