Check Point Appliances Models
|
|
|
- Cecil Stephens
- 10 years ago
- Views:
Transcription
1 Check Point Appliances 2012 Models
2 Table of Contents Introduction 3 Check Point GAiA the Next-Gen Security OS 4 About SecurityPower Appliance Appliances Appliances Appliance Security System 10 VSX Appliances 11 Accessories 12 Appliance Specifications 21
3 Introduction In today s enterprise networks, the security gateway is more than a firewall it is a device presented with an ever-increasing number of sophisticated threats. As an enterprise security gateway it must use multiple technologies to control network access, detect sophisticated attacks and provide additional security capabilities like data loss prevention, protection from web-based threats and securing the increasing number of mobile devices such as the iphone and Tablets in enterprise networks. These increased threats and security capabilities demand greater performance and versatility from the security appliances. Empowered by Check Point GAiA, the next-generation security operating system, the new Check Point 2012 appliances combine high performance multi-core capabilities with fast networking technologies providing the highest level of security for your data, network and employees. Optimized for the extensible Software Blades Architecture, each appliance is capable of running any combination of Software Blades including Firewall, IPsec VPN, IPS, Application Control, Mobile Access, DLP, URL Filtering, Anti-Bot, Antivirus, Anti-spam, Identity Awareness and Advanced Networking & Clustering providing the flexibility and the precise level of security for any business at every network location. By consolidating multiple security technologies into a single security gateway, the new appliances are designed to deliver advanced and integrated security solutions to meet all of your business security needs. Introduced in August 2011, SecurityPower is a metric that measures the capacity of an appliance to perform multiple advanced functions in a specific traffic volume. It provides an revolutionary benchmark that enables customers to select the appropriate security appliances for their specific deployment scenarios. The SecurityPower ratings are determined based on real-world customer traffic, multiple security functions and a typical security policy. Check Point 2012 Appliances Check Point offers the following appliance models to effectively deliver comprehensive security applications: n 2200 Appliance The Check Point 2200 is an all-in-one enterprise security solution for the branch offices and small offices. Its multi-core technology and 6 integrated 1-gigabit Ethernet ports deliver leading performance in a compact desktop package. n 4000 Appliances The Check Point 4000 Appliances are enterprise-grade security appliances with fast networking and fiber and copper connectivity options. In a compact 1U form factor, these appliances deliver superior performance for their class. n Appliances Check Point Appliances deliver datacenter-grade security with superior multi Software Blades performance. These appliances provide organizations with maximum security in high-performance environments such as large campuses or data centers. n Appliance The Check Point is a datacenter-grade security appliance with high port density, low latency and acceleration options. Built from the ground up, the is designed to optimize a full range of software blades providing large enterprises and data centers with the next-generation platform to build their 3D Security blueprint. n Security System Check Point with bladed hardware architecture provides scalable performance for data centers and telecommunication companies. Each blade is equivalent to an independent server or appliance, and contains dedicated resources for the Software Blades. Bladed hardware platforms deliver built-in fail-over and load-balancing utilities, as well as an increase in system performance. n VSX Appliances VSX Appliances are dedicated devices for multi-layer, multi-domain virtualized security. VSX allows enterprises, data centers and service providers to consolidate up to 250 security gateways with firewall, IPsec and SSL virtual private network (VPN), intrusion prevention and URL filtering on a single device. 3
4 Check Point GAiA The New Cutting-Edge Security Operating System Greater efficiency with native IPv6 security powered by a 64-bit OS Check Point GAiA is the next generation Secure Operating System for all Check Point Appliances, Open Servers and Virtualized Gateways. GAiA combines the best features from IPSO and SecurePlatform (SPLAT) into a single unified OS providing greater efficiency and robust performance. By upgrading to GAiA, customers will benefit from highly efficient 64-bit OS, improved appliance connection capacity and streamlined operational process. With GAiA, customers will gain the ability to leverage the full breadth and power of all Check Point Software Blades. GAiA secures IPv4 and IPv6 networks utilizing the Check Point Acceleration & Clustering technology and it protects the most complex network environments by supporting 5 different dynamic routing protocols. GAiA simplifies management with segregation of duties among users with different privileges by enabling role-based administration. Furthermore, GAiA greatly increases operation efficiency by offering Automatic Software Update. The intuitive and feature-rich Web interface allows for search of any command or property in a second. GAiA has full compatibility with IPSO and SPLAT command line interface making it an easy transition for existing Check Point customers. 4
5 About SecurityPower The new way to measure the Real Power of security appliances Until now, choosing the right security appliance for a specific deployment situation has been a challenging task. Organizations can have vastly different requirements in securing their computing environments: network size, required throughput, desired security functions, ability to handle future growth and allotted budget are all significant components of the decision process. Furthermore, system vendors often advertise their system performance numbers measured under firewall security only, with a single firewall policy, and in a specific lab network environment. Appliance performances in real-world network traffic vary significantly from the results obtained in this simplified lab condition. So, the task of selecting the right appliance for your deployment can be an elusive one. Check Point SecurityPower addresses the challenges of selecting the appropriate appliances for your specific needs. It is a new metric that allows customers to select security appliances by their capability to handle multiple security functions and a typical security policy in real-world network traffic. Each appliance has