PURE Security. Revolutionising the way you think about IT Security. Protected infrastructure and data. Unified security architecture



Similar documents
The Evolution of IPS. Intrusion Prevention (Protection) Systems aren't what they used to be

CHECK POINT. Software Blade Architecture. Secure. Flexible. Simple.

CHECK POINT. Software Blade Architecture

Endpoint Security Considerations for Achieving PCI Compliance

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

Check Point Software Blade Architecture. Achieving the right balance between security protection and investment

How to Get NAC Up-and-Running in One Hour. For Check Point Firewall or Endpoint Security Administrators

Leverage IPS to Make Patch Tuesday Just Another Day

Sybase Solutions for Healthcare Adapting to an Evolving Business and Regulatory Environment

CHECK POINT TOTAL SECURITY APPLIANCES. Flexible Deployment. Centralized Management.

Check Point Positions

Check Point NAC and Endpoint Security Martin Koldovský SE Manager Eastern Europe

Check Point Whitepaper. Check Point Abra: A Virtual Secure Workspace Technical Whitepaper

The Power-1 Performance Architecture: Delivering Application-layer Security at Data Center Performance Levels

Check Point Endpoint Security. Single agent for endpoint security delivering total protection and simplified management

How to Implement an Integrated GRC Architecture

SafeEnterprise SSL igate Managing Central Access to Resources with VPX Technology

Check Point. Software Blade Architecture

Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features

Emerging Trends in the Network Security Market in India, CY 2013

Simplify Your Network Security with All-In-One Unified Threat Management

Internet Content Provider Safeguards Customer Networks and Services

Zone Labs Integrity Smarter Enterprise Security

The Attacker s Target: The Small Business

Clavister InSight TM. Protecting Values

Best Practices: The Key Things You Need to Know Now About Secure Networking Layer 1 (SONET), Layer 2 (ATM), and Layer 3 (IP) Encryption Technologies

THE CISCO CRM COMMUNICATIONS CONNECTOR GIVES EMPLOYEES SECURE, RELIABLE, AND CONVENIENT ACCESS TO CUSTOMER INFORMATION

Next Gen Firewall and UTM Buyers Guide

Solving the Performance Hurdle for Integrated IPS

Payment Card Industry Data Security Standard

The Seven Key Factors for Internet Security TCO

ICT budget and staffing trends in Healthcare

Cisco Conference Connection

Remote-Access VPNs: Business Productivity, Deployment, and Security Considerations

10 easy steps to secure your retail network

How To Buy Nitro Security

Top 10 Reasons Enterprises are Moving Security to the Cloud

Cisco Blended Agent: Bringing Call Blending Capability to Your Enterprise

Table of Contents. Introduction. Understanding PBX systems. Hosted PBX advantages. Features offered by a hosted PBX service

IREBOX X. Firebox X Family of Security Products. Comprehensive Unified Threat Management Solutions That Scale With Your Business

SonicWALL Aventail SSL VPNs Working Together With SonicWALL End Point Security Solutions for Granular End Point Control

How To Secure Your Business

PULSE SECURE FOR GOOGLE ANDROID

The Cisco ASA 5500 as a Superior Firewall Solution

Astaro Gateway Software Applications

LICENSE GUIDE. Software Blades products. Number of Strings. SKU Prefix Name Description Additive

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

ZSCALER SECURITY CLOUD FOR LARGE AND MEDIUM ENTERPRISE

Samsung SED Security in Collaboration with Wave Systems

Best Practices for Secure Remote Access. Aventail Technical White Paper

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Proven LANDesk Solutions

A Getting Started Guide: What Every Small Business Needs To Know About Internet Security

Network protection and UTM Buyers Guide

Juniper Networks Solution Portfolio for Public Sector Network Security

Citrix Access Gateway

Enterprise Security Solutions

Securing Virtualization with Check Point and Consolidation with Virtualized Security

Check Point Whitepaper. Enterprise IPv6 Transition Technical Whitepaper

Enabling Secure BYOD How Fortinet Provides a Secure Environment for BYOD

Q1 Labs Corporate Overview

Unified Threat Management, Managed Security, and the Cloud Services Model

Why Switch from IPSec to SSL VPN. And Four Steps to Ease Transition

CISCO METRO ETHERNET SERVICES AND SUPPORT

Protecting Your Roaming Workforce With Cloud-Based Security

How To Get A Cloud Service For A Small Business

White Paper: Managing Security on Mobile Phones

Managed Security Services for Data

Reasons Enterprises. Prefer Juniper Wireless

WATCHGUARD FIREBOX SOHO 6TC AND SOHO 6

Best Practices for Selecting and Implementing Software License Management

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Design Your Security

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Unified Threat Management from Check Point. The security you need. The simplicity you want

It looks like your regular telephone.

