Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

2/25/2009
01:22 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Check Point Rolls Out New Software Blade Architecture For Security

Check Point Software Blade architecture is delivers flexible and manageable security to businesses of all sizes

Redwood City, CA — February 24, 2009 02 24, 2009 Check Point' Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced its new Software Blade architecture, the industry's first architecture to meet businesses' need for total, flexible and manageable security. The new architecture empowers businesses with the ability to select from a library of over 20 software blades the exact security protections necessary and dynamically tailor security gateways for different environments and sites.

Security environments of large, medium and small companies are becoming more complex as they attempt to address continually evolving threats. Many organizations complain about the need to use multiple products, hardware platforms, management consoles and daily monitoring systems. Check Point Software Blade architecture offers businesses a common platform to deploy independent, modular and interoperable security applications or "software blades" " such as firewall, virtual private network (VPN), intrusion prevention system (IPS), anti-virus, policy management or provisioning blades. The architecture allows customers to select the exact security software blades they need and then to combine them into a single, centrally managed gateway.

"We are proud to introduce a new paradigm in security; one that meets today's complex threat environment with refreshing simplicity," said Gil Shwed, chairman and chief executive officer at Check Point. "To address each new risk businesses can now consolidate multiple security systems by simply activating software blades on their Check Point security platform. Check Point Software Blade architecture gives businesses the flexibility to create a unified security infrastructure that can be extended to fit their growing needs."

With the new Software Blade architecture customers will be able to move functionality from one system to another, consolidate or split functionalities between systems and guarantee performance for each software blades by setting usage thresholds. All these capabilities will enable customers to scale their security needs while reducing security cost of ownership. For example, a business could start with a single core, single blade firewall system. That business can turn on functionalities such as VPN, network anti-virus, VoIP security and intrusion prevention by adding four blades turning their system into a five blade system. To meet their performance needs the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.

"For businesses a unified line of gateways with centralized management securing both external and internal security zones is very beneficial," said Charles Riordan, business leader, network security and audit at Visa Inc. "Moving to Check Point Software Blade architecture with its performance enhancing core associations is something enterprises like Visa may well take advantage of moving into the future. Bottom line is Check Point's new architecture and foresight looks to be spot on with what the industry needs."

Key benefits of the Check Point Software Blade Architecture include:

Flexibility " Provides the right level of protection at the right level of investment

Manageability " Enables fast deployment of security functions and increased productivity through central management of software blades

Total Security " Provides the right level of security, at all enforcement points, and at all layers of the network

Guaranteed performance " Enables performance setting per blade to ensure guaranteed performance

Lower TCO - Protects investment by enabling consolidation and leveraging existing infrastructure "IDC expects the next generation of security products to offer more flexibility in both features and deployment options, a trend that is accelerated by the current state of the economy and the demand for more cost-effective solutions. Check Point's new Software Blade architecture offers customers important flexibility and customization options to deliver security tailored to each enterprise's specific environment," said Andrew Hanson, network and endpoint security analyst at IDC. "Software Blades' modular approach can also supply cost saving benefits as they can be deployed dynamically without the need to upgrade hardware, firmware or drivers."

Software blades can be deployed on Check Point UTM-1' or Power-1' appliances as well as open servers. Additional information on the new Check Point Software Blade architecture can be found at: www.checkpoint.com/products/softwareblades/architecture/index.html.

"Check Point Software Blades offer customers a revolutionary architecture to create a security system that is uniquely flexible and can expand to optimize their existing infrastructure," concluded Shwed.

Pricing and Availability Check Point Software Blades are available immediately and can be purchased through Check Point's worldwide network of value-added resellers. For information on pricing and licensing, visit https://pricelist.checkpoint.com. To find a Check Point partner, visit www.checkpoint.com. About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. (www.checkpoint.com) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
What the FedEx Logo Taught Me About Cybersecurity
Matt Shea, Head of Federal @ MixMode,  6/4/2021
Edge-DRsplash-10-edge-articles
A View From Inside a Deception
Sara Peters, Senior Editor at Dark Reading,  6/2/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23394
PUBLISHED: 2021-06-13
The package studio-42/elfinder before 2.1.58 are vulnerable to Remote Code Execution (RCE) via execution of PHP code in a .phar file. NOTE: This only applies if the server parses .phar files as PHP.
CVE-2021-34682
PUBLISHED: 2021-06-12
Receita Federal IRPF 2021 1.7 allows a man-in-the-middle attack against the update feature.
CVE-2021-31811
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an OutOfMemory-Exception while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-31812
PUBLISHED: 2021-06-12
In Apache PDFBox, a carefully crafted PDF file can trigger an infinite loop while loading the file. This issue affects Apache PDFBox version 2.0.23 and prior 2.0.x versions.
CVE-2021-32552
PUBLISHED: 2021-06-12
It was discovered that read_file() in apport/hookutils.py would follow symbolic links or open FIFOs. When this function is used by the openjdk-16 package apport hooks, it could expose private data to other local users.