a SecurityPower capacity that represents its performance while running multiple advanced security functions with a typical security policy. SecurityPower capacity is determined by integrating multiple appliance performance measurements based on a real-world network traffic mix which resulted from extensive traffic analysis of a large number of Check Point customers. Different combinations of advanced security functions including firewall, IPS, application control, antivirus/anti-malware, URL filtering, and data loss prevention are applied to the traffic in conjunction with a realistic security policy that includes 100 firewall rules, logging of all connections, NAT, a strong IPS protection profile, and up-to-date antivirus signatures. You will be able to measure your specific security requirements in terms of SecurityPower capacity required, and then, compare it against the SecurityPower capacity of each appliance making your appliance selection process simple. SecurityPower is a revolutionary new metric that specifies the true performance and capabilities of security appliances in real-world deployment scenarios. Using SecurityPower as a benchmark, customers can for the first time easily determine which security appliances can best support the current and future network protection needs with their specific requirements. Selecting the right security appliance no longer has to be a risky guesswork. SecurityPower offers a systematic and scientific way to calculate and determine which appliance is the most appropriate choice for a targeted security deployment. SecurityPower For more information: 5
6 2200 Appliance Branch and small office solution enterprise security in a desktop package Overview Seamless security requires protection not only in the main corporate networks; it also requires the same level of protection for remote and branch offices to form an unified and total defense against potential threats. The Check Point 2200 Appliance is an ideal solution for delivering security for small offices and branch offices. The 2200 Appliance offers enterprise-grade security with leading price/performance in a compact desktop form factor. Its multicore technology, six 1 Gigabit Ethernet ports and the full support of the Software Blade Architecture delivers a natural extension of corporate security to remote locations. Despite its small form factor, this powerful appliance provides a respectable 114 SecurityPower units, firewall throughput of 3 Gbps and IPS throughput of more than 2 Gbps. Starting at $3,600 and pre-configured with 5, 7, 8 or 10 Software Blades, the 2200 Appliance provides an effective and affordable security solution in an all-in-one package. Additional blades can be added to further extend and customize protection options. Benefits n Powerful all-in-one security in a compact desktop form factor n Consolidate small/remote office security in a single appliance n Proven security trusted by 100% of the Fortune 100 n Local management console for quick and simple deployment n Centralized management from anywhere in the network 2200 Appliance For more information: 6
7 4000 Appliances Enterprise-grade security appliances with flexible copper and fiber interface options Overview With an ever-increasing number of evolving threats, today s security gateway needs to be more than just a firewall it must use multiple technologies to control network access, detect and mitigate sophisticated attacks, and provide additional security capabilities such as data loss prevention and protection from Web-based threats. The Check Point 4000 Appliances combine fast networking technology with high-performance multi-core capabilities delivering exceptional multi-layered security protection without compromising on performance. The 4000 Appliances pack a maximum of 16 1 Gigabit Ethernet ports, redundant hot-swappable power supplies and an optional out-of-band LOM module into a compact 1U rack mountable form-factor. Supporting up to 11 Gbps of firewall throughput, 6 Gbps of IPS throughput and 623 SecurityPower Units, these appliances offer the best performance for its class. Security decisions no longer have to be a choice between features and performance. With the Check Point 4000 Appliances and the extensible Software Blade Architecture, customers can be confident that the security solutions deployed will meet their protection needs and also match the performance requirements of the most demanding network environments. Benefits n Superior performance for its class n Compact 1U chassis for integrated security and security consolidation n Reliable enterprise-class security appliance with multicore technology and remote management features n Flexible network options with copper, fiber, 1GbE and 10GbE ports n Proven and extensible security securing the perimeter and segments of enterprise networks n Simple deployment and centralized management from anywhere in the network n Remote management with Lights-Out-Management (LOM, 4800 only) 4800 Appliance 4600 Appliance 4400 Appliance 4200 Appliance For more information: 7
8 12000 Appliances Datacenter-grade security appliances with redundant components and superior multi-software Blade performance Overview Leveraging its multi-core and acceleration technologies, the Check Point Appliances deliver fast firewall throughput from 15 to 30 Gbps and IPS throughput from 8 to 17 Gbps. Optimized for the Software Blades Architecture, these appliances are designed for high performance and reliability for even the most demanding enterprise and datacenter network environments. The Appliances provides superior price performance on key investment criteria such as price-per-port and price-per-gb, all in a smaller form factor than competing products. In either an one rack unit (1RU) or a two rack unit (2RU) form factor, the Appliances deliver more than 1,800 SecurityPower Units (SPU) of real-world traffic processing power for unsurpassed performance of any security appliance in its class. Business continuity and high serviceability are further ensured by redundant hot-swappable power supplies and hard disk drives, and an optional Lights-Out-Management (LOM) module. With these and the high-availability features in the software, any potential service-interrupting failures can be avoided or quickly mitigated. Benefits n Datacenter-grade security with attractive prices n Flexible network options with high port density for a wide variety of network environments n Best performing security appliances in it class n Redundant hot-swappable components ensure business continuity n Simple deployment and centralized management from anywhere in the network n Remote management with Light-Out-Management (LOM) Appliance Appliance Appliance For more information: 8
