[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance.

Slides:



Advertisements
Similar presentations
Powerful and convenient management for Windows Mobile ® 6.1 devices in an enterprise environment. These features include: Centralized, over-the-air device.
Advertisements

IBM Software Group ® Integrated Server and Virtual Storage Management an IT Optimization Infrastructure Solution from IBM Small and Medium Business Software.
Chapter 1: Introduction to Scaling Networks
Agenda Product Overview Hardware Interfaces Software Features
IBM Security Network IPS models, End of Support Dates and Replacement options 1.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco SB Summit Praha, Jan Křístek Tomáš Chott.
MUNIS Platform Migration Project WELCOME. Agenda Introductions Tyler Cloud Overview Munis New Features Questions.
Session Objectives Illustrate benefits of BOCES and EES membership Introduce the Enrollment for Education Solutions (EES) Academic licensing solution.
IP Office 500 Single, Modular Platform Scales to 384 users per system Can network up to 32 sites, 1000 users Simple, role-based solutions Integral Integration.
LAN solutions. 4 Reasons to buy Nortel Networks LANs Provides Business continuity with no single point of failure at the hardware level and faster recovery.
© Check Point Software Technologies Ltd. All rights reserved. Proprietary and confidential. Check Point Appliances “Expanding your business “
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
MSIT 458: Information Security & Assurance By Curtis Pethley.
© 2011 Cisco Systems, Inc. All rights reserved. Cisco Confidential Presentation_ID 1 Cisco Connected Energy Vision Utility Operations Connected Buildings.
Unified Logs and Reporting for Hybrid Centralized Management
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
MIGRATION FROM SCREENOS TO JUNOS based firewall
Cisco Confidential 1 © 2013 Cisco and/or its affiliates. All rights reserved. Cisco Small Business RV320/RV325 Product Overview.
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Intel  modular server building blocks ( built on Intel  Multi-Flex Technology ) Intel  modular server building blocks ( built on Intel  Multi-Flex.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
© Hitachi Data Systems Corporation All rights reserved. 1 1 Det går pænt stærkt! Tony Franck Senior Solution Manager.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
MiVoice Office v MiVoice Office v6.0 is mainly a service enhancement release, rather than a user feature rich enhancement release.
Meet the Next Generation Firewall (NGFW)
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Endpoint Security Current portfolio and looking forward October 2010.
Private Cloud: Application Transformation Business Priorities Presentation.
TAILORED SECURITY FOR CRITICAL ASSETS SRX SERIES SERVICES GATEWAYS FOR THE HIGH END PRESENTER NAME DECEMBER 29, 2013.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
PURE SECURITY Check Point UTM-1 Luděk Hrdina Marketing Manager, Eastern Europe Check Point Software Technologies Kongres bezpečnosti sítí 11. dubna 2007,
Network Techlab (India) Pvt. Ltd.
Effectively Explaining the Cloud to Your Colleagues.
Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in We create innovative software solutions for SharePoint,
VPN for Sales Nokia FireWall-1 Products Complete Integrated Solution including: –CheckPoint FireWall-1 enterprise security suite –Interfaces installed.
Exchange 2000 on Windows 2000 Data Center The Opportunity for Server Consolidation.
ShareTech 2015 Next-Gen UTM.
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette.
©2014 Check Point Software Technologies Ltd Introduction [Confidential] For designated groups and individuals.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 6: Implement Wireless Scalability.
Network Security Update IDG Security Forum th of April 2008 Péter L. Juhász, Sales Manager South East Europe.
© Copyright 2011 Elitecore Technologies Pvt. Ltd. All Rights Reserved. Securing You Centralized Security Management with Cyberoam Central.
Bluesocket vWLAN Overview. Its ALL about n……
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 1: Introduction to Scaling Networks Scaling Networks.
Net Optics Confidential and Proprietary 1 Bypass Switches Intelligent Access and Monitoring Architecture Solutions.
Terminal Services Technical Overview Olav Tvedt TVEDT.info Microsoft Speaker Community
SMALL BUSINESS SERVER 2011 TRAINING WEBINAR. Agenda 1. Market2. Product Overview3. Customer Value Proposition4. SKU Descriptions and Licensing.
Exchange Deployment Planning Services Exchange 2010 Complementary Products.
Total Threat Protection Securing All Your Threat Vectors Hartford Tech Summit.
© 2013 Cisco and/or its affiliates. All rights reserved. Zuzana Humajová Product Sales Specialist – EN/Mobility.
Hosting Websites and Web Applications with Microsoft ® SQL Server ® 2008.
Cisco PIX Firewall Family
©2013 Check Point Software Technologies Ltd. Small Business. Big Security New SMB Appliances Clinton Cutajar Team Leader – Information Security Computime.
A Better Way Huawei Financial Agile Network Solution Success Cases.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
ShoreTel Virtualization February, © 2014 ShoreTel, Inc. All rights reserved worldwide. Unified Communications Deployment Model 1 Secure Reliable.
Barracuda Subscription and Support Upsell Opportunities
Product Introduction --QoS VPN Router G3 16/12/2015 Business WLAN
Barracuda Web Security Flex
Barracuda Firewall The Next-Generation Firewall for Everyone
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Forefront Security ISA
Sizing …today. T: Here’s how. .
Mitel Network – SIP Trunking Discussion
Storage Trends: DoITT Enterprise Storage
Enabling the hybrid cloud with remote access appliances
Presentation transcript:

[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliances Scalable Security Performance

2 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Agenda  Check Point Appliances and Software Blades  Power-1 Appliances –Introducing the Power Series Appliances  Choosing the Right Solution

3 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. The Check Point Expanded Appliance Ecosystem  Powerful hardware platforms  Flexible Software Blade architecture  Expanded lines of turnkey solutions that scale as you grow your business Check Point offers a turnkey appliance for every business need

4 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Appliances—Software Blades  Enables tailored solutions for every business need  Centrally Managed  Expands without additional hardware or management complexity  Delivers low-cost ownership and cost-efficient protection Power Power Power Series NEW!NEW!

