RSA 2007: New Check Point UTM security appliances

Check Point announced a powerful new line of unified threat management appliances, called UTM-1, offering medium-sized businesses and enterprise regional sites complete, multi-layered protection against Internet threats such as spyware, viruses, network attacks and more.

UTM-1 security appliances are a unique, tailored solution based upon Check Point’s proven enterprise security expertise and the company’s vision of a Unified Security Architecture for businesses. The appliances are easily deployed and can be centrally controlled to help simplify management for multiple sites, while providing the same uncompromising level of security used to secure the networks of Fortune 1000 companies.

Check Point UTM-1 Features and Benefits

· Stateful Inspection Firewall: Secures hundreds of applications and protocols
· Robust IPSec VPN: Enables secure site-to-site connectivity and remote access
· SSL VPN: Remote access without the need for additional hardware
· Integrated intrusion prevention: Stops both network and application-layer threats
· Gateway antivirus: Blocks viruses at the network edge; for critical protocols such as FTP, HTTP, POP3, and SMTP
· Gateway anti-spyware: Combats threats and disruptions related to spyware at the network edge
· Web application firewall: (optional) Protects web environment from attacks such a cross-site scripting, directory traversal and SQL injection.
· Web filtering: (optional): Prevents employee abuse of network resources such as inappropriate Web surfing through an extensive database of threat categories and associated URLs. (Available Q1 2007)
· Central management: Enables central policy management of multiple sites without the need for additional hardware or software.
· Centralized, automatic updates: (optional) SmartDefense Services provide ongoing and automatic updates to defenses, policies and other security elements
· Real-time monitoring and in-depth reporting: Includes a suite of monitoring and reporting tools to provide comprehensive logging, real-time monitoring and in-depth reporting




Share this