9 21400 Appliance Datacenter-grade security appliance with high port density, low latency and acceleration option Overview Leveraging its multi-core and acceleration technologies, the Check Point Appliance supports the industry s fastest firewall throughput of up-to 110 Gbps and IPS throughput of more than 21 Gbps. The is designed from the ground up for unmatched flexibility for even the most demanding enterprise and datacenter network environments. The Appliance provides superior price performance on key investment criteria such as price-per-port and price-per-gb, all in a smaller form factor than any competing products in its class. It is a two rack unit (2RU) security appliance that delivers more than 50 Gbps of large packet throughput and supports a variety of copper, fiber, 1GbE and 10 GbE network connections. An optional Security Acceleration Module will boost performance to as much as 110 Gbps and 2,900 SecurityPower Units (SPU). Optional clustering and serviceable components frees administrators to perform transparent rolling upgrades in which nodes are gracefully removed from the cluster, upgraded, and reinserted, all without any disruption to services. Available with the full suite of Check Point Software Blades, the Appliance is extensible to include additional Blades as security needs grow. Automatic updates from Check Point turn the Appliance into an active security solution that keeps your data, network and employees safe from the latest threats and exploits. Benefits n Industry s most powerful security appliance in a compact 2U chassis n Maximum security and performance for demanding data center environments n High port density fits easily into highly segmented network environments n Optimized for low latency transaction-oriented environments n High availability and serviceability for optimal reliability n Simple deployment and management from anywhere in the network n Remote management with Light-Out-Management (LOM) n Low latency with Security Acceleration Module Appliance For more information: 9
10 61000 Security System Multi-blade hardware architecture provides scalable performance for data centers and telecommunication companies Overview When it comes to protecting the most demanding network environments of data centers, telecommunication and cloud service providers, security and performance are two critical factors that cannot be compromised. The multi-blade hardware and software architecture in the Security System is ideal for these environments. The platform provides scalable firewall throughput from 40 to 200 Gbps and from 3,000 to 14,600 SecurityPower Units across two to twelve Security Gateway modules in a platform that is capable of 1 Tbps. The system supports up-to 70 million concurrent connections and 600,000 sessions per second bringing unparalleled security performance to multi-transaction environments. Designed from the ground-up to support the reliability, availability and serviceability requirements of data centers and service providers, the carrier-grade ATCA chassis runs Check Point ClusterXL in High Availability and Load Sharing modes among Security Gateway Modules in one chassis. Check Point SyncXL enables highly efficient synchronization of system and security information between components ensuring high system performance. Add another chassis operating in High Availability mode to further improve redundancy ensuring mission-critical assets are always available and protected. In addition, proven advanced security technologies from Check Point protect against sophisticated attacks with a world-record Intrusion Prevention (IPS) performance of 85 Gbps based on a default profile or 40 Gbps based on a recommended security profile and a real-world traffic mix. With the Security System, customers can easily optimize and consolidate any number of security protections available in Check Point s Software Blade Architecture, such as: Firewall, IPsec VPN, IPS, URL Filtering, Antivirus, and Application Control into a single, integrated solution. Benefits n Ground-breaking performance for the most demanding environments n Full system redundancy and serviceability for optimal reliability n Extremely flexible hardware architecture with modular components n Automatic load-sharing and load-balancing among installed components n Carrier-grade with NEBS L3 and ETSI compliance n 1 Tbps ready n ATCA architecture n Designed for fast deployment in less than 30 minutes Security System For more information: 10
11 VSX Appliances Virtualized security Overview The VSX appliances are security gateways that enable the consolidation of hundreds of security systems on a single hardware platform, delivering deep cost savings and infrastructure consolidation. Based on the proven security of VPN-1 Power, VSX provides best-in-class firewall, VPN, URL filtering, and intrusion-prevention technology to multiple networks, securely connecting them to each other and shared resources such as the Internet and DMZs. All security systems, virtual and real, are centrally managed through Check Point SmartCenter or Multi-Domain Security Management consoles. Powerful turnkey VSX appliances further reduce deployment cost while delivering carrier-class reliability and scalability. VSX enables any organization to optimize space and costs by operating a virtual network of hundreds of routers, switches, and VPN-1 gateways. For MSPs, VSX becomes the ideal platform for new subscription revenue opportunities by delivering new security services easily and efficiently. These include value-add virtualized content filtering, VPN, network segmentation and firewall services, instantly provisioned using the VSX Virtual Systems Wizard at the lowest possible cost. Benefits n Unique and comprehensive virtualized security solution with firewall, VPN, IPS, and URL filtering n Consolidate from five to hundreds of security gateways on a single device, increasing device hardware utilization and reducing power, space, and cooling n Linear scalability, load sharing and multi-gigabit performance n Flexible deployment options including open platforms and a full line of turnkey appliances n Centralized security management unifies both physical and virtual management in a single solution VSX Appliance VSX Appliance VSX Appliance VSX Appliance For more information: 11
