Check Point Firewall / VPN Software Blade
Check Point Firewall Software Blade is the industry’s most advanced firewall solution; trusted by 100% of the Fortune 100. Since its first release in 1994, Check Point Firewalls have been widely recognized for innovation and leadership, frequently winning awards and deployed by over 170,000 customers. Check Point's VPN Software Blade is an integrated software solution that provides secure connectivity to corporate networks, remote and mobile users, branch offices and business partners. The blade integrates access control, authentication and encryption to guarantee the security of network connections over the public Internet.

StoneGate Firewall delivers a fundamentally new and different architecture, providing you a degree of network security and business continuity not possible with traditional approaches. Stonesoft’s unique patented Multi-Link Technology enables a single or clustered StoneGate firewall to access multiple Internet and VPN connections across multiple ISPs, leased lines, or other connections

TippingPoint IPS
TippingPoint's Intrusion Prevention Systems provide Application Protection, Performance Protection and Infrastructure Protection at gigabit speeds through total packet inspection. Application Protection capabilities provide fast, accurate, reliable protection from internal and external cyber attacks. Through its Infrastructure Protection capabilities, the TippingPoint IPS protects VoIP infrastructure, routers, switches, DNS and other critical infrastructure from targeted attacks and traffic anomalies. TippingPoint's Performance Protection capabilities enable customers to throttle non-mission critical applications that hijack valuable bandwidth and IT resources, thereby aligning network resources and business-critical application performance.

Check Point Intrusion Prevention System Software Blade
Check Point Intrusion Prevention System, IPS Software Blade provides complete, integrated, next generation firewall intrusion prevention capabilities at multi-gigabit speeds, resulting in industry-leading total system security and performance. The Intrusion Prevention System, IPS Blade provides complete threat coverage for clients, servers, OS and other vulnerabilities, malware/worm infections, and more. The Multi-Tier Threat Detection Engine combines signatures, protocol validation, anomaly detection, behavioral analysis, and other methods to provide the highest levels of network IPS protection. By quickly filtering 90% of incoming traffic without requiring deep inspection, the IPS engine inspects for attacks only on relevant sections of the traffic, thus reducing overhead and increasing accuracy. The IPS Blade is supported by the global Check Point Research and Response Centers that provided the best Microsoft vulnerability threat coverage amongst leading security vendors. Check Point’s acclaimed management capabilities have been enhanced to support the dynamic management requirements of an IPS solution, allowing you to graphically monitor only what is important, easily isolate actionable information, and meet compliance and reporting requirements. Also, the entire Check Point IPS family – IPS Software Blade and standalone Check Point IPS-1 appliance –are managed from the same SmartDashboard IPS console, providing truly unified IPS management. Key Benefits - Complete IPS Protection – A fully functioning IPS integrated into your existing firewall - Industry-Leading Performance – Multi-gigabit total system performance for IPS and Firewall - Dynamic Management – A complete set of management tools including real-time event views and an automated protection process - Protection Between Patches – Reinforces security during delays in the patching process

StoneGate IPS
StoneGate IPS protects the internal network while StoneGate Firewall and VPN provides perimeter protection and secure connectivity between branch offices. Spyware, worms, and peer-to-peer programs slow down network performance, which has direct impact to business operations. In today’s business environment where competition is hard and decisions have to be made fast, the business information is valuable for only a short moment in time. If the information is not available when it is needed then it hurts productivity. That means increased risk for the business. StoneGate IPS detects and stops network traffic abuse and reduces business risk.

Check Point Cluster XL
ClusterXL provides high availability and load sharing to keep businesses running. It distributes traffic between clusters of redundant gateways so that the computing capacity of multiple machines may be combined to increase total throughput. If an individual gateway becomes unreachable, all connections are redirected to a designated backup without interruption. Tight integration with Check Point management and enforcement points ensures simple deployment.

The SmartEvent Software Blade turns security information into action with real-time security event correlation and management for Check Point security gateways and third-party devices. SmartEvent’s unified event analysis identifies critical security events from the clutter while correlating events across all security systems. Its automated aggregation and correlation of data not only minimizes the time spent analyzing log data but also isolates and prioritizes the real security threats. With the SmartEvent Software Blade, security teams no longer need to comb through the mass of data generated by the devices in their environment. Instead, recourses can now be deployed to focus on the threats that pose the greatest risk to their business. Key Benefits - Quickly identify security events from the deluge of device logs - Translate security events into actionable intelligence - Reduce business risk by responding in real-time - Prioritize resources to address the most critical threats - Track event resolution with built-in ticketing - Easily install and deploy for low TCO - Generate increased value from current security investments

Security attacks on public and private networks are growing. Malicious insiders, hackers, and insecure connections to business associates have the attention of C-level executives and the Board of Directors. The reason is not surprising: cost to the business. The now-infamous TJX data breach cost that company more than $200 million, as outlined in their 2009 SEC filing. Every server, virtual system, custom or off-the-shelf application, every network device, and security system has data relevant to potential security risks associated with it. All IT data has security relevance. The number of data sources and the amount of data the security team needs to collect and monitor has grown dramatically placing increasing stresses on the security team. This is in response to new statistics indicating that according to a Ponemon Institute survey, "roughly 70 percent of all reported security breaches were due to insiders." IT security team priorities are to find a scalable solution that supports compliance, reporting, and incident investigation. To protect themselves and safeguard their customers, organizations need to continuously monitor their security posture and maintain situational awareness. Organizations have often looked to a combination of log collection and event correlation as the way to monitor and respond to threats. Often, a lack of scalability with current solutions force compromises. Solution architectures, schemas, and a rules-based approach to monitoring, require choices to be made about what data to collect, and how much to send to a SIEM, ultimately forcing the user to decide in advance what data will constitute an event. The security team’s view is restricted to security incidents supported by a predetermined set of underlying forensic data. Splunk delivers situational awareness and continuous monitoring across your entire IT infrastructure from one place in real-time. Splunk makes all of your IT data available and actionable for the security team to use for forensic investigations without compromise. The same search and statistical analysis language can be used to monitor both real-time and historical data dramatically reducing investigation times for security events, complex fraud, and insider threat issues. Investigations can follow their course through the organization’s IT log data wherever it leads. Splunk reports can be used as proof points to satisfy multiple compliance mandates such as PCI, SOX and FISMA, HIPAA, FTC’s-Red Flags rule, state privacy laws, and many others while also supporting COBIT, ITIL, and NIST IT frameworks.

Scroll To Top