Overview. Where other. Fortinet protects against the fullspectrum. content- and. without sacrificing performance.

Transcription:

PURE Security Revolutionising the way you think about IT Security Since founding in 1993 has become the de facto standard in network security. Today we are more than just a firewall vendor. Our PURE security focus extends beyond the network into data security and security management solutions that protect enterprises through to consumers. Protected infrastructure and data Unified security architecture Reliable productivity and continuity Extensible in meeting your needs today and tomorrow Find out more at www.checkpoint.com WCG54404_SP CheckPoint 97 6/10/08 8:58:41 AM

SecurityPoint Security Solutions Overview Software Technologies Ltd. (www.checkpoint.com) is a leader in securing the Internet. The company is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. s PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Through its NGX platform, delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets. The company also offers market leading data security solutions through the Endpoint Security product line, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices. s award-winning ZoneAlarm Internet Security Suite and additional consumer security solutions protect millions of consumer PCs from hackers, spyware and data theft. Extending the power of the Check Point solution is its Open Platform for Security (OPSEC), the industry s framework and alliance for integration and interoperability with best-of-breed solutions from hundreds of leading companies. solutions are sold, integrated and serviced by a network of partners around the world and its customers include 100 percent of Fortune 100 companies and tens of thousands of businesses and organizations of all sizes. headquarters are located internationally in Tel Aviv, Israel, and in the United States in Redwood City, California. The Company has offices in the U.S. in Alabama, Arizona, Northern and Southern California, Colorado, Florida, Georgia, Illinois, Massachusetts, Michigan, Minnesota, New York, New Jersey, Ohio, Pennsylvania, Texas, Virginia, Washington and Wisconsin. The Company also has international subsidiaries located in Austria, Belarus, Belgium, Cayman Islands, Czech Republic, Denmark, Finland, France, Germany, Italy, the Netherlands, Norway, Poland, Spain, Sweden, Switzerland, Turkey, the United Kingdom, Australia, India, Japan, Hong Kong, P.R. China, Russia, Singapore, South Korea, Brazil, Mexico and Canada. MISSION Making Internet communications and critical data secure, reliable and available everywhere has been and continues to be our on-going vision. We are committed to staying focused on real customer needs, to developing new and innovative security solutions and to keep redefining the security landscape. Why? Market Leadership Enterprise Firewall market leader in Gartner s Firewall Magic Quadrant (Gartner, 1999-2002, 2004, 2005, 2006, 2007) #1, Worldwide VPN/Firewall software revenue market share: 99% (Infonetics, 2007) #1, Worldwide IPSec VPN/Firewall Market Share: 31% (Frost & Sullivan, 2006) Data Security leader in Gartner s Mobile Data Protection Magic Quadrant (Gartner 2001-2007) Personal Firewalls market leader in Gartner s Personal Firewalls Magic Quadrant (Gartner, 2005, 2006) IPSec VPN market leader in Gartner s IPSec Magic Quadrant (Gartner, 2000, 2001, 2002, 2004, 2006) Customers 100% of Fortune 100 companies use security solutions 98% of Fortune 500 companies use security solutions 100% of Global 100 companies use security solutions 98% of Global 500 companies use security solutions 98

