Wed, December 11, 2024
Tue, December 10, 2024
[ Tue, Dec 10th 2024 ]: The New Yorker
The Dawn of the Bionic Man
[ Tue, Dec 10th 2024 ]: Mercury News
California News
[ Tue, Dec 10th 2024 ]: ABC News
Entertainment News
Mon, December 9, 2024
[ Mon, Dec 09th 2024 ]: BBC
Beds, Herts & Bucks
[ Mon, Dec 09th 2024 ]: Uproxx
The Best TV Shows Of 2024
[ Mon, Dec 09th 2024 ]: Paste
The 25 Best PC Games of 2024
[ Mon, Dec 09th 2024 ]: CNET
Top News Stories
Sun, December 8, 2024
Sat, December 7, 2024
[ Sat, Dec 07th 2024 ]: Newsweek
Russia-Ukraine War
[ Sat, Dec 07th 2024 ]: imdb.com
Canada's 30 Funniest TV Shows
[ Sat, Dec 07th 2024 ]: Daily Mail
UK Celebrity News
[ Sat, Dec 07th 2024 ]: Food Safety News
Food Safety News
Fri, December 6, 2024
[ Fri, Dec 06th 2024 ]: Graphic
Latest Ghana News Headlines Today
[ Fri, Dec 06th 2024 ]: The Columbian
Clark County News
[ Fri, Dec 06th 2024 ]: who13
Cyclones react to 10 wins
[ Fri, Dec 06th 2024 ]: TravelPulse
Hotels and Resorts News
[ Fri, Dec 06th 2024 ]: Business Standard
Share Market Today
[ Fri, Dec 06th 2024 ]: Reuters
Aerospace & Defense
Thu, December 5, 2024
[ Thu, Dec 05th 2024 ]: Interest
All news stories
[ Thu, Dec 05th 2024 ]: Paste
The 30 Best TV Shows of 2024
[ Thu, Dec 05th 2024 ]: Phil Bruner
Featured News Stories
[ Thu, Dec 05th 2024 ]: Phil Bruner
Swattie Survival Guide
Wed, December 4, 2024
[ Wed, Dec 04th 2024 ]: Phil Bruner
California News
[ Wed, Dec 04th 2024 ]: Phil Bruner
President Joe Biden
Tue, December 3, 2024
[ Tue, Dec 03rd 2024 ]: Phil Bruner
The 40 Best Games of 2024
[ Tue, Dec 03rd 2024 ]: Phil Bruner
Boku No Roblox Codes
[ Tue, Dec 03rd 2024 ]: Phil Bruner
Yonhap News Agency
[ Tue, Dec 03rd 2024 ]: Phil Bruner
Beds, Herts & Bucks
[ Tue, Dec 03rd 2024 ]: Phil Bruner
Transfer news and rumors
Mon, December 2, 2024
[ Mon, Dec 02nd 2024 ]: Phil Bruner
Watch Samaa News Live
[ Mon, Dec 02nd 2024 ]: Phil Bruner
UK Celebrity News
[ Mon, Dec 02nd 2024 ]: Phil Bruner
The 100 Best Albums of 2024
[ Mon, Dec 02nd 2024 ]: Phil Bruner
From the Newspaper
[ Mon, Dec 02nd 2024 ]: Phil Bruner
South Australia
[ Mon, Dec 02nd 2024 ]: Phil Bruner
Whanganui Chronicle
Sun, December 1, 2024
[ Sun, Dec 01st 2024 ]: Phil Bruner
Wildlife Oddities of the Week
Sat, November 30, 2024
Fri, November 29, 2024
[ Fri, Nov 29th 2024 ]: Phil Bruner
Hotels and Resorts News
[ Fri, Nov 29th 2024 ]: Phil Bruner
The Best Jokes of 2024
Thu, November 28, 2024
[ Thu, Nov 28th 2024 ]: Phil Bruner
Climate and Environment
[ Thu, Nov 28th 2024 ]: Phil Bruner
December 2024 Issue
Wed, November 27, 2024
[ Wed, Nov 27th 2024 ]: Phil Bruner
Decoding Gen Z's content diet
Tue, November 26, 2024
[ Tue, Nov 26th 2024 ]: Phil Bruner
Illustrated Humor in the News
[ Tue, Nov 26th 2024 ]: Phil Bruner
World News
[ Tue, Nov 26th 2024 ]: Phil Bruner
Alexandra Petri
Mon, November 25, 2024
[ Mon, Nov 25th 2024 ]: Phil Bruner
All Kent news
Sun, November 24, 2024
Mon, December 15, 2008
[ Mon, Dec 15th 2008 ]: Market Wire
fasdfasddva s gfg h

