Download presentation
Presentation is loading. Please wait.
Published byEugene Joseph Modified over 9 years ago
1
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Introducing Check Point’s Software Blade Architecture Juliette Sultan
2
2 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. We listened to you Customer advisory board 50 interviews Both enterprises and SMBs
3
3 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. pressure to keep things simple, manageable pressure to reduce TCO changing business environment evolving threats security infrastructure Torn in multiple directions
4
4 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. The obvious feedback my business #1 you want to be secure
5
5 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want Freedom to add protections as you need them
6
6 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… WITHOUT HAVING TO: worry about performance issues, worry availability issues
7
7 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… WITHOUT HAVING TO: pay for them before you actually need them
8
8 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… pay for another full solution, instead of leveraging existing infrastructure WITHOUT HAVING TO:
9
9 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to… take on board yet another vendor with yet another point solution WITHOUT HAVING TO:
10
10 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.
11
11 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want to SCALE UP CONSOLIDATE MIGRATE MOVE THINGS AROUND CHANGE OPTIMIZE RE-ALLOCATE
12
12 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to rethink the architecture for every single vendor WITHOUT HAVING TO:
13
13 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to change your people organization because technology requires you WITHOUT HAVING TO:
14
14 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Without having to Worry that you might compromise security in the process WITHOUT HAVING TO:
15
15 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved.
16
16 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. You want to stay in control Keep the solution simple Without the need to compromise security now… …or give up on future flexibility
17
17 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. What the customer wants totalsecurity flexiblesecurity simplesecurity Total security across all enforcement points Simple deployment, upgrade, management and business model To pick the right building blocks, at the right time with the right performance
18
18 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. 2009 provides flexibility and further simplicity GatewayEndpointManagement softwareblades from Check Point totalsecurity from Check Point
19
19 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A software blade is a security building block
20
20 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. How does it work? Select a containerSelect the bladesConfigure the system
21
21 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Two options to construct your solution Option 1: A La Carte Option 2: Pre-Defined Systems* SG103 1 core 3 blades SG407 4 cores 7 blades SG805 8 cores 5 blades *Examples
22
22 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Custom configuration Medium businessEnterprise 10,000s of users 100s of offices Many applications 100s of users 10s of offices Few applications
23
23 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Many customers do not turn on IPS due to performance concerns Check Point enables full IPS utilization 1. Activate IPS blade 2. Activate Acceleration blade 3. Set guaranteed performance levels Performance Example: The performance to use full IPS
24
24 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A library of software blades NETWORKMANAGEMENTENDPOINT
25
25 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. With software blades – new functionality Extend your existing security infrastructure IPS VoIP Acceleration Provisioning IPS Event Analysis
26
26 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business
27
27 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores)
28
28 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN blade @ $1,500
29
29 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN blade @ $1,500 Congested internet connection Acceleration blade @ 1,500
30
30 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: growing your business Basic connectivity: SG401 container with firewall (4 cores) More branches and mobile users: VPN blade @ $1,500 Congested internet connection Acceleration blade @ $1,500 Threat of targeted attacks IPS blade @ $3,000
31
31 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. A scenario: consolidation
32
32 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. IPS Firewall A scenario: consolidation Firewall Internet Firewall AV Web Security Firewall VPN Branch HQ Branch VPN IPS VPN AV Web Security AV Anti-spam Advance Networking Acceleration IPS
33
33 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. HQ SG805 A scenario: consolidation Branch SG207 Branch SG407 Internet Branch UTM-1 276 Branch SG106
34
34 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Your choice softwareblades from Check Pointmultiple point solutions / vendors multiple projects dedicated hardware dedicated management one project multiple configurations single management lower investment lower TCO
35
35 [Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. softwareblades from Check Point SecureFlexibleSimple
36
[Unrestricted]—For everyone ©2009 Check Point Software Technologies Ltd. All rights reserved. Thank you
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.