SecurityPoint Security Solutions DISTRIBUTION products are distributed worldwide via: Distributors, OEMs, Resellers, OPSEC Partners, MSPs Over 2,200 channel partners Over 85 telcos/isps worldwide More than 350 OPSEC Partners solutions are sold, integrated and serviced by a network of over 2,200 certified partners in 88 countries AWARDS AND INDUSTRY HONORS 2007 Five-Star Rating - Channel Partner Program VARBusiness 2007 Channel Champion - Software CRN Magazine 2007 Channel Chiefs Amnon Bar-Lev CRN Magazine 2007 CRN Industry Hall of Fame Gil Shwed CRN Magazine Readers Choice Awards Information Security Unified Threat Management Gold Award VPN-1 UTM Wireless Silver Award VPN-1 Edge Wireless Network Firewall Silver Award FireWall-1 Remote Access Control Bronze Award VPN-1 SIMS Bronze Award Eventia Product Leadership Award - SearchNetworking.com Endpoint Security Silver Award - Integrity ZoneAlarm Internet Security Suite 7.0 Won CNET s Editors Choice Award 100 Best Products of 2007 Award ZoneAlarm Internet Security Suite 7.0 PC World (Awards for previous years are posted at: http://www.checkpoint.com/corporate/facts.html#awards) By focusing purely on building the IT security architecture of the future leads security innovation to provide our customers the most advanced and comprehensive protection of their networks and information. From the day we founded, in 1993, our dedication to securing businesses and organizations worldwide has been unwavering, and our success unmatched. As a result, is the de facto standard in the network-security industry. To provide our customers with the most critical protections we have expanded our strategy to include data security making s Unified Security Architecture more powerful than ever. Security Solutions PURE SECURITY: offers our customers a PURE form of proactive security. Security that keeps you: Protected - at the infrastructure and data level, we protect against all threats, infiltration, and loss of data Unified - with our underlying unified security architecture for maximum manageability and scalability across all products Reliable - ensuring productivity and continuity Extensible - to meet customers needs today and tomorrow 99

SecurityPoint Security Solutions s PURE security vision now offers organizations the peace of mind to have it all: powerful, multilayered technologies created by leading security experts integrated into an easy-to-manage platform, offering comprehensive protection of both network resources and critically sensitive data. : PURE Security. Unified Threat Management How do you protect your network assets from a growing number of security threats, and at the same time, keep security costs and complexity under control? Unified Threat Management (UTM) solutions offer the perfect combination of proven security technologies and easy-to-use deployment and management features. With a full line of both software and hardware-based solutions, consolidates key security applications such as firewall, VPN, intrusion prevention, and antivirus, into single, easy to manage solutions. Because UTM solutions are based on the same security technologies used by the Fortune 100, you can rest easy knowing your organization is protected, while enjoying the value-added benefits of lower security costs and management overhead. Target Customer UTM appliances have been most popular with small-to-medium sized organizations. The main reason is that these organizations prefer the flexibility, ease of deployment and management, and resulting low TCO of integrated security appliances over best-of-breed point solutions. Small-to-medium sized organizations typically have limited IT staff, so they require a security solution that can be administered by non-security experts. VPN-1 UTM appliances are targeted at small-to-medium sized organizations as well as the branch office deployments of larger Enterprises. Relevant Segments The following are the primary target market segments and key characteristics of each: Medium-sized Organizations Generally 100-1000 total network users (companies with 100-2,500 employees) Typically spread over 3-5 sites Demand plug and play, single appliance solution Lack dedicated security staff; rely on IT generalists Key Decision Maker: President/GM and Senior IT Manager Budget Approval: Senior IT Manager typically up to $10,000 100