Check Point Revolutionizes Security With New Software Blade Architecture

  Copy link into your clipboard //science-technology.news-articles.net/content/2 .. curity-with-new-software-blade-architecture.html
  Print publication without navigation Published in Science and Technology on , Last Modified on 2009-02-23 23:15:11 by Market Wire
          🞛 This publication is a summary or evaluation of another publication

- Click to Lock Slider

REDWOOD CITY, Calif.--([ BUSINESS WIRE ])--Check Point® Software Technologies Ltd. (Nasdaq:CHKP), the worldwide leader in securing the Internet, today announced its new Software Blade architecture, the industry's first architecture to meet businesses' need for total, flexible and manageable security. The new architecture empowers businesses with the ability to select from a library of over 20 software blades the exact security protections necessary and dynamically tailor security gateways for different environments and sites.

Security environments of large, medium and small companies are becoming more complex as they attempt to address continually evolving threats. Many organizations complain about the need to use multiple products, hardware platforms, management consoles and daily monitoring systems. Check Point Software Blade architecture offers businesses a common platform to deploy independent, modular and interoperable security applications or "software blades" – such as firewall, virtual private network (VPN), intrusion prevention system (IPS), anti-virus, policy management or provisioning blades. The architecture allows customers to select the exact security software blades they need and then to combine them into a single, centrally managed gateway.

"We are proud to introduce a new paradigm in security; one that meets today's complex threat environment with refreshing simplicity," said Gil Shwed, chairman and chief executive officer at Check Point. "To address each new risk businesses can now consolidate multiple security systems by simply activating software blades on their Check Point security platform. Check Point Software Blade architecture gives businesses the flexibility to create a unified security infrastructure that can be extended to fit their growing needs."

With the new Software Blade architecture customers will be able to move functionality from one system to another, consolidate or split functionalities between systems and guarantee performance for each software blade by setting usage thresholds. All these capabilities will enable customers to scale their security needs while reducing security cost of ownership.

For example, a business could start with a single core, single blade firewall system. That business can turn on functionalities such as VPN, network anti-virus, VoIP security and intrusion prevention by adding four blades turning their system into a five blade system. To meet their performance needs the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.

"For businesses a unified line of gateways with centralized management securing both external and internal security zones is very beneficial," said Charles Riordan, business leader, network security and audit at Visa Inc. "Moving to Check Point Software Blade architecture with its performance enhancing core associations is something enterprises like Visa may well take advantage of moving into the future. Bottom line is Check Point's new architecture and foresight looks to be spot on with what the industry needs."

Key benefits of the Check Point Software Blade Architecture include:

  • Flexibility – Provides the right level of protection at the right level of investment
  • Manageability – Enables fast deployment of security functions and increased productivity through central management of software blades
  • Total Security – Provides the right level of security, at all enforcement points, and at all layers of the network
  • Guaranteed performance – Enables performance setting per blade to ensure guaranteed performance
  • Lower TCO - Protects investment by enabling consolidation and leveraging existing infrastructure

"IDC expects the next generation of security products to offer more flexibility in both features and deployment options, a trend that is accelerated by the current state of the economy and the demand for more cost-effective solutions. Check Point's new Software Blade architecture offers customers important flexibility and customization options to deliver security tailored to each enterprise's specific environment," said Andrew Hanson, network and endpoint security analyst at IDC. "Software Blades' modular approach can also supply cost saving benefits as they can be deployed dynamically without the need to upgrade hardware, firmware or drivers."

Software blades can be deployed on Check Point UTM-1® or Power-1® appliances as well as open servers. Additional information on the new Check Point Software Blade architecture can be found at: [ www.checkpoint.com/products/softwareblades/architecture/index.html ].

"Check Point Software Blades offer customers a revolutionary architecture to create a security system that is uniquely flexible and can expand to optimize their existing infrastructure," concluded Shwed.

Pricing and Availability

Check Point Software Blades are available immediately and can be purchased through Check Point's worldwide network of value-added resellers. For information on pricing and licensing, visit [ https://pricelist.checkpoint.com ]. To find a Check Point partner, visit [ www.checkpoint.com ].

About Check Point Software Technologies Ltd.

Check Point Software Technologies Ltd. ([ www.checkpoint.com ]) is the leader in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers' dynamic business needs. This combination is unique and is a result of our leadership and innovation in the enterprise firewall, personal firewall/endpoint, data security and VPN markets.

Check Point's pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market-leading endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. Check Point's award-winning ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft. Check Point solutions are sold, integrated and serviced by a network of Check Point partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes.

©2009 Check Point Software Technologies Ltd. All rights reserved.



Similar Humor and Quirks Publications