Check Point Taps Power Of Virtualization To Simplify Security For Private CloudsCheck Point Taps Power Of Virtualization To Simplify Security For Private Clouds
Allows businesses to consolidate security gateways onto a single appliance or open server
July 20, 2012
REDWOOD CITY, CA--(Marketwire - Jul 16, 2012) - Check Point® Software Technologies Ltd. (NASDAQ: CHKP), the worldwide leader in securing the Internet, today introduced Check Point Virtual Systems that allow businesses to consolidate security gateways onto a single appliance or open server -- simplifying security, reducing costs and boosting performance for private cloud environments. With Check Point Virtual Systems, customers can secure multiple network segments by selecting any combination of Check Point software blade protections -- such as Firewall, VPN, Intrusion Prevention (IPS), Application Control, URL Filtering, Anti-Bot, Antivirus and Identity Awareness -- providing customers with the widest range of virtualized security protections available.
"From enterprises to large service providers, administrators often have multiple security appliances in place, each requiring separate maintenance and management, which can make security expensive, difficult to manage and inefficient. An effective way to minimize complexity and cost is through security virtualization," said Dorit Dor, vice president of products at Check Point Software Technologies. "Check Point has been providing customers with virtual firewalls on dedicated systems for years. Now, Check Point is taking virtualization to the next level -- enabling customers to provision virtual systems on every gateway and with the breadth of software blade protections."
With Check Point Virtual Systems, customers can build secure private clouds on any gateway or open server and reduce complexity by consolidating up to 250 Virtual Systems on a single gateway -- each with customized software blade protections and policies tailored to specific business needs. For enterprises who manage multiple groups or business units, or MSPs who service multiple customers from a single system, Check Point allows customers to benefit from security consolidation through virtualization, while maintaining a separation of IT duties with dedicated Virtual Systems for Web Security, Threat Prevention, Firewall and Remote Access. Customers can also cluster up to eight gateways using Check Point's patented Virtual System Load Sharing (VSLS) technology, for unmatched scalability. As customers' business needs grow, Check Point enables companies to leverage the power of virtualized security to reduce costs and improve operational efficiency.
"For many companies, virtualized security has become a strategic technology investment. Consolidating multiple security functions onto a single gateway can result in significant cost savings," said Chris Christiansen, Program VP for Security Products and Services at IDC. "Check Point's security expertise, combined with its Software Blade Architecture, offers customers a solution to ease network strain and complexity when securing private cloud environments."
With Check Point Virtual Systems, customers can boost performance for virtualized security based on the company's new 64-bit GAiA™ operating system, enabling organizations to benefit from over eight times more concurrent connections than previous versions (VSX). In addition, the solution utilizes multi-core processors with CoreXL technology, allowing customers to achieve higher performance.
The Virtual Systems are supported on all the new Check Point enterprise and data center appliances. For more information, visit http://www.checkpoint.com/products/virtual-systems/index.html.
"With Check Point Virtual Systems, we're pleased to provide customers a way to consolidate multiple gateways on one device, while offering enhanced security performance and scalability based on GAiA OS and patented VSLS technology. For the first time, organizations have the ability to truly leverage the power of virtualized security and deploy all of the protections they need using virtual systems just as they do with their physical gateways," concluded Dor.
Pricing and Availability Pricing starts at $3,000 for three virtual systems. Customers also benefit from fixed software blade licensing that allows a software blade license to be used across any number of Virtual Systems. Customers using Check Point 4800 appliances and above will also benefit from a Virtual System that is bundled with each appliance.
Check Point Virtual Systems are available immediately through the Check Point worldwide network of value-added resellers. To find a Check Point partner, visit: http://partners.us.checkpoint.com/partnerlocator/.
About Check Point Software Technologies Ltd. Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to develop new innovations based on the Software Blade Architecture, providing customers with flexible and simple solutions that can be fully customized to meet the exact security needs of any organization. Check Point is the only vendor to go beyond technology and define security as a business process. Check Point 3D Security uniquely combines policy, people and enforcement for greater protection of information assets and helps organizations implement a blueprint for security that aligns with business needs. Customers include tens of thousands of organizations of all sizes, including all Fortune and Global 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.
You May Also Like
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023