12 Appliance Accessories 4000, and Appliances Network The 4000 and Appliances can be ordered with 1GbE copper, 1GbE fiber or 10 GbE fiber network interface cards. The port density varies depending upon the appliance and the number of expansion slots available. Network interface cards are interchangeable between the 4000 and Appliances with the 10 GbE interface options available in the 4800 model and up. The Appliance can be ordered with 1GbE copper, 1GbE fiber or 10GbE fiber network interface cards. The port density can be expanded up to 37 1GbE copper ports or up to 36 1GbE fiber ports. A 4-port 10GbE fiber option is also available for the expanding its maximum network capacity to 12 x 10GbE ports. NETWORK PORT CAPACITIES (4000, and APPLIANCES) Network I/O Options (4000 and Appliances) /100/1000 Base-T (Default/Max Ports) 4/8 8/12 8/12 8/16 8/16 10/26 14/26 13/ Base-F SFP (Default/Max Ports) 0/4 0/4 0/4 0/4 0/4 0/12 0/12 0/36 10GBase-F SFP+ (Default/Max Ports) N/A N/A N/A 0/2 0/4 0/12 0/12 0/12 Expansion Slots NETWORK I/O MODULES (4000 AND APPLIANCES) SKU CPAC-4-1C CPAC-4-1F CPAC-8-1C CPAC-2-10F CPAC-4-10F Supported Appliances 4200; 4400; 4600; 4800; 12200; 12400; ; 4400; 4600; 4800; 12200; 12400; ; 12200; 12400; ; 12200; 12400; ; 12400; No. of Ports Port Type RJ-45 (Copper) 10/100/1000Base-T SFP 1000Base-SX\LX RJ45 (Copper) 10/100/1000Base-T SFP+ 10GBase-SR\LR SFP+ 10GBase-SR\LR Speed 1Gbps 1Gbps 1Gbps 10Gbps 10Gbps Possible Transceivers NA CPAC-TR-1SX CPAC-TR-1LX NA CPAC-TR-10SR CPAC-TR-10LR CPAC-TR-10SR CPAC-TR-10LR 12
13 Appliance Accessories 4000, and Appliances NETWORK TRANSCEIVER* SPECIFICATION (4000 AND APPLIANCES) SKU CPAC-TR-1SX CPAC-TR-1LX CPAC-TR-10SR CPAC-TR-10LR Form Factor SFP SFP SFP+ SFP+ Protocol 1.25 Gb/s 1000Base-SX Ethernet 1.25 Gb/s 1000Base-LX Ethernet 10GBASE-SR 10G Ethernet 10GBASE-LR 10G Ethernet Wavelength (nm) Connector LC LC LC LC Distance (Max) 500m at 50/125µm MMF 5km 300m 10km Supported Cable Type Orange: multi-mode 50/125 µm MMF (OM3) * Only Check Point provided transceivers are supported. Yellow: Single mode 5km at 9um Orange: multi-mode 50/125 µm fiber (OM3) Yellow: single mode 10km at 9um NETWORK I/O MODULES (21400 APPLIANCE) SKU CPAC-12-1C CPAC-12-1F CPAC-4-10F No. of Ports Port Type RJ-45 (Copper) 10/100/1000Base-T SFP 1000Base-T\SX\LX SFP+ 10GBase-SR\LR Speed 1Gbps 1Gbps 10Gbps Possible Transceivers NA CPAC-TR-1SX CPAC-TR-1LX CPAC-TR-1T CPAC-TR-10SR CPAC-TR-10LR
14 Appliance Accessories 4000, and Appliances NETWORK TRANSCEIVER* SPECIFICATION (21400 APPLIANCE) SKU CPAC-TR-1T CPAC-TR-1SX CPAC-TR-1LX CPAC-TR-10SR CPAC-TR-10LR Form Factor SFP SFP SFP SFP+ SFP+ Protocol 1000Base-T Compliant 1.25 Gb/s 1.25 Gb/s 1000Base-SX Ethernet 1000Base-LX Ethernet 10GBASE-SR 10G Ethernet 10GBASE-LR 10G Ethernet Wavelength (nm) m Connector RJ-45 LC LC LC LC Distance (Max) 100 m Supported Cable Type Cat 5 Input Level (Receive Power) dbm Output Level (Transmit Power) dbm * Only Check Point provided transceivers are supported. 500m at 50/125µm MMF Orange: multi-mode) 50/125 µm MMF (OM3) 10km 300m 10km Yellow: Single mode 10km at 9um Orange: multi-mode 50/125 µm fiber (OM3) Yellow: single mode 10km at 9um N/A -18dBm -19dBm -17dBm -19dBm N/A -2.5 to -9dBm -3 to -9.5dBm -1 to -9.5dBm -3 to -11dBm Security Acceleration Module (21400 Appliance) SKU CPAC-SAM108 No. of Security Cores 108 Card Type Acceleration Module for appliances Performance Upgrade to Appliance Firewall 110 Gbps Packets Per Second 60,000,000 Sessions Per Second 300,000 Firewall Latency Sub 5µs 14
15 Appliance Accessories 4000, and Appliances Storage Redundant disk drives are configured in a RAID 1 mirror increasing system reliability. RAID status monitoring is available via SNMP. REDUNDANT STORAGE OPTIONS (4000, 1200 & APPLIANCES) Storage Options Default (GB) 1x250 1x250 1x250 1x250 1x500 1x500 2x500 2x500 Optional Redundant HDD (GB) N/A N/A N/A N/A 1x500 1x500 Included Included Maximum N/A N/A N/A N/A 2x500 RAID1 2x500 RAID1 2x500 RAID1 2x500 RAID1 Storage HDD Specification (12200, 12400, & Appliances) SKU CPAC-HDD-500G CPAC-HDD-500G CPAC-HDD-500G Capacity 500 GB 500 GB 500 GB Interface SATA, 3Gbps SATA, 3Gbps SATA, 3Gbps RPM Cache 32MB 64MB 64MB Power Supplies Power Supplies increase the reliability of the appliance. In the dual power supply configuration an audible alarm occurs when one power supply fails. Power Supply status is also monitored via SNMP or in the WebUI status. POWER SUPPLY OPTIONS (4000, & APPLIANCES) Power Supply Options Redundant Power Supplies (1 + 1) N/A N/A N/A Optional Optional Included Included Included Power Supply Specification (4800, 12200, 12400, & Appliances) SKU CPAC-PSU-4800 CPAC-PSU CPAC-PSU CPAC-PSU CPAC-PSU Input Voltage VAC VAC VAC VAC VAC Input Current 3-1.5A 3-1.5A 3-1.5A 3-1.5A 3-1.5A Frequency 47-63Hz 47-63Hz 47-63Hz 47-63Hz 47-63Hz Thermal Output BTU BTU BTU BTU 1,533 BTU Output Power 275W 275W 300W 400W 910W 15
16 Appliance Accessories 4000, and Appliances Memory Memory increases the connection capacity of the appliance and improves the ability of the appliance to handle additional Software Blades. MEMORY EXPANSION OPTIONS Memory Expansion Options Default (GB) Optional Memory Expansion (GB) N/A N/A N/A 4 4, 8 4, Maximum (GB) Memory Specification (4800, 12200, 12400, & Appliances) SKU CPAC-RAM4GB CPAC-RAM4GB CPAC- RAM4GB CPAC- RAM6GB CPAC- RAM12GB Capacity 4 GB 4 GB 4 GB 6 GB 12 GB Type DDR3 DDR3 DDR3 DDR3 DDR3 Number of Modules 1 x 4GB 1, 2 x 4GB 1, 2 x 4GB 6 x 1GB 6 x 2GB ECC No No No Yes Yes Slide MOUNTING Rails Slide rails provide easy and fast maintenance access for 4000, and Appliances in a standard 19-inch (48.26 cm) rack (see specification EIA-310-D). SLIDING MOUNTING RAIL OPTIONS Sliding Rail Optional Optional Optional Included Included Included Included Included SLIDE RAIL SPECIFICATION (4000 APPLIANCES) Use the telescoping rails used with racks that have these specifications: SKU: CPAC-RAILS Minimum depth: 25.9 in (66 cm ) Maximum depth: 31.5 in (80 cm) SLIDE RAIL SPECIFICATION (21400 APPLIANCE) Minimum depth: 26 in (66 cm) Maximum depth: 35 in (88.9 cm) 16
17 Appliance Accessories Security System Security System The Check Point Security System delivers business continuity and serviceability through capabilities such as redundant and hot-swappable components for its key system building blocks such as power supply, cooling fan, and other system I/O and management modules. Designed to meet the stringent ATCA specification, the system is NEBS Level-3 compliant when deployed with the optional SGM220T Security Gateway Modules. Chassis Options Two redundant Chassis Management Modules (CMM) continuously check and monitor the health of the chassis including fans, power supplies and Security Gateway Modules (SGM). The CMM also enables control of power to the SGM and the SSM (Security Switch Module) modules AC DC Chassis Management Module (CCM, Default/Max) 2/2 2/2 Cooling Fan (Default/Max) 6/6 6/6 AC Power Supply (Default/Max) 5/5 N/A DC Power Supply (Default/Max) NA 2/2 Security Gateway Module (SGM) Options Supporting from 2 to 12 Security Gateway Modules (SGM), the is an extensible platform that scales with your business to enforce the Software Blade security and policies AC DC SGM220 (Default/Max) 2/12 2/12 SGM220T NEBS Level 3 (Default/Max) 0/12 0/12 Memory for SGM (Default/Max) 12/24 12/24 Security Switch Module (SSM) Options Two redundant Security Switch Modules (SSM) provide the switching fabric, physical interfaces and routing functions for the Security System AC DC Security Switch Module (SSM60, Default/Max) 2/2 2/2 Security Switch Module (SSM160, Default/Max) 0/2 0/2 17
