Software Blade Architecture | Check Point Software

By: Check Point  09-12-2011
Keywords: Security, Security Management, Software Blade Architecture

Why Software Blade architecture?

Security environments become more complex as companies of all sizes defend themselves against new and varied threats. With these new threats come new security solutions, new vendors, costly new hardware, and increasing complexity. As IT comes under increasing pressure to do more with existing hardware and human resources, this approach becomes increasingly unacceptable.

Check Point's Software Blade architecture offers a better way, enabling organizations to efficiently tailor targeted managed solutions that meet targeted business security needs. All solutions are centrally managed through a single console that reduces complexity and operational overhead. And as new threats emerge, Check Point's Software blade architecture quickly and flexibly expands services as needed without the addition of new hardware or management complexity.

What is a software blade?

A software blade is a logical security building block that is independent, modular and centrally managed. Software Blades can be quickly enabled and configured into a solution based on specific business needs. And as needs evolve, additional blades can be quickly activated to extend security to an existing configuration within the same hardware foundation.

Key Benefits of the Check Point Software Blade Architecture

  • Flexibility – Provides the right level of protection at the right level of investment
  • Manageability – Enables fast deployment of security services. Increases productivity through centralized blade management.
  • Total Security – Provides the right level of security, at all enforcement points, and at all layers of the network
  • Lower TCO - Protects investment through consolidation and use of existing hardware infrastructure
  • Guaranteed performance – Enables provisioning of resources that guarantee service levels

How are Check Point Software Blades deployed?

Software Blades can be deployed on Check Point and , ,, open servers, within , and on . New blades can be added simply by enabling their functionality in software; no additional hardware, firmware or drivers are necessary. This enables organizations to deploy security dynamically, as needed, with lower total cost of deployment.

Building a security solution using Software Blades

Check Point’s Software Blade Architecture enables customization of tailored systems or quick selection of predefined turnkey solutions.

Tailoring a security gateway or security management solution:

Whether designing a solution for corporate headquarters, a data center or a branch office, creating a system takes just three easy steps:

Step 1: Choose a or Security Gateway Container
Step 2: Select needed Software Blades
Step 3: Configure and Deploy system

The result is a complete gateway or management system configured precisely to a specific business need.

Software Blade Containers

Software Blade Containers

Security Gateway Containers

Name

Cores

Environment

SG101

1

Small Office

SG201

2

Mid-Size Organizations

SG401

4

High Performance

SG801

8

Highest Performance

Endpoint Security Containers

Name

Managed Endpoints

Environment

CPEP-C1-1TO100

1-100

Small Office

CPEP-C1-101TO1000

101-1000

Mid-Size Organizations

CPEP-C1-1001TO2500

1001-2500

High Performance

CPEP-C1-2501TOU

2500-Unlimited

Highest Performance

Security Management Containers

Name

Gateways Managed

Environment

SM1000

10

Small Companies

SM2500

25

Mid-Size Companies

SMU000

Unlimited

Large Enterprises

Software Blade Container Features

  • CoreXL, a patent pending technology delivering near-linear performance scalability (not included in SG101)
  • An update service that keeps current with the latest software
  • Software blade license management that facilitates blade activation and migration
  • SecurePlatform, a pre-hardened operating system that enables quick and easy deployment anywhere in the network
  • Web-based administrative interface
  • Integrated backup, restore and upgrade capabilities

Choosing a predefined turnkey system

Endpoint Blades

Endpoint Security Software Blades from Check Point bring unprecedented flexibility, control and efficiency to the management and deployment of endpoint security. Choose from six Software Blades to deploy only the protection you need, with the freedom to increase security at any time from a single central management console.

Endpoint Security Software Blades

Gateway Blades

Security Gateway Software Blades
Security Management Software Blades

Security Gateway Systems

To help ease configuration, Check Point has developed several pre-defined bundles composed of a container and software blades.

SG407i

Check Point Security Gateway Systems

Series 100 - An ideal security solution for the small office. A 1 core system, limited to 50 users and recommended up to 8 ports

Model Software Blades Description
Firewall, VPN, IPS, Application Control, Identity Awareness An entry level security gateway to provide critical protection the small or branch offices
An ideal XTM ( eXtensible Threat Management) security gateway providing Total Security for the small and branch office

Series 200 - A cost-effective security platform for mid-size companies and offices. A 2 core system, limited to 500 users or unlimited users and recommended up to 12 ports.

Model Software Blades Description
Firewall, VPN, IPS, Application Control, Identity Awareness An entry level security gateway to provide critical protection for mid-sized companies and offices
Firewall, VPN, IPS, Application Control, Identity Awareness An entry level security gateway to provide critical protection for mid-sized companies and offices with more than 500 users
Firewall, IPSEC VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering High-performance security gateway for mid-sized companies and offices with demanding network environments
Most comprehensive XTM (extensible Threat Management) security gateway with high performance capabilities for mid-sized companies and offices

Series 400 - Designed for environments that demand high performance. Ideal for the large campus networks and data centers, it is optimized for an 8 core system.It is optimized for 8 core system.

Model Software Blades Description
Firewall, VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering High performance security gateway for company of any size
Most comprehensive XTM (eXtensible Threat Management) security gateway for offices of any size requiring high performance

Series 800 - Designed for the most demanding highest performance environments, the Series 800 security gateway is ideal for the large campus and data center. It is optimized for 8 core system.

Model Software Blades Description
Firewall, VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering High-performance security gateway for demanding performance environments.

Series 1200 - Designed for the most demanding highest performance environments, the Series 800 security gateway is ideal for the large campus and data center. It is optimized for 8 core system.

Model Software Blades Description
Firewall, VPN, IPS, Application Control, Identity Awareness, Advanced Networking, Acceleration & Clustering Highest-performance security gateway for the most demanding performance environments.

Check Point Security Management Systems

SM2506

Model Software Blades Description
Network Policy Management, Endpoint Policy Management, and Logging and Status
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis, SmartProvisioning and User Directory
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis and SmartProvisioning.
Network Policy Management, Endpoint Policy Management, and Logging and Status
Network Policy Management, Endpoint Policy Management, Logging and Status, Monitoring, IPS Event Analysis, SmartProvisioning and User Directory

Check Point Provider-1 Enterprise Edition Security Management Systems

Model Software Blades Description
Network Policy Management, Endpoint Policy Management, Logging & Status, Monitoring, IPS Event Analysis, SmartProvisioning, Management Portal and User Directory Check Point Provider-1 Enterprise Edition brings a highly scalable multi-domain management solution to high-end enterprise customers. That shares global objects and policies across the security domains.
Manages up to 3 domains
Network Policy Management, Endpoint Policy Management, Logging & Status, Monitoring, IPS Event Analysis, SmartProvisioning, Management Portal and User Directory Check Point Provider-1 Enterprise Edition brings a highly scalable multi-domain management solution to high-end enterprise customers. That shares global objects and policies across the security domains.
Manages up to 5 domains

Keywords: Security, Security Management, Software Blade Architecture

Other products and services from Check Point

09-12-2011

Training and Certifications

Attaining a security certification makes an important statement you have the knowledge, skills and abilities to defend an organization against possible breaches, and sets you ahead of the pack. Easy re-certification is available to all Check Point Certified Professionals - regardless of version level - with our new Training Blades. Multiple choice and scenario questions.


09-12-2011

61000 Security System | Check Point Software

Each 61000 is packaged with a group of pre-selected Check Point Software Blades – including Firewall, IPsec VPN, Identity Awareness, Advanced Networking and Acceleration & Clustering. Additional Software Blade upgrades are available to further extend and customize protection options.