SecurityPoint Security Solutions Enterprise Enterprises with 2,500-10,000 employees and 3+ remote offices Remote sites with 100-1000 users Typically have no on-site IT staff at remote sites Demand plug and play appliances Centralized management is key (SmartCenter), especially within installed base. Partner Opportunities Ideal solution for securing primary offices of mid-market customers Additional opportunity to sell into existing Enterprise accounts as a remote/branch office solution Upsell opportunity with SSL Network Extender for SSL-based remote access Upsell opportunity with Web Intelligence for Web application firewall Endpoint Security Single agent for endpoint security Endpoint Security is the first single agent for total endpoint security that combines the highestrated firewall, network access control (NAC), program control, antivirus, anti-spyware, data security, and remote access. It protects PCs and eliminates the need to deploy and manage multiple agents, reducing total cost of ownership. Endpoint Security is unique in that it includes both data security for preventing data loss and theft and a VPN client for secure remote access communications. A single management console enables administrators to view and modify endpoint security policy with ease and assurance. And Endpoint Security is unified with the unified security architecture, enabling monitoring, analysis, and reporting of endpoint security logs and events from SmartCenter, Provider-1, and Eventia management systems. Benefits Single agent for all your endpoint security needs Easy to deploy, easy to manage Eliminates the need to manage multiple security agents Erases compatibility issues with separate agents Reduces administration time and effort Lowers total cost of ownership Target Customer Companies planning to add another endpoint security component to their environment in the next 6 months Organizations who have some endpoint security in place already may be able to move to the solution at very low operational cost since they will need to take on the work of a new product deployment either way. The benefit of the solution is that is may allow multiple technologies to be deployed in one single deployment project. Wherever possible, get the agent deployed in the customer environment because upgrade to additional security technologies is very easy once the agent is in place. Companies with growing population of mobile workers Organizations who are shifting to more notebook PCs and mobile workers will open new security concerns for secure access and protection of data stored on the endpoint. If they have done their homework, they may have become concerned with data breaches and are looking to augment existing endpoint security software with data security - full disk encryption, port protection and media encryption 101

SecurityPoint Security Solutions Companies concerned about network access issues for mobile workers or guest workers Organizations with mobile workers or that allow contractors and other guest workers on their network will be looking to implement NAC and endpoint policy enforcement and want to have a solution that co-exists with their existing 3rd party antivirus product. VPN Upgrade Current SecureClient and SecuRemote customers that are looking to upgrade their existing endpoint security to a centrally managed solution that includes the additional components firewall, anti-malware, data security and NAC. Companies considering Competitive Replacement Customers of competitive firewall/antivirus products who are currently unhappy with their current vendor and are looking at an endpoint suite to lower procurement and ongoing administration and maintenance costs associated with running multiple agents for endpoint security. Customer Size Large (1,000 15,000 users) and medium-sized enterprises (100-999 users) worldwide Key Vertical Markets Financial services, Government, Business services, Healthcare, and Manufacturing Primary Decision Makers CSO, Security VP/Director within desktop admin groups Key Influencers CIO, VP/Director/Manager of IT, IS, MIS, Desktop, and Network groups Traditional Endpoint Security/NAC Buyer Still wants the best PC security Not interested in switching antivirus products Wants a cost-effective NAC solution that leverages existing infrastructure components such as firewalls, VPN gateways, and wireless networking devices. 102