18 Appliance Accessories Security System SKU CPAP-SSM60 CPAP-SSM160 No. of Ports Compatible Transceivers 6 x 10GBase-F XFP Management Ports: 2 x 10GBase-F XFP 2 x 1000Base-F SFP CPAC-TR-10LR-SSM60-XFP CPAC-TR-10SR-SSM60-XFP CPAC-TR-1LX-SSM60-SFP CPAC-TR-1SX-SSM60-SFP CPAC-TR-1T-SSM60-SFP 8 x 10GBase-F SFP+ 2 x 40GBase-F QSFP (can be split to 8 x 10GBase-F with 1000 Gbps throughput) Management Ports: 2 x 10GBase-F XFP+ 2 x 1000Base-F SFP+ CPAC-TR-10LR-SSM160-SFP+ CPAC-TR-10SR-SSM160-SFP+ CPAC-TR-40SR-SSM160-QSFP CPAC-TR-40LR-SSM160-QSFP CPAC-TR-40SPLIT-QSFP-SR CPAC-TR-1SR-SSM160-SFP CPAC-TR-1LX-SSM160-SFP CPAC-TR-1T-SSM160-SFP+ 18
19
20
21 Appliance Specifications 2012 Appliances Performance Small-Office Enterprise Grade Data Center Grade Ultra-High End 3000 to SecurityPower / Firewall Throughput (Gbps) /110 1 Up to 200 VPN Throughput (Gbps) IPS Default Profile (Gbps) Up to 110 IPS Recommended Profile (Gbps) Up to 40 Connections Per Second (K) Concurrent Sessions (M) Network 10/100/1000Base-T/ Max Ports /300 1 Up to Up to /6 4/8 8/12 8/12 8/16 8/16 10/26 14/26 13/37 NA 1000Base-F SFP (MAX Ports) NA NA 3 10GBase-F SFP+ (MAX Ports) NA NA NA NA / GBase-F MAX Ports NA NA NA NA NA NA NA NA NA 4 3 Expansion Slot Additional Features Software Edition R71.x, R75.x R71.x, R75.x R71.x, R75.x R71.x, R75.x R71.x, R75.x Storage 250 GB 250 GB 250 GB 250 GB 250 GB R71.x, R75.x GB R71.x, R75.x GB R71.x, R75.x 2x500 GB RAID 1 R71.x, R75.x 2x500 GB RAID 1 R75.x 64 bit - Memory / Max 2/2 GB 4/4 GB 4/4 GB 4/4 GB 4/8 GB 4/12 GB 4/12 GB 6/12 GB 12/24 GB 12/24 GB 4 LOM Card NA NA NA NA Included Included Included Included Included Included Physical Enclosure Desktop 1U 1U 1U 1U 1U 2U 2U 2U 15U Dimensions WxDxH (Standard) Dimensions WxDxH (Metric) Weight Power Dual, Hot-Swappable Power Supplies Power Input Single Power Supply Rating 8.27 x 8.25 x 1.65 in. 210 x x 42 mm 2kg (4.4 lbs) x x 1.73 in. 439 x 320 x 44 mm 4kg (8.82 lbs) x x 1.73 in. 439 x 320 x 44 mm 7.5kg (16.53 lbs) x x 1.73 in. 439 x 320 x 44 mm 7.5kg (16.53 lbs) x x 1.73 in. 438 x 410 x 44 mm 7.6kg (16.76 lbs) x x 1.73 in. 438 x 410 x 44 mm 7.6kg (16.76 lbs) x x 3.46 in. 438 x 562 x 88 mm 23.4kg (51.6 lbs) x x 3.46 in. 438 x 562 x 88 mm 23.4kg (51.6 lbs) 17 x 28 x 3.5 in. 431 x 710 x 88 mm 26kg (57.4 lbs) 17.5 x x in. 445 x 385 x 660 mm Max: 90kg (198.4 lbs) No No No No Optional Optional Yes Yes Yes Yes VAC, 47-63Hz 40W 100W 250W 250W 275W 275W 300W 400W 910W 110V, 220V Power Consumption (Max) 35W 57W 90W 90W 140W 121W 132W 220W 449W 5000W DC Option No No No Optional 6 Optional 6 Optional 6 Optional 6 Optional 6 Optional 6 Yes 1 With Security Acceleration Module 2 With memory upgrade and the GAiA OS 3 Not including Security Switch Module Management Ports 4 Per Security Gateway Module 5 Includes 5 AC PSUs or 2 DC PSUs 6 Via a Solutions Center request 21
22 Appliance Specifications VSX Appliances Performance Firewall Throughput (Gbps) VPN Throughput (Gbps) Concurrent Sessions (M) VSX Single Unit VSX VSLS VSX Single Unit VSX VSLS VSX Single Unit VSX VSLS VSX Single Unit VSX VSLS Network 10/100/1000Base-T Port / (Max) 8/16 16/32 10/26 20/52 14/26 28/52 13/37 26/ Base-F SFP (Max Ports) GBase-F SFP+ (Max Ports) Expansion Slot VLANs Additional Features Software Edition VSX R67 VSX R67 VSX R67 VSX R67 VSX R67 VSX R67 VSX R67 VSX R67 Storage GB 2 x GB GB 2 x GB 2 x 500 GB RAID 1 2 x 2 x 500 GB RAID 1 2 x 500 GB RAID 1 2 x 2 x 500 GB RAID 1 Memory Max 4/12 GB 2 x 4/12 GB 4/12 GB 2 x 4/12 GB 6/12 GB 2 x 6/12 GB 12/24 GB 2 x 12/24 GB LOM Card Included Included Included Included Included Included Included Included Virtual Systems (Included/Capacity) 5/10 5/10 10/150 10/150 10/150 10/250 10/250 10/250 Physical Enclosure 1U 2U 2U 4U 2U 4U 2U 4U Dimensions WxDxH (Standard) Dimensions WxDxH (Metric) Weight Power Dual, Hot-Swappable Power Supplies Power Input Single Power Supply Rating Power Consumption (Max) x x 1.73 in. 438 x 410 x 44mm 7.6kg (16.76 lbs) x x 3.46 in. 438 x 410 x 88mm 15.2kg (33.52 lbs) x x 3.46 in. 438 x 562 x 88mm 23.4kg (51.6 lbs) x x 6.92 in. 438 x 562 x 176mm 46.8kg (103.2 lbs) x x 3.46 in. 438 x 562 x 88mm 23.4kg (51.6 lbs) x x 6.92 in. 438 x 562 x 176mm 46.8kg (103.2 lbs) 17 x 28 x 3.5 in. 431 x 710 x 88mm 26kg (57.4 lbs) 17 x 28 x 7 in. 431 x 710 x 176mm 52kg (114.8 lbs) Optional Optional Yes Yes Yes Yes Yes Yes 100~240V, 47~63Hz 275W 275W 300W 300W 400W 400W 910W 910W 121W 2 x 121W 132W 2 x 132W 220W 2 x 220W 449W 2 x 449W 22
23
24 Contact Check Point now By phone in the US: option 5 or contact check point Worldwide Headquarters 5 Ha Solelim Street, Tel Aviv 67897, Israel Tel: Fax: [email protected] U.S. Headquarters 800 Bridge Parkway, Redwood City, CA Tel: ; Fax: Check Point Software Technologies Ltd. All rights reserved. Check Point, AlertAdvisor, Application Intelligence, Check Point 2200, Check Point 4000 Appliances, Check Point 4200, Check Point 4600, Check Point 4800, Check Point Appliances, Check Point 12200, Check Point 12400, Check Point 12600, Check Point 21400, Check Point 6100 Security System, Check Point Anti-Bot Software Blade, Check Point Application Control Software Blade, Check Point Data Loss Prevention, Check Point DLP, Check Point DLP-1, Check Point Endpoint Security, Check Point Endpoint Security On Demand, the Check Point logo, Check Point Full Disk Encryption, Check Point GO, Check Point Horizon Manager, Check Point Identity Awareness, Check Point IPS, Check Point IPSec VPN, Check Point Media Encryption, Check Point Mobile, Check Point Mobile Access, Check Point NAC, Check Point Network Voyager, Check Point OneCheck, Check Point R75, Check Point Security Gateway, Check Point Update Service, Check Point WebCheck, ClusterXL, Confidence Indexing, ConnectControl, Connectra, Connectra Accelerator Card, Cooperative Enforcement, Cooperative Security Alliance, CoreXL, DefenseNet, DynamicID, Endpoint Connect VPN Client, Endpoint Security, Eventia, Eventia Analyzer, Eventia Reporter, Eventia Suite, FireWall-1, FireWall-1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, Hybrid Detection Engine, IMsecure, INSPECT, INSPECT XL, Integrity, Integrity Clientless Security, Integrity SecureClient, InterSpect, IP Appliances, IPS-1, IPS Software Blade, IPSO, R75, Software Blade, IQ Engine, MailSafe, the More, better, Simpler Security logo, Multi-Domain Security Management, MultiSpect, NG, NGX, Open Security Extension, OPSEC, OSFirewall, Pointsec, Pointsec Mobile, Pointsec PC, Pointsec Protector, Policy Lifecycle Management,Power-1, Provider-1, PureAdvantage, PURE Security, the puresecurity logo, Safe@Home, Safe@Office, Secure Virtual