Check Point is no stranger to IT security revolution. We created the stateful inspection technology that is still the foundation for the most robust firewall in the industry. We then transformed security management with our single console SmartCenter, unified security gateways and introduced the first and only single agent for endpoint security. Most recently, we delivered Total Security, offering uncompromised security, reduced complexity and improved operational efficiency.
With Check Point’s Software Blade Architecture, a new security revolution has begun.
The Check Point Software Blade Architecture supports a complete and increasing selection of Software Blades, each delivering a modular security gateway or security management function. Because Software Blades are modular and moveable, Software Blades enable users to efficiently and quickly tailor Security Gateway and Management functionality to specific and changing security needs. New blades are quickly licensed as needed without the addition of new hardware.
Security Gateway and Security Management blades available today include
- Security Gateway Software Blades
- Security Management Software Blades
What is a software blade?
A software blade is a logical security building block that is independent, modular and centrally managed. Software Blades can be quickly enabled and configured into a solution based on specific business needs. And as needs evolve, additional blades can be quickly activated to extend security to an existing configuration within the same hardware foundation.
Key Benefits of the Check Point Software Blade Architecture
Flexibility – Provides the right level of protection at the right level of investment
Manageability – Enables fast deployment of security services. Increases productivity through centralized blade management.
Total Security – Provides the right level of security, at all enforcement points, and at all layers of the network
Lower TCO - Protects investment through consolidation and use of existing hardware infrastructure
Guaranteed performance – Enables provisioning of resources that guarantee service levels
How are Check Point Software Blades deployed?
Software Blades can be deployed on Check Point UTM-1 and Power-1 appliances, open servers and within virtualized environments. New blades can be added simply enabling their functionality in software; no additional hardware, firmware or drivers are necessary. This enables organizations to deploy security dynamically, as needed, with lower total cost of deployment.