Check Point Unveils Security Gateway Module for the 61000 Security System
Check Point Software (News - Alert) Technologies provides Internet security technologies that protect customers against different types of threats, reduce security complexity and lower total cost of ownership.
Check Point’s Software Blade Architecture enables the deployment of any combination of multi-layered protections, including firewall, VPN, IPS, application control, identity awareness, URL filtering, anti-spam, antivirus, anti-bot, data loss prevention, mobile access and threat emulation.
The SGM260 blade is designed to deliver cutting-edge security to data centers, telecommunications and cloud service providers, the company said.
The 61000 system is known to be the industry’s fastest security system, according to Check Point. The new SGM260 blade for the 61000 Security System doubles the firewall and IPS aggregated throughput to up to 400 Gbps and 130 Gbps respectively, Check Point said.
The SGM260 blade also doubles the 61000′s security power up to 33,000 SecurityPower Units (SPU).
Additionally the security system delivers connection capacity of over 200 million concurrent connections. With its added performance features, the SGM260 blade delivers enhanced large scale data center and private cloud connectivity with up to 60x10GbE and up to 8x40GbE port density.
The company also ensures that SGM260 blade delivers smooth performance scaling process with “zero downtime” when adding SGM260 blades to existing 61000 chassis.
“While organizations often face the dilemma of having to choose security or speed, both protection and performance are equally critical to securing today’s high-performance network environments,” said Gabi Reish, vice president of product management at Check Point Software Technologies, in a statement.
“The SGM260 blade on our high-end 61000 security system delivers the power, extensibility and performance needed to protect the data center of the future,” Reish added.
Offering the highest port density, the SGM260 blade allows for more segmentation and performance. This in turn gives organizations greater flexibility to deploy Check Point’s advanced security technologies based on their network needs.
Edited by Cassandra Tucker