Workspace, SecureClient, SecureClient Mobile, SecureKnowledge, SecurePlatform, SecurePlatform Pro, SecuRemote, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, Security Management Portal, SecurityPower, Series 80 Appliance, SiteManager-1, Smart-1, SmartCenter, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartConsole, SmartDashboard, SmartDefense, SmartDefense Advisor, SmartEvent, Smarter Security, SmartLSM, SmartMap, SmartPortal, SmartProvisioning, SmartReporter, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SmartWorkflow, SMP, SMP On-Demand, SocialGuard, SofaWare, Software Blade Architecture, the softwareblades logo, SSL Network Extender, Stateful Clustering, Total Security, the totalsecurity logo, TrueVector, UserCheck, UTM-1, UTM-1 Edge, UTM-1 Edge Industrial, UTM-1 Total Security, VPN-1, VPN-1 Edge, VPN-1 MASS, VPN-1 Power, VPN-1 Power Multi-core, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VE, VPN-1 VSX, VSX, VSX-1, Web Intelligence, ZoneAlarm, ZoneAlarm Antivirus + Firewall, ZoneAlarm DataLock, ZoneAlarm Extreme Security, ZoneAlarm ForceField, ZoneAlarm Free Firewall, ZoneAlarm Pro Firewall, ZoneAlarm Internet Security Suite, ZoneAlarm Security Toolbar, ZoneAlarm Secure Wireless Router, Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. ZoneAlarm is a Check Point Software Technologies, Inc. Company. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 5,987,611, 6,496,935, 6,873,988, 6,850,943, 7,165,076, 7,540,013, 7,725,737 and 7,788,726 and may be protected by other U.S. Patents, foreign patents, or pending applications. May 29, 2012 Classification: [Protected] - All rights reserved.
CHECK POINT. Software Blade Architecture
CHECK POINT Software Blade Architecture 2 softwareblades from Check Point Today s Security Challenge Protecting enterprises against today s constantly evolving threat environment has never been more challenging.
CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.
CHECK POINT Software Blade Architecture Secure. Flexible. Simple. softwareblades from Check Point Today s Security Challenge Protecting networks against today s constantly evolving threat environment has
The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be
The Evolution of IPS Intrusion Prevention (Protection) Systems aren't what they used to be The Evolution of IPS Contents Background 3 Past Case for Standalone IPS 3 Organizational Control 3 Best-of-Breed
CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.
CHECK POINT TOTAL SECURITY APPLIANCES Flexible Deployment. Centralized Management. Check Point appliances deliver a powerful turnkey solution for deploying Check Point awardwinning software solutions to
Check Point Software Blade Architecture. Achieving the right balance between security protection and investment
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Contents Introduction 3 Check Point Software Blade architecture overview 3 What is a Software
Check Point Appliances
Check Point Appliances Table of Contents Introduction 3 Check Point GAiA - a Unified Secure Operating System 4 About SecurityPower 5 Next Generation Security Solutions 6 600 Appliances 7 1100 Appliances
How to Implement an Integrated GRC Architecture
How to Implement an Integrated GRC Architecture Companies that select individual solutions for each regulatory challenge they face will spend 10 times more on IT portion of compliance projects than companies
Check Point 4800 Appliance
Datasheet: Check Point 4800 Appliance 4800 Enterprise-grade security appliance (623 SPU/Gbps) great multi-blade performance and 0Gb Fiber connectivity options Check Point 4800 Appliance Today the enterprise
Check Point Whitepaper. Enterprise IPv6 Transition Technical Whitepaper
Check Point Whitepaper Enterprise IPv6 Transition Technical Whitepaper Contents Introduction 3 Transition Mechanisms 3 Dual Stack 4 Tunneling 4 Translation 7 Recommendations 8 Transition Security Considerations
Endpoint Security Considerations for Achieving PCI Compliance
Endpoint Security Considerations for Achieving PCI Compliance Contents PCI Requirements and Endpoint Security 3 Overview of the PCI Data Security Standard 3 Developing a PCI Compliance Plan 4 Endpoint
Check Point Software Blade Architecture. Achieving the right balance between security protection and investment
Check Point Software Blade Architecture Achieving the right balance between security protection and investment Check Point Software Blade Architecture Contents Introduction 3 Check Point Software Blade
Check Point. Software Blade Architecture
Check Point Software Blade Architecture TODAY S SECURITY CHALLENGE Protecting enterprises against today s constantly evolving threat environment has never been more challenging. Infrastructure, connectivity
Check Point taps the power of virtualization to simplify security for private clouds
Datasheet: Check Point Virtual Systems Check Point taps the power of virtualization to simplify security for private clouds Looking for ways to reduce complexity and simplify network security in your private
Appliance Comparison Chart
202 Appliances 2200 4200 4400 4600 4800 Small-Office Enterprise Grade Production Performance (Security Benchmark) Security 4 4 223 374 623 Firewall (Gbps).4.4 2.2 3.4 5.8 Firewall and IPS (Mbps) 50 50
Leverage IPS to Make Patch Tuesday Just Another Day
Leverage IPS to Make Patch Tuesday Just Another Day Contents Introduction 3 Evolution of a Practice 3 Weaknesses of the Model 4 Lack of timeliness 4 Inherent predictability 4 Painful disruptions 5 A Better
Check Point 12200 Appliance
Datasheet: Check Point 2200 Appliance 2200 Datacenter-grade security appliance Check Point 2200 Appliance Today the enterprise gateway is more than a firewall. It is a security device presented with an
The Power-1 Performance Architecture: Delivering Application-layer Security at Data Center Performance Levels
The Power-1 Performance Architecture: Delivering Application-layer Security at Data Center Performance Levels The Power-1 Performance Architecture Contents Introduction 3 A delicate balance: Performance
Check Point 21400 Appliance
Datasheet: Check Point 2400 Appliance 2400 Datacenter-grade security appliance Check Point 2400 Appliance Today s firewall is a security device presented with an ever-increasing number of sophisticated
Solving the Performance Hurdle for Integrated IPS
Solving the Performance Hurdle for Integrated IPS New Check Point Technologies Enable a Full-Function, Integrated Intrusion Prevention System without Compromise to Performance or Security Solving the Performance
How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators
How to Get NAC Up-and-Running in One Hour For Check Point Firewall or Endpoint Security Administrators Contents Introduction 3 Defining an Organization s Requirements for NAC 3 Two Paths to NAC Port vs.
