Check Point Security Gateway on the Blue Coat X

Document technical information

Format pdf
Size 155.4 kB
First found Nov 13, 2015

Document content analysis

Category Also themed
Language
English
Type
not defined
Concepts
no text concepts found

Organizations

Places

Transcript

Security
Empowers
Business
An Unmatched, Integrated Security Platform
The X-Series platform coupled with the Check Point Security Gateway provides unsurpassed performance
for today’s best-of-breed security software applications. Whether deployed as a Check Point only solution or
utilized with other security applications provided by different Partners, the X-Series platform delivers unmatched
consolidation, adaptability, availability and operational efficiency.
CHECK POINT SECURITY GATEWAY
The Check Point Software Blade architecture supports a complete and
increasing selection of Software Blades, each delivering a modular
security gateway or security management function. As Software Blades
are modular and flexible, they enable organizations to efficiently and
quickly tailor security application functionality to specific and changing
security needs. New software blades are easily added and licensed as
needed without the addition of new hardware.
Benefits
• Combine best-of-breed software security applications with industryleading consolidation, adaptability, availability and operational
efficiency
• Implement a Check Point only solution or integrate Check Point
applications with other Blue Coat partner applications
• Support multiple instances of Check Point applications via VSX to
create hundreds of individual security systems on a single blade
Check Point Security Gateway on the X-Series Platform
Combining the Check Point software and blade architecture with the
Blue Coat integrated application platform provides an unmatched,
extensible solution that is trusted by large enterprises and service
providers around the world. The software blade or virtualized software
blade approach allows customers to choose from multiple Check Point
applications, increasing flexibility of security services. The integration of
the X-Series Platform with the Check Point Software Blade Architecture
results in a unique and powerful solution that helps organizations:
• Simplify datacenter complexity through the consolidation of
numerous, disparate appliances onto a single X-Series system.
• Deliver an extensible solution that readily adapts to the ever-changing
security demands on business.
• Achieve unsurpassed reliability and stability of critical communications
that meet tomorrow’s growing business uptime demands.
• Improve operational efficiency while reducing the management and
maintenance demands and costs within datacenter environments.
• Protect business critical assets while maintaining the highest network
performance.
In support of simplifying the customer experience, Blue Coat has
expanded its relationship with Check Point to directly sell the X-Series
product line when deploying Check Point software. Customers now
have a single, trusted partner for sales, application integration and
support. The Check Point X-Series Platform is available to organizations
worldwide starting in 2014.
Consolidation
Blue Coat and Check Point reduce complexity by consolidating firewall
appliances with associated networking equipment into one adaptable
platform. Up to 100 network and firewall devices can be consolidated
within one X-Series platform, reducing time, operating costs, energy
consumption, and complexity. Coping with more than 100 million
concurrent firewall sessions, 600,000+ new stateful connections per
second, and a real-world firewall throughput of 140Gbps, the X-Series
delivers the performance needed by the most demanding environments.
SOLUTION BRIEF
CHECK POINT SECURITY GATEWAY
ON THE X-SERIES PLATFORM
SOLUTION BRIEF
Adaptability
Security
Empowers
Business
Many organizations do not have a clear view of what changes will occur
in the future regarding performance or security requirements. The only
thing that is certain is there will be change. The X-Series platform enables
Check Point application acceleration, virtualization and optimization to
better meet the growing demands of today’s businesses, without having
to re-architect the physical network. Whether deployed as a Check Pointonly security application platform or as a multiple-application platform
comprised of Check Point and other complementary Blue Coat Partner
technologies, the end result is a powerful, reliable, high-performance
solution that readily adapts to the organization’s security needs. This
flexibility assures that the X-Series platform will continue supporting their
business needs for many years to come.
Automation
The uptime demands on the network have never been higher and
gone are the days when scheduled downtime was acceptable. Many
many organizations strive for zero-downtime network environments.
The X-Series solution provides adaptive self-healing through patented
technology, which uses dynamic back-up modules or prioritization to
assure key security applications remain functioning at full capacity
if a module becomes unavailable. The X-Series combines superior
networking, exceptional processing, and an open application
architecture, to eliminate network and firewall outages.
Operational Efficiency
IT organizations are tasked to do more with less. The X-Series solution
minimizes the number of devices required to secure today’s fastest,
most demanding networks by reducing the number of Layer 2 switches,
load balancers, patch panels, cabling and power. The X-Series
management capabilities streamline configuration and provide visibility
into the entire solution; from individual chassis, to specific modules, to
traffic flows and applications. This readily provides organizations with
the appropriate information needed to effectively and quickly make
decisions about maintaining their security infrastructure and protecting
their business. Overall, the X-Series platform enables IT organizations to
secure and run their businesses more proficiently with lower CapEx and
OpEx costs.
SUPPORTED APPLICATIONS
APPLICATION
DESCRIPTION
SUPPORTED
Security Gateway
Check Point Security Gateway R77, R77.10
Security Gateway
Check Point Security Gateway R76
Security Gateway
Check Point Security Gateway R75.40VS
Security Gateway
Check Point Security Gateway R75.40
Security Gateway
Check Point Security Gateway R75.20
Security Gateway
Check Point Security Gateway R71.10
Virtual Security Gateway
Check Point VSX security operations platform VPN-1 Power VSX NGX R68
Virtual Security Gateway
Check Point VSX security operations platform VPN-1 Power VSX NGX R67
Firewall
Firewall-1 GX 5.0









SOLUTION BRIEF
SECURITY SOFTWARE BLADES AND SUPPORTING SOFTWARE RELEASES
Security
Empowers
Business
1
2
APPLICATION
DESCRIPTION
R77
R76
R75.40
Firewall
World's most proven firewall secures more than 200 applications, protocols and services featuring the most adaptive
and intelligent inspection technology.
IPSec VPN
Secure connectivity for offices and end users via sophisticated but easy to manage Site-to-Site VPN and flexible
remote access.






