Check Point Factsheet: UTM-1 Appliance Model 278
UTM-1 Appliances
All inclusive. All secure.
Security Gateways
UTM-1 Appliance Model 278
BENEFITS
Industry-leading application- and
network-layer firewall
Site-to-site and remote-access
VPNs
OVERVIEW
UTM-1 "! appliances offer the ideal combination of proven security technologies and
easy-to-use deployment and management features. With a full line of hardware-based
solutions, Check Point UTM-1 appliances consolidate key security applications
such as firewall, VPN, intrusion prevention, and antivirus and more into a single,
easy-to-manage solution.
UTM-1 Appliances are based on the Check Point Software Blade Architecture that
enables flexible and fast deployment of additional security capabilities, such as VoIP
protections, without the addition of new hardware.
BASE CONFIGURATION
4 ports of 10/100/1000Base-T (10/100/1000 Mbps Ethernet) - Copper
Console port
Hard Drive 160GB
Entry-level 8 gateway blades: Firewall, IPSec VPN, IPS, URLF, Anti-Virus,
Application Control, Identity Awareness, Anti-Spam Email security
3 management blades package Network Policy Management,
Endpoint Policy Management and Logging & Status
Enclosure 1U
Gateway antivirus and anti-spyware
Intrusion prevention with type-based
protections and security updates
Web security with URL filtering
and integrated security for Web
applications
Email security and anti-spam,
including the Check Point six
dimensions of comprehensive
messaging security
Software Blade Architecture for
fast and flexible deployment of
new security services
Full visibility and control of Internet
applications usage with the
industry's largest applications library
Common identity awareness
infrastructure for all software blades
|
©2011 Check Point Software Technologies Ltd. All rights reserved.
Classification: [Unrestricted] For everyone 1
Page 1 Page 2
Page 1 Page 2