Check Point Factsheet: UTM-1 Appliance Model 272
UTM-1 Appliances
All inclusive. All secure.
Security Gateways
UTM-1 Appliance Model 272
BENEFITS
Industry-leading application- and
network-layer firewall
Site-to-site and remote-access
VPNs
OVERVIEW
UTM-1 "! appliances offer the ideal combination of proven security technologies and
easy-to-use deployment and management features. With a full line of hardware-based
solutions, Check Point UTM-1 appliances consolidate key security applications
such as firewall, VPN, intrusion prevention, and antivirus and more into a single,
easy-to-manage solution.
UTM-1 Appliances are based on the Check Point Software Blade Architecture that
enables flexible and fast deployment of additional security capabilities, such as VoIP
protections, without the addition of new hardware.
BASE CONFIGURATION:
Gateway antivirus and anti-spyware
Intrusion prevention with type-based
protections and security updates
Web security with URL filtering
and integrated security for Web
applications
Email security and anti-spam,
including the Check Point six
dimensions of comprehensive
messaging security
Software Blade Architecture for
4 ports of 10/100/1000Base-T (10/100/1000 Mbps Ethernet) - Copper
Console port
Hard Drive 160GB
Entry-level 2 gateway blades: Firewall, IPSec VPN
3 management blades package Network Policy Management,
fast and flexible deployment of
new security services
|
Endpoint Policy Management and Logging & Status
Recommended for up to 125 users
600,000 concurrent connections
Enclosure 1U
Note: Performance data represents the maximum capabilities of the systems as
measured under optimal testing conditions.
©2010 Check Point Software Technologies Ltd. All rights reserved.
Classification: [Unrestricted] For everyone 1
Page 1 Page 2
Page 1 Page 2