Flexible and Customized Security Solution
Organizations start by defining what type of security they need from Check Point solutions as well as a desired level of performance. Organizations can choose from options such as VPN-1® UTM, VPN-1 Power, and the VPN-1 Power VSX virtualized security services platform, as well as Provider-1® for management of large deployments with separate security domains.
Check Point then integrates the software onto a server or Software Blade-based chassis to provide a comprehensive solution that includes direct technical support from Check Point.
Standardization for Lower Security Total Cost of Ownership
With Integrated Appliance Solutions, you can take advantage of the benefits of customization and standardization. You work with Check Point to tailor Check Point applications and hardware components and then finalize them into a standard corporate security platform.
Then, create a single support and procurement methodology that significantly simplifies management overhead. This allows your customer engineering teams the ability to save certification time and work on new projects, procurement to build economies of scale that reduce costs, and management to develop standard operating procedures that improve service quality and compliance.
High Security, High Performance
Because Integrated Appliance Solutions are built around the latest hardware innovations such as multi-core processors, you can deploy to a higher level of security. Organizations can activate strict intrusion prevention policies with multi-gigabit performance levels. And, as Check Point updates its software, expect to see performance improve without requiring hardware upgrades.
Single Point of Contact for Support
Check Point provides total support for the Integrated Appliance Solutions, including three levels of global advance replacement determined by support level and location. Update Services, an optional subscription, provides the latest updates for integrated intrusion prevention capabilities, delivering threat mitigation that is always up-to-date.
Maximum Security and Performance
Ensure availability of business-critical applications with up to 20 Gbps of firewall throughput and 8.6 Gbps for both firewall and IPS.
With IAS, you can ensure availability of business-critical applications with up to 20 Gbps of firewall throughput and 8.6 Gbps for both firewall and Intrusion Prevention System (IPS). With Check Point VPN-1 Power VSX, hundreds of high performance virtualized firewalls can be consolidated on a single chassis. IAS reduces complexity by consolidating network functions and security applications in a single platform, while preserving application choice.
Virtualized Security Consolidation
The VSX security operations platform is a virtualized security gateway that enables the creation of hundreds of security systems on a single hardware platform, delivering deep cost savings and infrastructure consolidation. Based on the proven security VSX provides best-in-class firewall, VPN, URL filtering and intrusion prevention technology to multiple networks, securely connecting them to each other and shared resources, such as the Internet and DMZs. All security systems, virtual and real, are centrally managed through Check Point Security Management or Provider-1 management consoles.
Integrated into Flexible Software Blade Architecture
The Check Point Software Blade architecture is the first and only security architecture that delivers complete, flexible and manageable security to companies of any size. With unprecedented flexibility and expandability, Software Blades deliver lower cost of ownership and cost-efficient protection that meet any need, today and in the future.
Full integration into the modular Software Blade Architecture allows for rapid and easy activation on any Check Point security gateway.