Check
Point
Factsheet:
UTM-1
Appliance Model
272
UTM-1
Appliances
All
inclusive.
All
secure.
Security
Gateways
UTM-1
Appliance Model
272
BENEFITS
•
Industry-leading
application-
and
network-layer
firewall
•
Site-to-site
and
remote-access
VPNs
OVERVIEW
UTM-1
"!
appliances
offer
the
ideal
combination
of
proven
security
technologies
and
easy-to-use
deployment
and
management
features.
With
a
full
line
of
hardware-based
solutions,
Check
Point
UTM-1
appliances
consolidate
key
security
applications
such
as
firewall,
VPN,
intrusion
prevention,
and
antivirus
and
more
into
a
single,
easy-to-manage
solution.
UTM-1
Appliances
are
based
on
the
Check
Point
Software
Blade
Architecture
that
enables
flexible
and
fast
deployment
of
additional
security
capabilities,
such
as
VoIP
protections,
without
the
addition
of
new
hardware.
BASE
CONFIGURATION:
•
•
•
•
•
Gateway
antivirus
and
anti-spyware
Intrusion
prevention
with
type-based
protections
and
security
updates
Web
security
with
URL
filtering
and
integrated
security
for
Web
applications
Email
security
and
anti-spam,
including
the
Check
Point
six
dimensions
of
comprehensive
messaging
security
Software
Blade
Architecture
for
•
•
•
•
•
4
ports
of
10/100/1000Base-T
(10/100/1000
Mbps
Ethernet)
-
Copper
Console
port
Hard
Drive
160GB
Entry-level
2
gateway
blades:
Firewall,
IPSec
VPN
3
management
blades
package
Network
Policy
Management,
fast
and
flexible
deployment
of
new
security
services
|
Endpoint
Policy
Management
and
Logging
&
Status
•
Recommended
for
up
to
125
users
•
600,000
concurrent
connections
•
Enclosure
1U
Note:
Performance
data
represents
the
maximum
capabilities
of
the
systems
as
measured
under
optimal
testing
conditions.
©2010
Check
Point
Software
Technologies
Ltd.
All
rights
reserved.
Classification:
[Unrestricted]
For
everyone
1
|