IPS
The highest performing integrated IPS solution with the industry's best threat coverage.
Application Control
Provides strong application and identity controls by allowing organizations to create policies which identify, block or
limit usage of thousands of applications, based on user identity.
Identity Awareness
Provides granular security policy at a per user, per group and per machine level. It centralizes the management,
monitoring and reporting of user actions across the internal network, its perimeter and beyond.
Web Security
Advanced protection for the entire web environment featuring the strongest protection against buffer-overflow attacks.
URL Filtering
Best-of-breed web filtering covering more than 20 million URLs protects users and enterprises by restricting access to
dangerous websites.
Advanced Networking and
Clustering
Simplifies network security deployment and management within complex and highly utilized networks, while maximizing
network performance and security in multi-Gbps environments.
Mobile Access
The safe and easy solution to connect to corporate applications over the Internet with Smartphones or PCs.
Anti-Bot/Anti-Virus
Scanning and recognition of malicious bots and viruses.















1
Threat Emulation
Blocks attacks which cannot be detected by signatures and opens inspected files inside a secure emulation
environment to detect malicious behavior.
Compliance
Analyzes your environment for compliance with major regulations and international standards then generates detailed
reports, with best practice recommendations.






2



In R75.47 and beyond
Mobile Access VSX supported in R77.10
X-SERIES APPLICATION PROCESSOR MODULE (APM) PERFORMANCE
APM-8650
APM-9600
Firewall Throughput (1518 byte packets)
9.5Gbps
18Gbps
iMix Throughput
4.96Gbps
17Gbps
IPS Throughput
5.6Gbps
17Gbps
Connections Per Second
60K
110K
Concurrent Connections
8M
10.5M
Packet Forwarding Rate
2.2M
5M
Operating System
XOS 8.5 or higher
XOS 9.5 or higher
X-SERIES SYSTEM PERFORMANCE
X20
X30
X50
X60
X80-S
Real-World Platform Performance
5Gbps
10Gbps
17.6Gbps
70Gbps
140Gbps
Stateful Connections Per Second
120K
120K
150K
300K
600K
Maximum Concurrent Connections
8M
8M
18M
70M
100M
Stateless Connections Per Second
N/A (not enabled)
N/A (not enabled)
220K
550K
1.1M
SOLUTION BRIEF
Summary
Security
Empowers
Business
Blue Coat empowers organizations to safely and quickly choose the
best applications, services, devices, data sources, and content, so they
can create, communicate, collaborate, innovate, execute, compete and
win in their markets. With the company’s unique Business Assurance
Technology solution set, Blue Coat assists organizations in unlocking
their potential and achieving their business goals.
Blue Coat, along with partners such as Check Point, has developed
a comprehensive, high-performance security solution for effectively
enabling consolidated and virtualized security within large enterprises
and service providers. The X-Series integrated security platform
provides the highest hardware scaling and high availability for a growing
list of state-of-the-art security applications, including load balancing,
firewalls, intrusion prevention systems and more. The end result is
a carrier-class, extensible security service platform that reduces the
total time and cost of deployment and management of enterprise
infrastructure, while providing competitive revenue-generation and costreduction opportunities for qualified service providers.
Blue Coat Systems Inc.
www.bluecoat.com
Corporate Headquarters
Sunnyvale, CA
+1.408.220.2200
EMEA Headquarters
Hampshire, UK
+44.1252.554600
APAC Headquarters
Singapore
+65.6826.7000
© 2014 Blue Coat Systems, Inc. All rights reserved. Blue Coat, the Blue Coat logos, ProxySG, PacketShaper, CacheFlow, IntelligenceCenter, CacheEOS, CachePulse, Crossbeam, K9, the K9 logo, DRTR, Mach5, Packetwise, Policycenter, ProxyAV, ProxyClient,
SGOS, WebPulse, Solera Networks, the Solera Networks logos, DeepSee, “See Everything. Know Everything.”, “Security Empowers Business”, and BlueTouch are registered trademarks or trademarks of Blue Coat Systems, Inc. or its affiliates in the U.S. and certain
other countries. This list may not be complete, and the absence of a trademark from this list does not mean it is not a trademark of Blue Coat or that Blue Coat has stopped using the trademark. All other trademarks mentioned in this document owned by third parties
are the property of their respective owners. This document is for informational purposes only. Blue Coat makes no warranties, express, implied, or statutory, as to the information in this document. Blue Coat products, technical services, and any other technical data
referenced in this document are subject to U.S. export control and sanctions laws, regulations and requirements, and may be subject to export or import regulations in other countries. You agree to comply strictly with these laws, regulations and requirements, and
acknowledge that you have the responsibility to obtain any licenses, permits or other approvals that may be required in order to export, re-export, transfer in country or import after delivery to you. v.SB-CHECKPOINT-SWG-EN-v2l-0114

Similar documents

×

Report this document