Securing Virtualization with Check Point and Consolidation with Virtualized Security consolidate security gateways with full power of Software Blades with Check Point Virtual Systems (VSX) secure virtualized infrastructure with Check Point Virtual Edition (VE) August, 2012
Increasing Network Complexity Need More Simplicity and Less Complexity More complex networks with increasing segmentation drives up cost More advanced threats requiring multi-layered defense Sales Policy 6 VPN Customer Policy 7 Policy 5 More policies with many rules to meet growing business demands Web Partner Internet Policy 1 Policy 2 Policy 3 Email Policy 8 Finance Policy 13 Legal Engineering Policy 4 Data Center Marketing Policy 10 HR Policy 9 Policy 12 Policy 11
The Shift to Private Clouds Check Point Virtual Systems Added Partner Sales VS Policy 2 Internet Policy 1 Datacenter Web email Finance HR Legal VS Policy 3 VS Policy 4 VPN Customer Marketing Engineering Policy 1 VS Policy 5 VS Policy 6 Virtualized Gateways Simplify Private Cloud Security
Virtualization Can Simplify Security Consolidation Maximize Investment with Optimized Hardware Utilization Lower costs by consolidating multiple security gateways Simplified management from a single management console Scalability Easily expand security protection by adding more virtual systems Seamlessly expand security capacity for future business and network growth Multi-Tenancy Secure multiple networks from a single gateway Customized security and policy per virtual system
The Power of Virtualization for Security For 10 Years, Check Point VSX on dedicated hardware has delivered value and security for hundreds of our customers Consolidate Up to 250 Gateways to Secure Many Customers & Networks Multi-VSs with Central Management Using Check Point SM and MDSM Highly Scalability and Full Redundancy with VSLS Check Point VSX Appliances
Software Blades for Virtual Systems Firewall IPS Application Control Identity Awareness URL Filtering Antivirus Anti-Bot Mobile Access* Software Blades on Virtual Systems Virtual System on any Platform and Open Servers Software Blade Security on Every Virtual System * SSL VPN available in later release
Simplify and Consolidate Security One-Click Virtual System Creation Simple Virtualization Wizard and provisioning templates ONE Gateway Security with Virtual Systems Finance HR Partners Dedicated Policy Per Virtual System Customized security functions with granular security policies Web Customers Ease of Operation Resource monitoring on each Virtual System Software upgrades without downtime Inter-VS traffic redirecting via integrated virtual routers and switches Enterprise INTRANET
Performance Boost and Scalability High Connection Capacity 8X concurrent connections with 64-bit GAiA OS Advanced routing options with multiple routing and multicasting protocols Multi-Core Performance Check Point CoreXL technology Enhanced deep packet inspection throughput with security acceleration Linear Scalability Patented VSLS technology Scale up to 8 cluster members
R75.40VS Virtual System Packaging Free VS License VSs x1 Security Gateway + Software Blades + VS License VS VSs License x3 VS VSs License x10 VS VSs License x25 VSs x50 Additional VS Licenses Virtual System price the same for all appliances and open servers Software Blades priced per gateway, can use on all VS instances One complementary Virtual System* per gateway * Available for: 4800, 12200, 12400, 12600, 21400, Power-1 9000, Power-1 1000, IP-1280, IP-2450 and open servers with 4 cores or more
Summary Check Point Virtual Systems Maximize Security Gateway Investment Advanced Security with Software Blades High Scalability and Performance Simple Deployment and Provisioning Simplifying Security for Private Clouds
Private Cloud Cost Reduction Shrinking 1,000 servers that use 100K watts into 100 servers that uses 10K watts IT as a Service IT becomes an ISP within the corporation
Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically
Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically Hypervisor
Private Cloud - Security Needs Protection from external threats Inspect traffic between Virtual Machines (s) Secure new Virtual Machines automatically Ensure Security in dynamic environment
Check Point Virtual Edition R75.20 Check Point Secures the Private Cloud Check Point Security Gateway Virtual Edition Best Virtual Security Gateway Securing the Virtual Machines Unified Management for Physical and Virtual
Secure the Virtual Infrastructure Protects Virtual Machines VE Hypervisor security Certified by Ware Hypervisor Hypervisor Connector Audit virtualization system
Virtual Edition Features Best Security Check Point Software Blades All Software Blades Firewall Anti-Virus IPS URL Filtering VPN Flexible Security Mobile Access DLP Application Control Identity Awareness VE Hypervisor Connector Hypervisor
Virtual Edition Features Best Security s Protection All Software Blades Flexible Security Securing New s Automatically Secure Dynamic Environment VE Inspecting Inter- Traffic Hypervisor Connector Hypervisor
Virtual Edition Features Best Security s Protection All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment VE Hypervisor Connector Hypervisor
Virtual Edition Features Best Security s Protection Unified Management All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment Same management for Physical and Virtual Virtualize the Management
Virtual Edition Features Best Security s Protection Unified Management All Software Blades Flexible security Securing New s Automatically Secure Dynamic Environment Same management for Physical and Virtual Virtualize the Management Hypervisor Connector Hypervisor
Cloud Providers Security Needs Multi-tenancy: Servicing Multiple Customers From the Same Environment Cloud Secure connection to the Cloud Security of the Cloud Security within the Cloud
Check Point Cloud Security Check Point Secures the Public Clouds Use VSX for secure connectivity with the Public Cloud Secure s and Inter-s connection with Security Gateway Virtual Edition Offer Multi-tenancy management and customized policy via Multi-Domain Management
Virtualized Security Scenarios VE Hypervisor Connector Hypervisor Securing the Virtual Environment Use the new Virtualization Software Blade to apply granular Firewall and IPS policy on traffic between virtual machines. VE Hypervisor Office in a Box Use the Security Gateway VE with FW, IPS, VPN and any other software blade to secure your office networks and assets VE VE VE Enterprise Security Gateways Hypervisor Consolidate your Security Gateways deployment into a virtualized environment.
Cloud Security Best Practices Use Firewall to segment between Virtual Machines Use IPS to secure s from External and Internal threats Let the same security Admin manage both physical and virtual policy from a single console Ensure full security with zero downtown-time during live migration Log and audit all Virtualization events and traffic
Summary Check Point Pioneers the Cloud Security Virtual Security Gateway For Multi-Tenant Cloud Environments Best Hypervisor security for Virtual Machines The only solution with unified management for Physical and Virtual