What is SecurityPower?
Check Point’s SecurityPower is a new benchmark metric that allows customers to select security appliances by their capacity to handle real-world network traffic, multiple advanced security functions and a typical security policy. SecurityPower helps customers to accurately size and determine the appropriate appliances that can best meet their network security needs today, as well as support anticipated future traffic increases and additional security functions.
Choosing the right security appliance can be a challenging task – different organizations can have vastly different requirements in securing their computing environments: network size, required throughput, desired security functions, ability to handle future growth and allotted budget are all significant components of the decision process. Furthermore, until now, the task of determining an appliance’s performance under real-world conditions has been a daunting and time-consuming one.
Check Point’s SecurityPower is a new benchmark metric that allows customers to select security appliances by their capability to handle real-world network traffic, multiple security functions and a typical security policy. Each appliance has a specific SecurityPower capacity that represents its real-world performance.
SecurityPower Capacity is calculated by integrating multiple performance measurements based on a real-world mix of network traffic derived through extensive research involving a large number of Check Point customers. Different combinations of advanced security functions including firewall, IPS, application control, antivirus, URL filtering, and data loss prevention are applied to the traffic. All measurements are performed using a realistic security policy that includes 100 firewall rules, logging of all connections, Network Address Translation (NAT), a strong IPS protection profile, and up-to-date antivirus signatures.
Leveraging the new Check Point Appliance Selection Tool, the Check Point account team or Check Point partners can take criteria of the customer’s network – including the required throughput performance and desired security functions – as inputs, and produce a SecurityPower requirement value. That value is then compared against the SecurityPower capacities of the range of Check Point appliances to determine and present candidates that can best meet the customer’s network security and performance requirements.