Check Point Software Technologies VSX 12400 BDL CPAP-VSX12400-10-2 Manual Do Utilizador

Códigos do produto
CPAP-VSX12400-10-2
Página de 13
In today’s enterprise networks, the security gateway is more than a firewall—it is a device presented with 
an ever-increasing number of sophisticated threats. As an enterprise security gateway it must use multiple 
technologies to control network access, detect sophisticated attacks and provide additional security 
capabilities like data loss prevention, protection from web-based threats and securing the increasing 
number of mobile devices such as the iPhone and Tablets in enterprise networks. These increased threats 
and security capabilities demand greater performance and versatility from the security appliances. 
The new Check Point 2012 appliances combine high performance multi-core capabilities with fast 
networking technologies—providing the highest level of security for your data, network and employees 
without compromising on network speeds. Optimized for the extensible Software Blades Architecture, 
each appliance is capable of running any combination of Software Blades—including Firewall, IPsec VPN, 
IPS, Application Control, Mobile Access, DLP, URL Filtering, Antivirus, Anti-spam, Identity Awareness 
and Advanced Networking & Clustering—providing the flexibility and the precise level of security for any 
business at every network location. By consolidating multiple security technologies into a single security 
gateway, the new appliances are designed to deliver advanced and integrated security solutions to meet 
all of your business security needs.
Introduced in August 2011, SecurityPower
 is a metric that measures the capacity of an appliance to 
perform multiple advanced functions in a specific traffic volume. It provides an revolutionary benchmark 
that enables customers to select the appropriate security appliances for their specific deployment 
scenarios. The SecurityPower ratings are determined based on real-world customer traffic, multiple 
security functions and a typical security policy.
CHECK POINT 2012 APPLIANCES
Check Point offers the following appliance models to effectively deliver comprehensive security applications:
n
 
2200 Appliance
—The Check Point 2200 is an all-in-one enterprise security solution for the branch offices and small offices.  
Its multi-core technology and 6 integrated 1-gigabit Ethernet ports deliver leading performance in a compact desktop package. 
n
 
4000 Appliances
—The Check Point 4000 Appliances are enterprise-grade security appliances with fast networking and fiber 
and copper connectivity options. In a compact 1U form factor, these appliances deliver superior performance for their class.
n
 
12000 Appliances
—Check Point 12000 Appliances deliver datacenter-grade security with superior multi Software Blades 
performance. These appliances provide organizations with maximum security in high-performance environments such as large 
campuses or data centers.
n
 
21400 Appliance
—The Check Point 21400 is a datacenter-grade security appliance with high port density, low latency and 
acceleration options. Built from the ground up, the 21400 is designed to optimize a full range of software blades—providing  
large enterprises and data centers with the next-generation platform to build their 3D Security blueprint. 
n
 
61000 Security System
—Check Point 61000 with bladed hardware architecture provides scalable performance for data 
centers and telecommunication companies. Each blade is equivalent to an independent server or appliance, and contains 
dedicated resources for the Software Blades. Bladed hardware platforms deliver built-in fail-over and load-balancing utilities,  
as well as an increase in system performance.
n
 
VSX Appliances
—VSX Appliances are dedicated devices for multi-layer, multi-domain virtualized security. VSX allows 
enterprises, data centers and service providers to consolidate up to 250 security gateways with firewall, IPsec and SSL  
virtual private network (VPN), intrusion prevention and URL filtering on a single device.
Introduction
1