Check Point Software Technologies has a long history as a leading supplier of firewalls. Check Point developed the first security product to use stateful packet inspection and later produced the ZoneAlarm series of software firewalls for PCs. Check Point's line of Next Generation Firewalls (NGFWs) includes a broad selection of security gateway appliances and virtual firewalls. Check Point also offers a variety of subscription-based security services that are tightly integrated with the company's current NGFW security gateways. Check Point's successful legacy products include FireWall 1, VPN-1, the NGX platform, the UTM-1 family, the Series 80 appliance, and the Power-1 product line.
Progent's roster of firewall consultants includes Check Point-qualified experts who have earned Check Point Certified Systems Associate (CCSA) and Check Point Certified Systems Engineer (CCSE) credentials. Progent can deliver integration and debugging support for legacy and modern models of Check Point firewalls.
Check Point Next Generation Firewalls
Check Point's next-generation firewalls include desktop, integrated rack-mount, and chassis-based appliances designed to meet the performance requirements and budgets of virtually any use case for environments ranging from home offices to large enterprises and service providers. Purpose-built processors deliver high performance for key firewall functions like full inspection of encrypted SSL traffic. Firewall throughput for Check Point's NGFW security gateways ranges from 750 Mbps for standalone entry-level appliances to more than 800 Gbps with N+1 clustering based on Check Point HyperSync technology. Check Point's NGFW firewalls can be deployed and managed locally via a Web interface or centrally through Check Point's cloud-based Security Management Portal or R80 Security Management system.
Check Point offers security gateways to cover virtual any firewall requirement
For a closer look at Check Point's line of next-generation security gateways, visit Check Point certified firewall integration and support consultants.
Check Point Next Generation Security Services
Check Point firewalls work seamlessly with Check Point's centralized management tools and cloud-based subscription security services including the Next Generation Threat Prevention (NGTP) service bundle and the SandBlast suite of sandboxing tools. NGTP includes comprehensive protection from known signature-based threats such as Antivirus, Anti-Bot, IPS, App Control, URL Filtering, and Identity Awareness. Check Point's Next Generation Threat Protection services also include:
Check Point's SandBlast Threat Emulation service performs CPU-level malware inspection and adds OS-level emulation of multiple file types to ward off zero-day threats like new strains of ransomware and spyware. SandBlast Threat Extraction employs AI and behavioral machine learning technology to identify and delete dangerous content from web downloads and email attachments at line speed. This includes active content as well as embedded objects. The SandBlast Threat Extraction service immediately forwards cleaned files to their intended destinations without interfering with business workflow.
- Site-to-Site VPN
- Remote Access VPN
- IoT Device Recognition
Check Point's Legacy Products Supported by Progent
Check Point's legacy integrated firewall/VPN security appliances include desktop and rack-mount devices that support a broad spectrum of environments ranging from remote users and branch offices to enterprise data centers. These devices are built around Check Point's Software Blade architecture, which makes it possible to add features incrementally without installing new hardware and to manage a variety of security appliances from a central software console. Check Point's firewall/VPN products supported by Progent include:
Check Point UTM-1 Edge and UTM-1 Firewall/VPN Family: Check Point UTM-1 firewall/VPN appliances come in two families. The UTM-1 Edge family is packaged in a desktop form factor and is intended for remote users and small or branch offices with up to 100 users. The UTM-1 family of security appliances are packaged in desktop or rack-mountable chassis, include security acceleration and multi-site management capabilities, and can handle the firewall and remote connectivity requirements of small-to-midsize companies and branch offices. Check Point's UTM-1 Edge N-Series has embedded NGX software and features six 10/100/1000 Ethernet ports. Firewall throughput is 1 Gbps, VPN throughput is 200 Mbps, and IPS performance is 30 Mbps. The device can support 60,000 concurrent user sessions.
Check Point's UTM-1 3070 is a 1U rack-mountable unit and supports Check Point's Software Blade architecture. This high-end member of the UTM-1 family features 10 10/100/1000 Ethernet ports and offers firewall throughput of 10 Gbps, VPN throughput of 1.1 Gbps, and IPS performance of 4.4 Gbps. The UTM-1 3070 can handle 1.1 million concurrent user sessions.