Check Point 13500 Appliance
Datasheet: Check Point 3500 Appliance 3500 Blazing fast data center cyber-security Check Point 3500 Appliance YOUR CHALLENGE Large data centers have uncompromising needs for performance, uptime and scalability.
Check Point 12600 Appliance
Datasheet: Check Point 2600 Appliance 2600 Datacenter-grade security appliance Check Point 2600 Appliance Today the enterprise gateway is more than a firewall. It is a security device presented with an
SECURITY APPLIANCES www.checkpoint.com
CHECK POINT SECURITY APPLIANCES www.checkpoint.com Table of Contents Introduction 1 Power-1 Appliances 2 IP Appliances 3 UTM-1 Appliances 4 Series 80 Appliance 5 VSX-1 Appliances 6 DLP-1 Appliances 7 Smart-1
Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper
Check Point Whitepaper Check Point Abra: A Virtual Secure Workspace Technical Whitepaper Contents An Increasingly Mobile World 3 Threats and Dangers of a Mobile Workforce 3 Abra Provides the Solution 4
Check Point 4800 Appliance
Datasheet: Check Point 4800 Appliance 4800 Enterprise-grade security appliance Check Point 4800 Appliance Today the enterprise gateway is more than a firewall. It is a security device presented with an
Check Point 12400 Appliance
Datasheet: Check Point 400 Appliance 400 Datacenter-grade security appliance Check Point 400 Appliance Today the enterprise gateway is more than a firewall. It is a security device presented with an ever-increasing
Check Point Corporate Logo Usage Guidelines
Check Point Corporate Logo Usage Guidelines 1. The Check Point Logo The Check Point logo is the most visible and recognizable symbol of our brand. It should appear on every piece of communication from
Check Point 2200 Appliance
Datasheet: Check Point 2200 Appliance 2200 Branch & Small Office Solution Enterprise security in a desktop package Check Point 2200 Appliance Today the Internet gateway is more than a firewall. It is a
Appliance Comparison Chart
Security Gateway Appliances 2200 4200 4400 4600 4800 Small-Office Enterprise Grade Production Performance (Security Benchmark - version R77 and later) Security 2 2 230 405 673 Firewall (Gbps).4.4 2.2 3.4
Appliance Comparison Chart
Security Gateway Appliances 2200 4200 4400 4600 4800 Small-Office Enterprise Grade Production Performance (Security Benchmark - version R77 and later) Security 2 2 230 405 673 Firewall (Gbps).4.4 2.2 3.4
Securing Virtualization with Check Point and Consolidation with Virtualized Security
Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized
A Getting Started Guide: What Every Small Business Needs To Know About Internet Security
A Getting Started Guide: What Every Small Business Needs To Know About Internet Security In This Document 1 Overview: Internet Security In Small Businesses 2 Internet Access New Business Opportunities
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
USB Drives: Friend or Foe? New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise
New User Trends and Exploits in USB Requires Security Controls to Protect Endpoints and the Networked Enterprise Contents Executive Summary 3 Exploiting Risks of USB Drives and Portable Applications 3
Unified Threat Management from Check Point. The security you need. The simplicity you want
Unified Threat Management from Check Point The security you need. The simplicity you want Unified Threat Management from Check Point Contents Introduction 3 Complexity of the security problem 3 Comprehensive
Scalable. Reliable. Flexible. High Performance Architecture. Fault Tolerant System Design. Expansion Options for Unique Business Needs
Protecting the Data That Drives Business SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding network environments.
Check Point Endpoint Security. Single agent for endpoint security delivering total protection and simplified management
Single agent for endpoint security delivering total protection and simplified management Contents Executive summary 3 Meeting the challenge of securing endpoints 4 A new strategy: Unifying endpoint security
Best Practices for Deploying Intrusion Prevention Systems. A better approach to securing networks
Best Practices for Deploying Intrusion Prevention Systems A better approach to securing networks A better approach to securing networks Contents Introduction 3 Understanding deployment needs 3 Selecting
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
Deliver More Applications for More Users
HARDWARE DATASHEET Deliver More Applications for More Users F5 BIG-IP Application Delivery Controller (ADC) platforms can manage even the heaviest traffic loads at both layer 4 and layer 7. By merging
The On-Demand Application Delivery Controller
What s Inside: 2 Increase Intelligence, Not Operating Costs 2 Simplify Your Network 2 Maximize Large-Scale Application Performance 2 Achieve Ultimate Reliability 2 The Advantages of Technology 6 Platforms
LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive
LICENSE GUIDE Software Blades products SKU Prefix Name Description Additive CPAP-SG5075 CPAP-SG9075 CPAP-SG11065 CPAP-SG11075 CPAP-SG11085 CPAP-IP2455 CPAP-IP1285 CPAP-IP695 CPAP-IP565 CPAP-IP395 CPAP-IP295
Nokia IP Security Platforms Technical Specifications Guide Nokia Enterprise Solutions
Nokia IP Security Platforms Technical Specifications Guide Nokia Enterprise Solutions Positioning Enterprise ROBO 8, 16, 32 and Unlimited Work extender, telecommuter, small office FW or VPN Medium businesses
The Seven Key Factors for Internet Security TCO
The Seven Key Factors for Internet Security TCO Executive Summary Total Cost of Ownership, or TCO, of any information technology deployment consists of more than simply the direct costs of acquisition
Imperva SecureSphere Appliances
Imperva SecureSphere Appliances DA T A SH E E T Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior and resiliency for demanding data center environments. With fail open interfaces,
Check Point UserAuthority Guide. Version NGX R61
Check Point UserAuthority Guide Version NGX R61 700358 January 2006 2003-2006 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
Check Point QoS. Administration Guide Version NGX R65
Check Point QoS Administration Guide Version NGX R65 700726 January 2007 2003-2007 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
Virtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
Check Point Endpoint Security Full Disk Encryption. Detailed product overview for Windows and Linux
Check Point Endpoint Security Full Disk Encryption Detailed product overview for Windows and Linux Check Point Endpoint Security Full Disk Encryption Contents How secure is my data? 3 How effective is
Preventing Data Leaks on USB Ports. Check Point Endpoint Security Media Encryption simply regulates access and data for any plug-and-play peripherals
Preventing Data Leaks on USB Ports Check Point Endpoint Security Media Encryption simply regulates access and data for any plug-and-play peripherals Preventing Data Leaks on USB Ports Contents Executive
Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection
DATA SHEET Extreme Security Threat Protection G2 - Intrusion Prevention Integrated security, visibility, and control for next- generation network protection HIGHLIGHTS Delivers superior zero-day threat