5 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point Power Series Scalable Security Performance  First security appliance to provide simple and flexible field performance upgradability  World class performance up to 25 Gbps in convenient 2U form factor  Flexible multi-function security appliance provides expandability and investment protection NEW!NEW!

6 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Fulfills Data Center Requirements FeatureBenefit High firewall and IPS performance Secures business- critical applications Turnkey solution Streamlines deployment of enterprise security Extensible architecture Add security functionality as needed Unified role-based central management Simplifies and ensures secure administration Near real-time threat protection Protects against emerging threats

7 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Excellent performance with strong protection Power-1 Appliances

8 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Achieve the Performance You Need

9 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. All IPS Protections: Best security with very good performance Improved Core Performance x30

10 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Default IPS Protection: Excellent performance with good protection X2.5% Improved Core Performance

11 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Recover Valuable Rack Space 2U 3.5” 3U 5.25” 4U 7.0” 5U 8.75” Average per Rack Pricing Rose by 8.5% in 2008 Check Point Power series delivers up to 25Gbps firewall performance in a convenient 2 rack-unit form factor

12 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Manageable, Modular, and Serviceable 1. Redundant hot-swappable hard drives 2. LCD display 3. LCD control buttons 4. Air intake 5. Management & Sync ports 6. Console port 7. USB ports 8. Eight 1 GbE ports 9. Field swappable expansion modules –1 GbE Copper (4 ports) –1 GbE LX Fiber (single mode) (4 ports) –1 GbE SX Fiber (multi mode) (4 ports) –10 GbE LR Fiber (single mode) (2 ports) –10 GbE SR Fiber (multi mode) (2 ports) 10. LOM (Out-of-Band Management) card

13 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Lights-Out Management—Out of Band  The ability to monitor and manage the appliance remotely and out-of-band whether device is on or off  Implemented via a hardware solution—LOM card  Dedicated power source

14 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Customize with Additional Software Blades gatewayblade firewall gatewayblade IPsec VPN gatewayblade IPS gatewayblade acceleration & clustering gatewayblade advanced networking gatewayblade web security gatewayblade voice over IP gatewayblade URL filtering gatewayblade anti-virus & anti-malware gatewayblade anti-spam & security Security perpetual blade Security service blade

15 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Power-1 Appliance Specifications Power Power Power Series Software EditionR65, R70 R70 Software BladesFirewall, IPSec VPN, IPS, Advanced Networking, Acceleration, and Clustering 10/100/1000 Ports10/1414/18 Firewall Throughput* 9 Gbps16 Gbps*15 Gbps20 Gbps25 Gbps VPN Throughput2.4 Gbps3.7 Gbps 4.0 Gbps4.5 Gbps IPS Throughput7.5 Gbps10 Gbps 12 Gbps15 Gbps Concurrent Sessions 1.2 Million VLANs1024 Storage Capacity160 GB2 X 160 GB2 X 250 GB Security Acceleration Yes List Price$39,000$52,500Quote * Performance data represent the maximum capabilities of the systems as measured under optimal testing conditions. Deployment and policy considerations may impact performance results

16 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Check Point Appliance Line SMB to medium branch List price FW throughput (Gbps) Small office or branch Enterprise perimeter / core / large branch Power-1Power-1 Check Point IP Appliance UTM-1UTM-1 Power Power Power Power IP2455 IP1285 IP565 IP695UTM UTM IP395 UTM Power IP295 UTM UTM-1 Edge UTM UTM IP155 NEW!NEW! NEW!NEW! NEW!NEW!

17 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. 24/7 support for the most critical environments DALLAS TAC TEL AVIV TAC STOCKHOLM Endpoint escalation TOKYO TAC OTTAWA TAC Award-winning support Always-on 24 X 7 coverage Best-in-class electronic support tools World-wide material inventory Online support in 150 countries / 1,000 metropolitan areas

18 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. UTM-1 & Power-1 Reduced Support Rates ProductNo SupportSoftware Subscription Co-Standard/ Standard Support (including Software Subscription) Co-Premium/ Premium Support (including Software Subscription) Co-Premium/ Premium Express (Next Flight Out) Support* UTM-1 Appliances xx2 UTM / 272 / years HW warranty included Normal Account Rate + 3% UTM-1 Appliances xx3 UTM / 2073 / years HW warranty included NA10%15%18% UTM-1 Appliances xx6 UTM / 276 / 576 / 1076 / 2076 / years HW warranty included NA10%15%18% Power-1 Appliances 3 years HW warranty included NA10%15%18% * Co-Premium/Premium Express is currently available in the US and EU.

19 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Summary Simple field performance upgrades Up to 25 Gbps firewall performance in a 2U form factor Power Scalable security performance Flexible, expandable, investment protection