SecurityPower™

Choosing the right security appliance can be a challenging task – different organizations can have vastly different requirements in securing their computing environments: network size, required throughput, desired security functions, ability to handle future growth and allotted budget are all significant components of the decision process. Furthermore, until now, the task of determining an appliance’s performance under real-world conditions has been a daunting and time-consuming one.
Check Point's SecurityPowerTM is a new benchmark metric that allows customers to select security appliances by their capability to handle real-world network traffic, multiple security functions and a typical security policy. Each appliance has a specific SecurityPower capacity that represents its real-world performance.
SecurityPower Capacity is calculated by integrating multiple performance measurements based on a real-world mix of network traffic derived through extensive research involving a large number of Check Point customers. Different combinations of advanced security functions including firewall, IPS, application control, antivirus, URL filtering, and data loss prevention are applied to the traffic. All measurements are performed using a realistic security policy that includes 100 firewall rules, logging of all connections, Network Address Translation (NAT), a strong IPS protection profile, and up-to-date antivirus signatures.
Leveraging the new Check Point Appliance Selection Tool, the Check Point account team or Check Point partners can take criteria of the customer's network – including the required throughput performance and desired security functions – as inputs, and produce a SecurityPower requirement value. That value is then compared against the SecurityPower capacities of the range of Check Point appliances to determine and present candidates that can best meet the customer’s network security and performance requirements.

- Products A-Z
- Appliances
- Appliances Overview
- 2200 Appliances
- 4000 Appliances
- 12000 Appliances
- 21000 Appliance
- 61000 Security System
- DDoS Protector Appliances
- SecurityPower
- Secure Web Gateway Appliance
- Threat Prevention Appliance
- Series 80
- UTM-1 Edge
- IP Appliances
- Virtual Systems
- Safe@Office
- Smart-1
- Smart-1 SmartEvent
- Integrated Appliance Solution
- IAS Bladed Hardware
- Software Blades
- Software Blades Overview
- Security Gateway
- Firewall
- IPSec VPN
- IPS
- Mobile Access
- Application Control
- Identity Awareness
- DLP
- Web Security
- URL Filtering
- Anti-Bot
- Antivirus
- Anti-Spam & Email Security
- Advanced Networking & Clustering
- Voice over IP (VoIP)
- Threat Prevention
- ThreatCloud™
- Security Management
- Compliance
- Network Policy Management
- Endpoint Policy Management
- Logging & Status
- SmartWorkflow
- Monitoring
- Management Portal
- User Directory
- SmartProvisioning
- SmartReporter
- SmartEvent
- Multi-Domain Security Management
- Virtualization Security
- Security Gateway Virtual Edition
- Cloud Security
- Virtual Appliance for Amazon Web Services
- Security Systems
- Security Systems Overview
- Endpoint Security
- Endpoint Security
- Full Disk Encryption
- Media Encryption
- Anti-Malware & Program Control
- Remote Access VPN
- Firewall & Compliance
- Check Point WebCheck
- Check Point GO
- Solutions
- Remote Access
- Consumer Products
- ZoneAlarm Antivirus
- ZoneAlarm ForceField
- ZoneAlarm Internet Security Suite