Ixia Director TM. Powerful, All-in-One Smart Filtering with Ultra-High Port Density. Efficient Monitoring Access DATA SHEET
Ixia Director TM Powerful, All-in-One Smart Filtering with Ultra-High Port Density The Ixia Director TM is a smart filtering appliance that directs traffic of interest to your monitoring tools. Now you
Configuring Check Point Firewall-1 to support Avaya Contact Center Solutions - Issue 1.1
Avaya Solution & Interoperability Test Lab Configuring Check Point Firewall-1 to support Avaya Contact Center Solutions - Issue 1.1 Abstract These Application Notes explain how to configure Check Point
Infoblox DDI Appliances. Hardware and Performance Specifications
Hardware and Performance Specifications Trinzic Appliances are Optimized for Remote Management and Energy Efficiency Purpose-built network appliances deliver high-performance reliable and secure DNS, DHCP
SECURITY REIMAGINED. FireEye Network Threat Prevention Platform. Threat Prevention Platform that Combats Web-based Cyber Attacks
SECURITY REIMAGINED FireEye Network Threat Prevention Platform Threat Prevention Platform that Combats Web-based Cyber Attacks D A T A S H E E T SECURITY REIMAGINED HIGHLIGHTS Deploys in-line (block/monitor
Firewall and SmartDefense. Administration Guide Version NGX R65
Firewall and SmartDefense Administration Guide Version NGX R65 701682 April 27, 2008 2003-2007 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
HUAWEI Tecal E6000 Blade Server
HUAWEI Tecal E6000 Blade Server Professional Trusted Future-oriented HUAWEI TECHNOLOGIES CO., LTD. The HUAWEI Tecal E6000 is a new-generation server platform that guarantees comprehensive and powerful
Integrity Advanced Server Gateway Integration Guide
Integrity Advanced Server Gateway Integration Guide 1-0273-0650-2006-03-09 Editor's Notes: 2006 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application Intelligence, Check
SecureSphere Appliances
DATASHEET SecureSphere Appliances Scalable. Reliable. Flexible. Imperva SecureSphere appliances provide superior performance and resiliency for demanding datacenter environments. With fail open interfaces,
IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business
IREBOX X IREBOX X Firebox X Family of Security Products Comprehensive Unified Threat Management Solutions That Scale With Your Business Family of Security Products Comprehensive unified threat management
SummitStack in the Data Center
SummitStack in the Data Center Abstract: This white paper describes the challenges in the virtualized server environment and the solution that Extreme Networks offers a highly virtualized, centrally manageable
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments
The Ultimate WLAN Management and Security Solution for Large and Distributed Deployments Centralized WLAN management and auto provisioning Manages up to 0 APs with granular access control Advanced RF management
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
3Com Transceivers OVERVIEW. Standards-based flexible Ethernet connections KEY BENEFITS
3Com Transceivers DATA SHEET Standards-based flexible Ethernet connections OVERVIEW 3Com transceivers are industry-standard, hot-swappable devices that plug into a Fast, Gigabit, or 10-Gigabit Ethernet
Appliance Comparison Chart
Appliance Comparison Chart Models Edge 10 270 570 1070 2070 070 Edge X, Edge W, Edge X ADSL, Edge W ADSL 12 16 272 276 572 576 107 1076 207 2076 07 076 Software Edition Embedded NGX R65, R70 R65, R70 R65,
Sophos SG Series Appliances
Unleash the full potential of your network With bandwidth requirements constantly increasing, network security appliances need to do more than ever before. The Sophos SG Series appliances are built to
10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable
10 Port L2 Managed Gigabit Ethernet Switch with 2 Open SFP Slots - Rack Mountable StarTech ID: IES101002SFP The IES101002SFP 10-port Ethernet switch delivers flexibility and control of your network by
SUN HARDWARE FROM ORACLE: PRICING FOR EDUCATION
SUN HARDWARE FROM ORACLE: PRICING FOR EDUCATION AFFORDABLE, RELIABLE, AND GREAT PRICES FOR EDUCATION Optimized Sun systems run Oracle and other leading operating and virtualization platforms with greater
WANic 800 & 805. 1 or 2 HSSI ports Up to 52 Mbps/port. WANic 850 & 855. 1 or 2 T3 or E3 ports Full-speed CSU/DSU. WANic 880.
WANic P C I S O L U T I O N S WANic PCI cards are high-performance synchronous WAN adapters for use in standard Linux PCs and Industrial Series routers from ImageStream. WANic adapters include one, two,
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
SVN5800 Secure Access Gateway
The development of networks allows enterprises to provide remote access to branch offices, partners, customers, mobile employees, and home offices so that they can access application and data resources,
Increase Simplicity and Improve Reliability with VPLS on the MX Series Routers
SOLUTION BRIEF Enterprise Data Center Interconnectivity Increase Simplicity and Improve Reliability with VPLS on the Routers Challenge As enterprises improve business continuity by enabling resource allocation
Emerson Smart Firewall
DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy
Simplify Data Management and Reduce Storage Costs with File Virtualization
What s Inside: 2 Freedom from File Storage Constraints 2 Simplifying File Access with File Virtualization 3 Simplifying Data Management with Automated Management Policies 4 True Heterogeneity 5 Data Protection
Cisco Wide Area Application Services (WAAS) Appliances
Data Sheet Cisco Wide Area Application Services (WAAS) Appliances Cisco Wide Area Virtualization Engine Product Overview The Cisco Wide Area Application Virtualization Engine (WAVE) product line comprises
VIRTUALIZED SECURITY: THE NEXT GENERATION OF CONSOLIDATION
WHITEPAPER A consolidated security infrastructure is more than just an idea; in today s world of increasingly diversified threats and associated rising costs, it s imperative that organizations adopt a
ARUBA 7000 SERIES CLOUD SERVICES CONTROLLER
Extend the all-wireless workplace to branch offices Aruba 7000 series Cloud Services Controllers optimize cloud services and secure enterprise applications at branch offices while providing configuration,
Table of Contents. Network Critical NA LLC Tel: 716-558-7280 37 Franklin Street, Suite 100 Email: [email protected]
Product Catalog Table of Contents Breakout TAPs...1-3 Fixed Aggregating Portable TAP...4-5 V-Line TM (Bypass) Portable TAPS...6 Breakout Portable TAP...7 V-Line (Bypass) TAPs...8-9 Smart Network Access
R75. Installation and Upgrade Guide
R75 Installation and Upgrade Guide 24 March 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under
Check Point License Guide (April-2012) General Pricelist
CPAP-SG61* License Guide (April-2012) General Pricelist SKU Prefix Name Description Blades included CPAP-SG21412 CPAP-SG12610 CPAP-SG12608 CPAP-SG12607 CPAP-SG12410 CPAP-SG12408 CPAP-SG12407 CPAP-SG12210
Ixia xstream TM 10. Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks. Aggregation and Filtering DATA SHEET
Ixia xstream TM 10 Aggregation, Filtering, and Load Balancing for qgbe/10gbe Networks The Ixia xstream 10 is a network packet broker for monitoring high-speed network traffic, letting you share the network
