Check Point Rolls Out New Software Blade Architecture For Security

Check Point Software Blade architecture is delivers flexible and manageable security to businesses of all sizes

February 26, 2009

5 Min Read


Redwood City, CA — February 24, 2009 02 24, 2009 Check Point' Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced its new Software Blade architecture, the industry's first architecture to meet businesses' need for total, flexible and manageable security. The new architecture empowers businesses with the ability to select from a library of over 20 software blades the exact security protections necessary and dynamically tailor security gateways for different environments and sites.

Security environments of large, medium and small companies are becoming more complex as they attempt to address continually evolving threats. Many organizations complain about the need to use multiple products, hardware platforms, management consoles and daily monitoring systems. Check Point Software Blade architecture offers businesses a common platform to deploy independent, modular and interoperable security applications or "software blades" " such as firewall, virtual private network (VPN), intrusion prevention system (IPS), anti-virus, policy management or provisioning blades. The architecture allows customers to select the exact security software blades they need and then to combine them into a single, centrally managed gateway.

"We are proud to introduce a new paradigm in security; one that meets today's complex threat environment with refreshing simplicity," said Gil Shwed, chairman and chief executive officer at Check Point. "To address each new risk businesses can now consolidate multiple security systems by simply activating software blades on their Check Point security platform. Check Point Software Blade architecture gives businesses the flexibility to create a unified security infrastructure that can be extended to fit their growing needs."

With the new Software Blade architecture customers will be able to move functionality from one system to another, consolidate or split functionalities between systems and guarantee performance for each software blades by setting usage thresholds. All these capabilities will enable customers to scale their security needs while reducing security cost of ownership. For example, a business could start with a single core, single blade firewall system. That business can turn on functionalities such as VPN, network anti-virus, VoIP security and intrusion prevention by adding four blades turning their system into a five blade system. To meet their performance needs the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.

"For businesses a unified line of gateways with centralized management securing both external and internal security zones is very beneficial," said Charles Riordan, business leader, network security and audit at Visa Inc. "Moving to Check Point Software Blade architecture with its performance enhancing core associations is something enterprises like Visa may well take advantage of moving into the future. Bottom line is Check Point's new architecture and foresight looks to be spot on with what the industry needs."

Key benefits of the Check Point Software Blade Architecture include:

Flexibility " Provides the right level of protection at the right level of investment

Manageability " Enables fast deployment of security functions and increased productivity through central management of software blades

Total Security " Provides the right level of security, at all enforcement points, and at all layers of the network

Guaranteed performance " Enables performance setting per blade to ensure guaranteed performance

Lower TCO - Protects investment by enabling consolidation and leveraging existing infrastructure "IDC expects the next generation of security products to offer more flexibility in both features and deployment options, a trend that is accelerated by the current state of the economy and the demand for more cost-effective solutions. Check Point's new Software Blade architecture offers customers important flexibility and customization options to deliver security tailored to each enterprise's specific environment," said Andrew Hanson, network and endpoint security analyst at IDC. "Software Blades' modular approach can also supply cost saving benefits as they can be deployed dynamically without the need to upgrade hardware, firmware or drivers."

Software blades can be deployed on Check Point UTM-1' or Power-1' appliances as well as open servers. Additional information on the new Check Point Software Blade architecture can be found at:

"Check Point Software Blades offer customers a revolutionary architecture to create a security system that is uniquely flexible and can expand to optimize their existing infrastructure," concluded Shwed.

Pricing and Availability Check Point Software Blades are available immediately and can be purchased through Check Point's worldwide network of value-added resellers. For information on pricing and licensing, visit To find a Check Point partner, visit About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. ( is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights