This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Check Point launches new appliances and rolls existing offering to small businesses

Share this article:

Check Point has announced new appliances to extend its security virtualisation offering.

 

The new appliance, VSX-1, is designed to provide multi-layer, multi-domain virtualised security for businesses with the ability to consolidate up to 150 security gateways with firewall, IPsec and SSL virtual private network, intrusion prevention, VoIP security and URL filtering on a single device.

 

Dr. Dorit Dor, vice president of products at Check Point, said: “By deploying VSX-1 appliances and consolidating security gateways, customers not only increase device utilization and conserve power, space and cooling without compromising security, but also increase the scalability and efficiency of their security infrastructure.

 

“Through VSX-1 service providers can optimise their security infrastructure by running and managing from one device the security needs of many customers.”

 

Meanwhile, Check Point has also extended its UTM-1 Total Security appliance line to small businesses and branch offices. Again it combines a firewall, virtual private network, intrusion prevention, anti-virus, anti-spyware, URL filtering, web security and messaging security into one centrally-managed, turn-key solution.

 

Dr Dor said: “Our partners and customers have long requested to get the full Check Point software in a smaller package and at a lower price point to fit their small business and branch office locations. Now businesses don't have to compromise and can benefit from the full value of Check Point solutions.”

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks ...

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels ...

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.