Home Page | Skip to Navigation | Skip to Content | Skip to Search | Skip to Footer

Smart-1 SmartEvent Appliances

Smart-1 SmartEvent appliances deliver Check Point’s SmartEvent Software Blade event management software blades on a dedicated hardware platform. Smart-1 SmartEvent appliances are specifically designed for mid-size and large enterprise security networks, providing comprehensive security event analysis in a turnkey, plug-and-play appliance. Based on Check Point’s software blade architecture, Smart-1 SmartEvent appliances are first to deliver a unified event management solution for network, IPS and endpoint security with unsurpassed extensibility.

Key Benefits

  • Provides a comprehensive set of security management Software Blades in three turnkey security management appliances
  • Maximize efficiency with a single unified management console for network and endpoint security event management
  • Reduce costs and conserve resources with up to 4 TB of built-in storage capabilities
  • Ensure operational continuity for the most demanding environments

Target Markets and Customers

  • Mid-size and large enterprise security networks, providing comprehensive security event analysis in a turnkey, plug-and-play appliance

Partner Opportunities

Existing Check Point Customers

Leverage current network security install base to sell up in the account and educate them on the importance of an actionable event analysis solution that is easy to deploy and setup and improves their overall visibility and security status.

Look for customers challenged with the following:

  • Lacking the visibility into their overall security posture
  • Having difficulty identifying the real threats
  • Lacking the ability to take action and change security behavior based on what they see
  • Meeting audit and compliance requirements

New Customers

There are opportunities with new customers with the following profile:

  • Customers in highly regulated industries such as Finance, Utilities, and Government
  • Customers with massive log data
  • Customers managing a large number of devices
  • Customers looking for event correlation and forensics capabilities