Check Point 2200 Manuel d'utilisateur Page 2

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 4
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 1
©2014 Check Point Software Technologies Ltd. All rights reserved.
Classification: [Protected] - All rights reserved
|
2
Check Point 2200 Appliance | Datasheet
2200
1 Rack mount shelf (optional)
2 6 x 10/100/1000Base-T RJ45 ports
3 Two USB ports for ISO installation
4 Console port RJ45
421 3
SecurityPower
Until today security appliance selection has been based
upon selecting specific performance measurements for
each security function, usually under optimal lab testing
conditions and using a security policy that has one rule.
Today customers can select security appliances by their
SecurityPower
ratings which are based on real-world
customer traffic, multiple security functions and a typical
security policy.
SecurityPower is a new benchmark that measures the
capability and capacity of an appliance to perform multiple
advanced security functions (Software Blades) such as IPS,
DLP and Application Control in real world traffic conditions.
This provides an effective metric to better predict the current
and future behavior of appliances under security attacks
and in day-to-day operations. Customer SecurityPower
Unit (SPU) requirements, determined using the Check Point
Appliance Selection Tool, can be matched to the SPU ratings
of Check Point Appliances to select the right appliance for
their specific requirements.
All-Inclusive Security Solutions
The Check Point 2200 Appliance offers a complete and
consolidated security solution in a desktop form factor.
Based on the Check Point Software Blade architecture, this
appliance is available in four Software Blade packages and
extensible to include additional Software Blades for further
security protection.
Firewall (FW): create user-based access control and
secure connections to corporate networks for remote and
mobile users, branch offices and business partners with
IPsec VPN.
Next Generation Firewall (NGFW): identify and control
applications by user and scan content to stop threats—
with IPS and Application Control.
Next Generation Data Protection (NGDP): preemptively
protect sensitive information from unintentional loss, edu-
cate users on proper data handling policies and empower
them to remediate incidents in real-time—with IPS,
Application Control and DLP.
Next Generation Threat Prevention (NGTP): apply
multiple layers of protection to prevent sophisticated
cyber-threats—with IPS, Application Control, Antivirus,
Anti-Bot, URL Filtering and Email Security.
Prevent Unknown Threats With ThreatCloud Emulation
Check Point Appliances are a key component in the
ThreatCloud Ecosystem providing excellent protection
from undiscovered exploits, zero-day and targeted attacks.
Appliances inspect and send suspicious files to the
ThreatCloud Emulation Service which runs them in a virtual
sandbox to discover malicious behavior. Discovered malware
is prevented from entering the network. A signature is created
and sent to the ThreatCloud which shares information on the
newly identified threat to protect other Check Point customers.
Integrated Security Management
The appliance can either be managed locally with its available
integrated security management or via central unified man-
agement. Using local management, the appliance can manage
itself and one adjacent appliance for high availability purposes.
GAiA—The Unified Secuirty OS
Check Point GAiA™ is the next generation Secure Operating
System for all Check Point appliances, open servers and
virtualized gateways. GAiA combines the best features from
IPSO and SecurePlatform into a single unified OS providing
greater efficiency and robust performance. By upgrading
to GAiA, customers will benefit from improved appliance
connection capacity and reduced operating costs. With GAiA,
customers will gain the ability to leverage the full breadth and
power of all Check Point Software Blades. GAiA secures IPv4
and IPv6 networks utilizing the Check Point Acceleration and
SecurityPower Utilization
0% 70% 100%
50%
Vue de la page 1
1 2 3 4

Commentaires sur ces manuels

Pas de commentaire