How To Sell Advanced Comprehensive Security Solutions Solution Overview Mobile Networks provides an extensive portfolio of network security, data security, communications security, multimedia security, and security management solutions. With Check Point Open Performance Architecture, you achieve data center performance even when applying strict security policies for applications such as multimedia, VoIP, and instant messaging. All in a flexible architecture that keeps your network safe by easily adapting as new security issues emerge. Branch Offices Full Disk Encryption Port and Media Encryption Threats VPN-1 UTM Power SSL Network Extender Threats What is the Advantage? is a market leader in the worldwide enterprise firewall, personal firewall, data security and VPN markets. Check Point s PURE focus is on IT security with its extensive portfolio of network security, data security and security management solutions. Customers include 100% of Fortune 100 companies. What is the Business Advantage? Through its NGX platform, delivers a unified security architecture for a broad range of security solutions to protect business communications and resources for corporate networks and applications. Services Messaging Sensors IP Management Servers Provider -1 IPS-1 SmartCenter SmartView User Authority InterSpect Connectra Endpoint Security Regional Offices Servers Web Intelligence ` Main Office Full Disk Encryption Endpoint Security UPS Web Intelligence Application Web Data Messaging Servers UPS Benefits Things to Know IP-PBX IP ` IPS-1 Sensors SmartDefense IP-PBX IPS-1 Ch VPN-1 UTM y IP Network Server Questions to Ask SecureClient Mobile Authentication Network Security Endpoint Security Data Security Security Management VPN-1 Integrated Appliance Solution Do you have firewalls that can protect VoIP/SIP communications and multimedia traffic? Do you engage in ecommerce that requires a VPN or SSL? Is intrusion a concern and how are you dealing with it? Do you have remote offices that connect across the internet? Do you use wireless connections, encryption products? Are you using any products to protect your desktops, servers, or mobile devices? How are your security devices managed? How do you deal with the reports from these devices? How do you enforce user & password policies? Do you use two-factor authentication protection for remote and local log-on? How are you enforcing Web and IM use and content? How are you protecting against viruses and spam? How do you protect your internal and mobile corporate information? Threats 234836 Product Range Mobile Encryption Performance The Open Performance Architecture combines with general purpose processors to provide complete security inspection that is far faster than ASIC-based systems. VoIP/SIP Communications Security delivers intelligent VoIP security that keeps the telephone system safe without the need for reorganizing your whole security policy. Totally Integrated Endpoint Security Provides a single agent for total endpoint security that combines the highest-rated firewall, network access control (NAC), program control, antivirus, antispyware, data security and remote access. Simplified Security Solutions Blends the simplicity of a UTM appliance with the proven security technologies that secure the world s most demanding networks. Unified Security Management security management solutions are designed as an interoperable system based on a core unified security architecture. This enables organizations to centrally control security policy across multiple layers of the infrastructure. Complete Data Protection Secures data on all common platforms and meets strict compliance requirements related to privacy laws and regulations. Also prevents unauthorized copying of sensitive data. Target Markets Enterprise Remote Access From client VPN access to clientless VPN access for business partners and mobile employees, delivers the most comprehensive remote access solutions to meet the needs of today s distributed business. VoIP Deployments security solutions are designed to ensure VoIP can be deployed efficiently and securely. By providing pure security solutions, is better able to support multivendor environments with support for not just the widest variety of VoIP protocols but VoIP vendors. Retail and Ecommerce solutions are comprehensive and integrated, serving as a solid base for PCI compliance while also supporting requirements common to other security regulations. Healthcare helps healthcare providers to monitor its avalanche of data logs, to conform to regulatory mandates, and to secure and protect its vital patient information with the highest level of data security through strong full-disk encryption and robust access control. Education Provides educational institutions with a scalable security architecture that can provide comprehensive security to protect against Internet attacks, as well as centralized management to ease the burden of defining and distributing different elements of the security policy to remote students and campus sites. securitypoint.westcon.com WCG54404_SP HowtoSell 23 6/9/08 11:04:52 AM

