Check
Point
Factsheet:
UTM-1
Appliance Model
278
UTM-1
Appliances
All
inclusive.
All
secure.
Security
Gateways
UTM-1
Appliance Model
278
BENEFITS
•
Industry-leading
application-
and
network-layer
firewall
•
Site-to-site
and
remote-access
VPNs
OVERVIEW
UTM-1
"!
appliances
offer
the
ideal
combination
of
proven
security
technologies
and
easy-to-use
deployment
and
management
features.
With
a
full
line
of
hardware-based
solutions,
Check
Point
UTM-1
appliances
consolidate
key
security
applications
such
as
firewall,
VPN,
intrusion
prevention,
and
antivirus
and
more
into
a
single,
easy-to-manage
solution.
UTM-1
Appliances
are
based
on
the
Check
Point
Software
Blade
Architecture
that
enables
flexible
and
fast
deployment
of
additional
security
capabilities,
such
as
VoIP
protections,
without
the
addition
of
new
hardware.
BASE
CONFIGURATION
•
4
ports
of
10/100/1000Base-T
(10/100/1000
Mbps
Ethernet)
-
Copper
•
Console
port
•
Hard
Drive
160GB
•
Entry-level
8
gateway
blades:
Firewall,
IPSec
VPN,
IPS,
URLF,
Anti-Virus,
Application
Control,
Identity
Awareness,
Anti-Spam
Email
security
•
3
management
blades
package
Network
Policy
Management,
Endpoint
Policy
Management
and
Logging
&
Status
•
Enclosure
1U
•
•
•
•
•
•
•
Gateway
antivirus
and
anti-spyware
Intrusion
prevention
with
type-based
protections
and
security
updates
Web
security
with
URL
filtering
and
integrated
security
for
Web
applications
Email
security
and
anti-spam,
including
the
Check
Point
six
dimensions
of
comprehensive
messaging
security
Software
Blade
Architecture
for
fast
and
flexible
deployment
of
new
security
services
Full
visibility
and
control
of
Internet
applications
usage
with
the
industry's
largest
applications
library
Common
identity
awareness
infrastructure
for
all
software
blades
|
©2011
Check
Point
Software
Technologies
Ltd.
All
rights
reserved.
Classification:
[Unrestricted]
For
everyone
1
|