Check Point Series 80 Appliance: Check Point's Series 80 Appliance is an integrated security device in a desktop form factor and designed to provide high performance and port density for remote and branch offices. In addition to offering firewall protection, the Series 80 also supports both IPsec and SSL VPN tunneling. The Series 80 supports Check Point's Software Blade architecture and features 10 10/100/1000 Ethernet ports. Firewall throughput is 1.5 Gbps, VPN throughput is 220 Mbps, and IPS performance is 720 Mbps. The Series 80 can support 150,000 concurrent user sessions.
Check Point Power-1 Family: Check Point Power-1 integrated security appliances are intended for campuses, data centers, or other environments that require very high-performance routing, firewall, and IPsec VPN capability. This series of rack-mountable 2U devices can all be upgraded to universal threat management (UTM) capability, and each supports 1.2 million concurrent sessions and 1,024 VLANs. Check Point's Power-1 5075 supports up to 14 10/100/1000 Ethernet ports and two optional 10Gb ports. Firewall throughput is 9 Gbps, VPN throughput is 2.4 Gbps, and IPS performance is 7.5 Gbps. The top-of-the-line Power-1 11085 supports up to 18 10/100/1000 Ethernet ports and four optional 10Gb ports. Firewall throughput is 30 Gbps, VPN throughput is 4.5 Gbps, and IPS performance is 15 Gbps.
Check Point Legacy Products Supported by Progent
As a pioneer in the firewall/VPN market, Check Point has built a sizable installed base of legacy single-purpose and integrated services products. Progent's security engineers have supported Check Point technology for more than a decade and can provide expert consulting, management, and troubleshooting services for older products or assistance for upgrading to newer models. Legacy Check Point products supported by Progent include:
Check Point VPN-1 Pro VPN/Firewall: VPN-1 Pro provides intelligent and reliable security for stopping attacks while simplifying business communications across the Internet. A tightly integrated combination of Firewall, VPN and intrusion prevention, VPN-1 Pro is built on Stateful Inspection, Application Intelligence, and One-Click VPN technologies. SmartCenter, Check Point's centralized management solution, provides unified threat management.
Check Point VPN-1 Edge Firewall: The VPN-1 Edge provides secure connectivity from remote branch and partner offices to the corporate network. With VPN-1/FireWall-1 technology, multiple high-availability features, and extensive networking capabilities, VPN-1 Edge provides secure, reliable, and immediate connection to applications and other corporate resources.
Check Point NGX: The NGX platform delivers a unified security architecture for a broad range of perimeter, internal, Web, and endpoint security solutions that protect business communications and resources for corporate networks and applications, remote employees, branch offices and partner extranets.
Check Point Express NGX: Check Point Express NGX is a comprehensive VPN/security solution designed to meet the Internet security needs of mid-sized businesses with up to 500 users. Check Point Express NGX delivers the essential security elements required by a mid-sized business in a single affordable solution that includes firewall, VPN, network and application attack protection plus multi-site, centralized management.
Nokia Firewalls: Nokia's family of purpose-built, high-performance firewall/VPN appliances incorporates Check Point's VPN-1 technology to protect and extend the network perimeter for small office to carrier-class applications. Nokia's firewall/VPN appliances provide strong security by combining Check Point's software with Nokia IPSO, a hardened, security-specific operating system.
How Progent Can Help with Check Point Technology
Progent's Check Point consultants can help you select and deploy Check Point software and firewall/VPN appliances powered by Check Point technology to provide an affordable and effective security solution for your corporate network. Progent can help you integrate Check Point products and technology with security products from other vendors and provide a single source of on-going technical support, maintenance, training and consulting expertise. Progent can also help you evaluate the business case for upgrading your legacy Check Point products to newer technology, and can assist you to plan and manage a seamless migration to the latest firewall/VPN solutions.
Progent can save you time and money by providing Check Point consulting and troubleshooting services online, eliminating travel delays and expenses and maximizing network availability. Progent has successfully delivered remote support to small businesses in every state in the United States (see Progent's customer testimonials).
Find out how to contact a Progent security consultant.