Check Point Software (
News -
Alert) Technologies has unveiled its new UTM-1 Total Security appliance line, featuring products that allow clients and partners to better match the right solution with their security and performance needs.
The new UTM-1 models are the latest additions to Check Point’s line of comprehensive network security appliances.
Check Point’s appliance portfolio also includes the Power-1 series, introduced in April, 2008. Power-1 appliances provide performance levels that scale to 14Gbps and combine firewall, IPSec
VPN and intrusion prevention security at the best price per performance ratio.
UTM-1 Total Security appliances offer businesses the most comprehensive network protection and lowest total cost of ownership
(TCO) available. Check Point UTM-1 Total Security appliances provide customers a single network security solution that includes firewall, VPN
, intrusion prevention, SSL VPN, antivirus, anti-spyware, Web filtering, Web security, and anti-spam.
“Check Point UTM-1 Total Security appliances have shown strong adoption with businesses seeking powerful, out-of-the-box, all-inclusive network security solutions,” said Juliette Sultan, head of global marketing at Check Point, in a statement. “Our commitment is to continue providing customers with the most secure, easy to manage and cost-effective security solutions on the market with the widest range of solutions and models to best fit their unique needs.”
Moreover, all UTM-1 Total Security appliances come with a three year hardware warranty. Also available are either one or three year Total Security service packages, which includes update services for SmartDefense intrusion prevention, gateway antivirus, Web filtering and product software updates, as well as reduced support rates.
Since Check Point launched its series of appliances, a wide range of customers worldwide have adopted the security gateways. Businesses such as Advance Systems Group, Inc., AirIQ (
News -
Alert), Inc., Hitachi Asia, Ltd., Mustang Engineering and Sun Chemical use Check Point appliances to secure their networks.
“Our Check Point UTM-1 Total Security appliance gives us the security we need without slowing down our network,” said Dan Park, chief information officer at Advance Systems Group, Inc. “UTM-1 Total Security's ability to make major configuration changes and monitor traffic from a central location not only saves management time, but improves the quality of our network security.”
Check Point Software Technologies Ltd. is a major player in securing the Internet. Check Point offers total security solutions featuring a unified gateway, single endpoint agent and single management architecture, customized to fit customers’ dynamic business needs.
Check Point’s pure focus is on information security. Through its NGX platform, Check Point delivers a unified security architecture to protect business communications and resources, including corporate networks and applications, remote employees, branch offices and partner extranets.
The company also offers endpoint and data security solutions with Check Point Endpoint Security products, protecting and encrypting sensitive corporate information stored on PCs and other mobile computing devices.
Check Point's ZoneAlarm solutions protect millions of consumer PCs from hackers, spyware and identity theft.
Anil Sharma is a contributing editor for TMCnet. To read more of Anil’s articles, please visit his columnist page..
IP Security (IPSec) | X |
Most tunnel schemes use IP Sec-IP Security. IP Sec is a Layer 3 Network service.
In comparison, SSL-Secure Sockets Layer is a Layer 7 Application service which uses digital certificate to provide a m...more |
Virtual Private Network (VPN) | X |
Virtual Private Network is through the use of tunnels (encryption) creating secure IP networks. In this TECHtionary tutorial, we will review:
- Four Compelling Market Conditions Drive VPNs
- Three ...more |
Internet Protocol (IP) | X |
IP stands for Internet Protocol, a data-networking protocol developed throughout the 1980s. It is the established standard protocol for transmitting and receiving data
in packets over the Internet. I...more |
Total Cost of Ownership (TCO) | X |
This is a case study of TCO issues. Each organization must decide for itself what values to assign to the TCO equation....more |