New Security Architecture Unveiled By Check Point
Check Point Software Technologies Ltd. has released its new Software Blade architecture, an offering that allows a company to select more than 20 secure "software blades" for different environments an...
March 1, 2009
Print this page
Check Point Software Technologies Ltd. has released its new Software Blade architecture, an offering that allows a company to select more than 20 secure “software blades” for different environments and sites.
Security environments of large, medium and small companies are becoming more complex as they attempt to address continually evolving threats, the company says, and as a result, many organizations complain about the need to use multiple products, hardware platforms, management consoles and daily monitoring systems.
The architecture offers businesses a common platform to deploy independent, modular and interoperable security applications or “software blades” — such as firewall, virtual private network (VPN), intrusion prevention system (IPS), anti-virus, policy management or provisioning blades.
The architecture allows customers to select the exact security software blades they need and then to combine them into a single, centrally managed gateway.
“(This) is a new paradigm in security; one that meets today’s complex threat environment with simplicity,” said Gil Shwed, Check Point’s chairman and CEO.
With the new Software Blade architecture customers will be able to move functionality from one system to another, consolidate or split functionalities between systems and guarantee performance for each software blades by setting usage thresholds.
For example, a business could start with a single core, single blade firewall system.
That business can turn on functionalities such as VPN, network anti-virus, VoIP security and intrusion prevention by adding four blades turning their system into a five blade system.
To meet their performance needs the system can be upgraded into a two, four or eight core computing system, enabling multi-gigabit performance with the extended functionality.
Andrew Hanson, network and endpoint security analyst at IDC, said the “software blades’ modular approach provide cost saving benefits in that they can be deployed dynamically without the need to upgrade hardware, firmware or drivers.” “IDC expects the next generation of security products to offer more flexibility in both features and deployment options, a trend that is accelerated by the current state of the economy and the demand for more cost-effective solutions,” he said.
The blades can be deployed on Check Point UTM-1 or Power-1 appliances as well as open servers.