How To Sell Advanced Comprehensive Security Solutions Product Overview Network Security Firewall/VPN Provides organizations with the world s most proven solution, used by 100% of the Fortune 100. Enables organizations to protect the entire network infrastructure and information with a unified security architecture that simplifies management and ensures consistent, up-to-date security everywhere. UTM (Unified Threat Management) VPN-1 Power VSX Virtualized security gateway that allows managed service providers and enterprises with virtualized networks to create up to 250 virtual security systems-including firewall, VPN, and intrusion prevention-on a single hardware platform. VPN-1 MASS (Multi-Access Security Solution) Delivers the foundation of secure fixed/mobile convergence (FMC) for carriers. Supports both 3G Wireless Interworking (3G I-WLAN) and Unlicensed Mobile Access (UMA, also known as Generic Access Network) as well as traditional remote access VPNs. Scales to provide remote access for up to 100,000 secure voice channels, and massive amounts of data connections. FireWall-1 GX Delivers s market-leading security to GPRS (2.5G) and UMTS (3G) enabled wireless networks. With FireWall-1 GX, wireless network operators can offer seamless roaming to their data customers without exposing their network to potential security threats. VPN-1 Power These security gateways provide an active defense that enables you to secure your most demanding sites such as core networks or data centers. Adapts as new applications are introduced and new threats appear. VPN-1 UTM Consolidates proven security functions including firewall, intrusion prevention, antivirus, antispyware, Web application firewall, and both IPSec and SSL VPN, within a single integrated solution. VPN-1 UTM Power These security gateways combine the accelerated security found in the VPN-1 Power product line with the simplicity of the next generation UTM features found in VPN-1 UTM. The result is a comprehensive solution with firewall, VPN, intrusion prevention, antivirus, Web filtering. VPN-1 Power Multi-core Provides integrated application security at multi-gigabit speeds. Providing the same integrated firewall, VPN, and intrusion prevention found in VPN-1 Power, VPN-1 Power Multi-core builds on the latest multi-core technologies available in servers and appliances to accelerate SmartDefense intrusion prevention. Web Intelligence Provides complete protection for the entire Web environment. Supported by VPN-1 UTM, VPN-1 Power, UTM-1, and Connectra, it provides a multi-layer defense for the network, operating systems, Web servers, and backend systems it protects. Remote Access From client VPN access to clientless VPN access, Check Point delivers the most comprehensive Remote Access Solutions to connect a diverse mix of remote users with the strongest safeguards and unified management to maximize security effectiveness. Connectra Complete Web Security Gateway that provides SSL VPN access and comprehensive endpoint and integrated intrusion prevention security in a single, unified remote access solution. SSL Network Extender Browser plug-in that provides SSL VPN-based clientless remote access, while delivering full network connectivity for any IP-based application. SecureClient Mobile Secure, uninterrupted remote access for Windows mobile devices Intrusion Detection and Prevention Provides precise, real-time attack mitigation, granular forensic analysis and flexible deployment options. Delivered as both a dedicated IPS appliance and intrusion prevention that is integrated into security gateways. IPS-1 Delivers mission critical protection with unmatched management, granular forensic analysis and flexibility InterSpect Internal security gateway that combines intrusion prevention features with network access control Endpoint Security Unique product in that it includes both data security for preventing data loss and theft and a VPN client for secure remote access communications. Single management console. Unified with the unified security architecture, enabling monitoring, analysis, and reporting of endpoint security logs and events from SmartCenter, Provider-1, and Eventia management systems. Endpoint Security is the first single agent for total endpoint security that combines the highest-rated firewall, network access control (NAC), program control, antivirus, anti-spyware, data security, and remote access. Data Security Based on market-leading Pointsec technologies, provides comprehensive data protection for laptops, PCs, removable media and mobile devices. Full Disk Encryption Proven in enterprises and government agencies around the world. Delivers unparalleled data security for laptop and desktop PCs. A winning combination of robust data encryption, access control and centralized fully enforceable installation and management. Media Encryption & Port Management Prevents unauthorized copying of sensitive data by combining port and device management, content filtering and centralized auditing with robust media encryption. Plugs potential leak points and logs data movement to and from any plug and play devices. Mobile Encryption Completely secures enterprise data stored on smartphones and PDAs running Symbian, Pocket PC, Windows Mobile Smartphone and Palm operating systems. Device and memory card data are encrypted automatically without user intervention. Security Management Designed as an interoperable system based on a core unified security architecture, enables organizations to centrally control security policy across multiple layers of the infrastructure. SmartCenter Based on s unified security architecture. Enables organizations to perform all aspects of security management via a single, unified console. Provider-1 The only security management solution that addresses the unique requirements of large multi-policy environments. For service providers, it consolidates and centralizes the management of security policies for thousands of customers. For enterprise network operations centers, it simplifies a complex security policy by segmenting it into manageable sub-policies for geographic, functional, or other groupings. Eventia Suite Security information and event management (SIEM) solution for enterprises looking to efficiently manage large volumes of data from disparate sources. Automates and centralizes security log data analysis and reporting. Security Management Portal (SMP) Central management and service provisioning platform ideal for Managed Security Service Providers (MSSP) targeting SMBs and vertical markets. Support the management of up to tens of thousands of Safe@Office gateways. Can easily be integrated with existing billing, CRM and other back-office systems.. SMP On-Demand Fully-hosted central management and service provisioning platform ideal for Managed Security Service Providers (MSSP) targeting SMBs and vertical markets. Delivered as a Software-as-a-Service (SaaS), supports the management of up to thousands of Safe@Office gateways. Like SMP, it can easily be integrated with existing back-office systems to support existing business processes. User Authority Improves application security and simplifies administration by providing a unified, secure communication layer for authenticating users to ebusiness applications. VPN-1 Integrated Appliance Solution VPN-1 Integrated Appliance Solution is for organizations that need to combine the proven security of Software on high performance platform with a single point of contact for fulfillment and support. It enables organizations to quickly deploy VPN-1 Power, VPN-1 UTM, VPN-1 Power VSX, or management infrastructure products on a reliable, performance-oriented platform backed by security and support. Solutions include 3 years software subscription and 3 years HW Warranty. Products available in: North America, Europe, Australia & New Zealand, South East Asia, Central and Latin America securitypoint.westcon.com